Rational security: Modelling everyday password use
- 30 June 2012
- journal article
- Published by Elsevier BV in International Journal of Human-Computer Studies
- Vol. 70 (6), 415-431
- https://doi.org/10.1016/j.ijhcs.2012.02.008
Abstract
No abstract availableKeywords
This publication has 42 references indexed in Scilit:
- Economic Methods and Decision Making by Security ProfessionalsPublished by Springer Science and Business Media LLC ,2012
- Semantics for structured systems modelling and simulationPublished by European Alliance for Innovation n.o. ,2010
- The economics of user effort in information securityComputer Fraud & Security, 2009
- A Logical and Computational Theory of Located ResourceJournal of Logic and Computation, 2009
- Should I stay or should I go? How the human brain manages the trade-off between exploitation and explorationPhilosophical Transactions B, 2007
- When participants do the capturingPublished by Association for Computing Machinery (ACM) ,2005
- Privacy and rationality in individual decision makingIEEE Security & Privacy, 2005
- Stopping rule use during information search in design problemsOrganizational Behavior and Human Decision Processes, 2004
- Reflections of the Environment in MemoryPsychological Science, 1991
- User models: theory, method, and practiceInternational Journal of Man-Machine Studies, 1990