共 11 条
- [1] Dhamija R., Tygar J.D., Hearst M., Why Phishing Works, Proceedings of the 2006 SIGCHI Conference on Human Factors in Computing Systems. April 24, 27, (2006)
- [2] Adams, Sasse M.A., Users Are Not the Enemy: Why users compromise security mechanisms and how to take remedial measures., Communications of the ACM, 42, 12, pp. 40-46, (1999)
- [3] Weirich D., Persuasive Password Security, (2005)
- [4] Beautement A., Coles R., Griffin J., Monahan B., Pym D., Sasse M.A., Wonham M., the Human and Technological Costs and Benefits of USB Memory Stick Security, Workshop on Economics in Information Security, (2008)
- [5] Eric Johnson M., Goetz E., Embedding Information Security into the Organisation, IEEE Security & Privacy, pp. 16-24, (2007)
- [6] Vroom C., von Solms R., Towards information security behavioural compliance, Computers & SecurityVolume, 23, 3, pp. 191-198, (2004)
- [7] An Introduction to Computer Security: The NIST Handbook, (1995)
- [8] Thaler R.H., Sunstein C.R., Nudge
- [9] Sasse M.A., Brostoff S., Weirich D., Transforming the 'weakest link': a human-computer interaction approach to usable and effective security., BT Technology Journal, 19, 3, pp. 122-131, (2001)
- [10] Randazzo M.R., Keeney M., Kowalski E., Cappelli D., Moore A., Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, (2004)