So long, and no thanks for the externalities: the rational rejection of security advice by users
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Where do security policies come from?
Proceedings of the Sixth Symposium on Usable Privacy and Security
Proceedings of the second annual workshop on Security and privacy in medical and home-care systems
Proceedings of the 16th annual joint conference on Innovation and technology in computer science education
Hi-index | 0.00 |
We've all seen the checklists with suggestions for how to secure your system. Many of us have even written them. (I have.) The problem is that security is more complicated than that, and checklists—especially if followed slavishly or enforced without thought—can make matters worse.