Author:
Blanchard Enka,Coquand Xavier,Selker Ted
Publisher
Springer International Publishing
Reference50 articles.
1. Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M.L., Stransky, C.: How internet resources might be helping you develop faster but less securely. IEEE Secur. Priv. 15(2), 50–60 (2017). https://doi.org/10.1109/MSP.2017.24
2. Acar, Y., Fahl, S., Mazurek, M.L.: You are not your developer, either: a research agenda for usable security and privacy research beyond end users. In: IEEE Cybersecurity Development – SecDev, pp. 38, November 2016. https://doi.org/10.1109/SecDev.2016.013
3. Alkaldi, N., Renaud, K.: Why do people adopt, or reject, smartphone password managers? In: Proceedings of EuroUSEC. eprint on Enlighten: Publications (2016)
4. Amazon Alexa: 500 global sites (2019). http://alexa.com/topsites/
5. Baskerville, R., Rowe, F., Wolff, F.C.: Functionality vs. security in is: tradeoff or equilibrium. In: International Conference on Information Systems, pp. 1210–1229 (2012)