So long, and no thanks for the externalities
Top Cited Papers
- 8 September 2009
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 133-144
- https://doi.org/10.1145/1719030.1719050
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- You've been warnedPublished by Association for Computing Machinery (ACM) ,2008
- Exploring User Reactions to New Browser Cues for Extended Validation CertificatesPublished by Springer Nature ,2008
- Examining the impact of website take-down on phishingPublished by Association for Computing Machinery (ACM) ,2007
- A large-scale study of web password habitsPublished by Association for Computing Machinery (ACM) ,2007
- Do security toolbars actually prevent phishing attacks?Published by Association for Computing Machinery (ACM) ,2006
- Why phishing worksPublished by Association for Computing Machinery (ACM) ,2006
- The battle against phishingPublished by Association for Computing Machinery (ACM) ,2005
- The user non-acceptance paradigmPublished by Association for Computing Machinery (ACM) ,2005
- Users are not the enemyCommunications of the ACM, 1999
- Password securityCommunications of the ACM, 1979