Article thumbnail
Location of Repository

Users are not the enemy

By A Adams and MA Sasse
Publisher: ASSOC COMPUTING MACHINERY
Year: 1999
DOI identifier: 10.1145/322796.322806
OAI identifier: oai:eprints.ucl.ac.uk.OAI2:20247
Provided by: UCL Discovery

Suggested articles

Citations

  1. (1988). A Framework for Password Selection”. Unix Security Workshop II.
  2. (1993). BApasswd: A New Proactive Password
  3. (1990). Basics of qualitative research: grounded theory procedures and techniques”. Sage,
  4. (1994). Computer communications security: Principles, standard protocols and techniques”.
  5. (1995). Deficiencies of the Traditional Approach to Information Security and the Requirements for a New Methodology”.
  6. (1992). Engineering Psychology and Human performance” (2 nd
  7. (1990). How Crackers Crack Passwords OR What Passwords to Avoid”. Unix Security Workshop II.
  8. (1985). Password Usage”. Federal Information Processing Standards Publication.
  9. (1992). Restating the foundation of information security”
  10. (1987). Security for Computer Networks”.
  11. (1995). Social Engineering: Techniques and Prevention”. Computer Security,

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.