Users are not the enemy

被引:693
作者
Adams, A [1 ]
Sasse, MA [1 ]
机构
[1] UCL, Dept Comp Sci, London WC1E 6BT, England
关键词
D O I
10.1145/322796.322806
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
[No abstract available]
引用
收藏
页码:41 / 46
页数:6
相关论文
共 11 条
[1]  
DAVIS C, 1993, P NAT COMP SEC C 93, P1
[2]  
DAVIS D, 1987, SECURITY COMPUTER NE
[3]  
DEALVARE AM, 1990, P UN SEC WORKSH PORT, V2
[4]  
DEALVARE AM, 1998, P UN SEX WORKSH PORT, V2, P29
[5]  
FIPS, 1985, PASSW US
[6]  
FORD W, 1994, COMPUTER COMMUNICATI
[7]  
GORDON S, 1995, SOCIAL ENG TECHNIQUE
[8]   DEFICIENCIES OF THE TRADITIONAL APPROACH TO INFORMATION SECURITY AND THE REQUIREMENTS FOR A NEW METHODOLOGY [J].
HITCHINGS, J .
COMPUTERS & SECURITY, 1995, 14 (05) :377-383
[9]  
PARKER DB, 1992, IT SECURITY NEED INT
[10]  
Strauss A.L., 1990, Basics of Qualitative research: Grounded theory Procedures and Techniques