Author:
Pieters Wolter,Hadžiosmanović Dina,Dechesne Francien
Reference42 articles.
1. L. AlAbdulkarim, E. Molin, Z. Lukszo, and T. Fens. Acceptance of ict-intensive socio-technical infrastructure systems: Smart metering case in the netherlands. In Networking, Sensing and Control (ICNSC), 2014 IEEE 11th International Conference on, pages 399--404, April 2014.
2. M. J. Assante. Infrastructure protection in the ancient world. In System Sciences, 2009. HICSS '09. 42nd Hawaii International Conference on, pages 1--10, 2009.
3. R. Böhme and T. Moore. The iterated weakest link. Security & Privacy, IEEE, 8(1):53--55, 2010.
4. J. Cappos, Y. Zhuang, D. Oliveira, M. Rosenthal, and M. K.-C. Yeh. Vulnerabilities as blind spots in developer's heuristic-based decision-making processes. In Proceedings of the 2014 New Security Paradigms Workshop, NSPW '14, New York, NY, USA, 2014. ACM.
5. D. Collingridge. The social control of technology. St Martin, New York, 1980.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On Security Singularities;Proceedings of the New Security Paradigms Workshop on - NSPW '18;2018
2. An Online Consent Maturity Model;Proceedings of the New Security Paradigms Workshop on - NSPW '18;2018
3. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace;Science and Engineering Ethics;2015-04-21