1. Alexander, J. D., & Jasna, K. (2006). Aligning usability and security: A usability study of Polaris. In Proceedings of the Second Symposium on Usable Privacy and Security, Pittsburgh, PA (pp. 1-7). New York, NY: ACM.
2. Alma, W., & Tygar, J. D. (1999). Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th Conference on USENIX Security Symposium, Washington, DC (pp. 169-184). Berkeley, CA: USENIX.
3. Berman, A., Bourassa, V., & Selberg, E. (1995). TRON: Process-specific file protection for the UNIX operating system. In Proceedings of the Winter USENIX Conference, New Orleans, LA (pp. 165-175). Berkeley, CA: USENIX.
4. Brodie, C. A., Karat, C.-M., & Karat, J. (2006). An empirical study of natural language parsing of privacy policy rules using the SPARCLE Policy Workbench. In Proceedings of the 2nd Symposium on Usable Privacy and Security, Pittsburgh, PA (pp. 8-19). New York, NY: ACM.
5. SUS: A quick and dirty usability scale;J.Brooke;Usability evaluation in industry,1996