[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sasse et al., 2002 - Google Patents

Transforming the weakest link: A human-computer interaction approach to usable and effective security

Sasse et al., 2002

View PDF
Document ID
2930014520419952436
Author
Sasse M
Brostoff S
Weirich D
Publication year
Publication venue
Internet and Wireless Security,(nd)

External Links

Snippet

With the exponential growth of networked systems and applications such as eCommerce, the demand for effective computer security is increasing. At the same time, the number and seriousness of security problems reported over the past couple of years indicates that …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Sasse et al. Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security
Brostoff et al. Safe and sound: a safety-critical approach to security
Stobert et al. The password life cycle
Sasse et al. Usable security: Why do we need it? How do we get it?
Blythe et al. Unpacking security policy compliance: The motivators and barriers of employees’ security behaviors
Guo et al. The effects of multilevel sanctions on information security violations: A mediating model
Vance et al. Using accountability to reduce access policy violations in information systems
Hoonakker et al. Password authentication from a human factors perspective: Results of a survey among end-users
Sasse Usability and trust in information systems
Sasse Computer security: Anatomy of a usability disaster, and a plan for recovery
Steves et al. Report: Authentication diary study
Forget A world with many authentication schemes
Connolly et al. Investigation of employee security behaviour: A grounded theory approach
Weirich et al. Persuasive password security
Brostoff Improving password system effectiveness
Sasse et al. Transforming the weakest link: A human-computer interaction approach to usable and effective security
Rooney et al. Comparing experts’ and users’ perspectives on the use of password workarounds and the risk of data breaches
Karat et al. Human-computer interaction viewed from the intersection of privacy, security, and trust
Wynn Examining the relationship of business operations and the information security culture in the United States
Ciampa et al. Online versus local password management applications: An analysis of user training and reactions
Renaud et al. Simpass: Quantifying the impact of password behaviours and policy directives on an organisation’s systems
Mujeye An Experimental Study on the Role of Password Strength and Cognitive Load on Employee Productivity
Blythe Information security in the workplace: A mixed-methods approach to understanding and improving security behaviours
Long A socio-technical perspective on information security knowledge and attitudes
Kreicberga Internal threat to information security: countermeasures and human factor within SME