Author:
Herzog Almut,Shahmehri Nahid
Reference16 articles.
1. S. M. Furnell. Using security: easier said than done. Computer Fraud & Security, 2004(4):6–10, April 2004.
2. S. M. Furnell and S. Bolakis. Helping us to help ourselves: Assessing administrators’ use of security analysis tools. Network Security, 2004(2):7–12, February 2004.
3. S. M. Furnell, A. Jusoh, and D. Katsabas. The challenges of understanding and using security: A survey of end users. Computers & Security, 25:27–35, 2006.
4. S. L. Garfinkel. Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable. PhD thesis, Massachusetts Institute of Technology, May 2005.
5. D. Gerd torn Markotten. Benutzbare Sicherheit in informationstechnischen Systemen. Rhombos Verlag, Berlin, 2004. ISBN 3-937231-06-4.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献