Security in the wild: user strategies for managing security as an everyday, practical problem
Top Cited Papers
- 22 September 2004
- journal article
- Published by Springer Nature in Personal and Ubiquitous Computing
- Vol. 8 (6) , 391-401
- https://doi.org/10.1007/s00779-004-0308-5
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- Wan2tlk?Published by Association for Computing Machinery (ACM) ,2003
- Instant messaging in teen lifePublished by Association for Computing Machinery (ACM) ,2002
- ChallengePublished by Association for Computing Machinery (ACM) ,2002
- An approach to usable security based on event monitoring and visualizationPublished by Association for Computing Machinery (ACM) ,2002
- Users' conceptions of web securityPublished by Association for Computing Machinery (ACM) ,2002
- The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical FeasibilityHuman–Computer Interaction, 2000
- Are Passfaces More Usable Than Passwords? A Field Trial InvestigationPublished by Springer Nature ,2000
- Users are not the enemyCommunications of the ACM, 1999
- A cryptographic file system for UNIXPublished by Association for Computing Machinery (ACM) ,1993
- The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding.Contemporary Sociology: A Journal of Reviews, 1978