An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Managing vulnerabilities of information systems to security incidents
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
A Management Perspective on Risk of Security Threats to Information Systems
Information Technology and Management
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Security and Trust in IT Business Outsourcing: a Manifesto
Electronic Notes in Theoretical Computer Science (ENTCS)
An algorithm for the appraisal of assurance indicators for complex business processes
Proceedings of the 2007 ACM workshop on Quality of protection
Security and performance in service-oriented applications: Trading off competing objectives
Decision Support Systems
A general method for assessment of security in complex services
ServiceWave'11 Proceedings of the 4th European conference on Towards a service-based internet
Measuring resistance to social engineering
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Benchmarking cloud security level agreements using quantitative policy trees
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
On Game-Theoretic Network Security Provisioning
Journal of Network and Systems Management
Engineering Security Agreements Against External Insider Threat
Information Resources Management Journal
Hi-index | 0.00 |