Sasse et al., 2002 - Google Patents
Transforming the weakest link: A human-computer interaction approach to usable and effective securitySasse et al., 2002
View PDF- Document ID
- 2930014520419952436
- Author
- Sasse M
- Brostoff S
- Weirich D
- Publication year
- Publication venue
- Internet and Wireless Security,(nd)
External Links
Snippet
With the exponential growth of networked systems and applications such as eCommerce, the demand for effective computer security is increasing. At the same time, the number and seriousness of security problems reported over the past couple of years indicates that …
- 230000001131 transforming effect 0 title description 10
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sasse et al. | Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security | |
Brostoff et al. | Safe and sound: a safety-critical approach to security | |
Stobert et al. | The password life cycle | |
Sasse et al. | Usable security: Why do we need it? How do we get it? | |
Blythe et al. | Unpacking security policy compliance: The motivators and barriers of employees’ security behaviors | |
Guo et al. | The effects of multilevel sanctions on information security violations: A mediating model | |
Vance et al. | Using accountability to reduce access policy violations in information systems | |
Hoonakker et al. | Password authentication from a human factors perspective: Results of a survey among end-users | |
Sasse | Usability and trust in information systems | |
Sasse | Computer security: Anatomy of a usability disaster, and a plan for recovery | |
Steves et al. | Report: Authentication diary study | |
Forget | A world with many authentication schemes | |
Connolly et al. | Investigation of employee security behaviour: A grounded theory approach | |
Weirich et al. | Persuasive password security | |
Brostoff | Improving password system effectiveness | |
Sasse et al. | Transforming the weakest link: A human-computer interaction approach to usable and effective security | |
Rooney et al. | Comparing experts’ and users’ perspectives on the use of password workarounds and the risk of data breaches | |
Karat et al. | Human-computer interaction viewed from the intersection of privacy, security, and trust | |
Wynn | Examining the relationship of business operations and the information security culture in the United States | |
Ciampa et al. | Online versus local password management applications: An analysis of user training and reactions | |
Renaud et al. | Simpass: Quantifying the impact of password behaviours and policy directives on an organisation’s systems | |
Mujeye | An Experimental Study on the Role of Password Strength and Cognitive Load on Employee Productivity | |
Blythe | Information security in the workplace: A mixed-methods approach to understanding and improving security behaviours | |
Long | A socio-technical perspective on information security knowledge and attitudes | |
Kreicberga | Internal threat to information security: countermeasures and human factor within SME |