NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Communications of the ACM
User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
The user non-acceptance paradigm: INFOSEC's dirty little secret
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Behavioral response to phishing risk
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit
A Human-Web Interaction Based Trust Model for Trustworthy Web Software Development
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Security and usability research using a microworld environment
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
Adaptive Security Dialogs for Improved Security Behavior of Users
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part I
Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context
Wireless Personal Communications: An International Journal
Guiding decisions on authorization policies: a participatory approach to decision support
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Studying access-control usability in the lab: lessons learned from four studies
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
Understanding the weaknesses of human-protocol interaction
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Understanding and overcoming cyber security anti-patterns
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modifying smartphone user locking behavior
Proceedings of the Ninth Symposium on Usable Privacy and Security
Incorporating professional ethics into an introductory computer science course
Journal of Computing Sciences in Colleges
Hi-index | 0.00 |
Why do good users make bad decisions?