Academic literature on the topic 'Usable security and privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Usable security and privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Usable security and privacy"
Fischer-Hübner, Simone, Luigi Lo Iacono, and Sebastian Möller. "Usable Security und Privacy." Datenschutz und Datensicherheit - DuD 34, no. 11 (November 2010): 773–82. http://dx.doi.org/10.1007/s11623-010-0210-4.
Full textAlt, Florian, and Emanuel von Zezschwitz. "Emerging Trends in Usable Security and Privacy." i-com 18, no. 3 (November 18, 2019): 189–95. http://dx.doi.org/10.1515/icom-2019-0019.
Full textChiasson, Sonia, Heather Crawford, Serge Egelman, and Pourang Irani. "Reflections on U-PriSM 2." International Journal of Mobile Human Computer Interaction 6, no. 2 (April 2014): 73–78. http://dx.doi.org/10.4018/ijmhci.2014040106.
Full textAlemerien, Khalid. "Usable Security and Privacy on Online Social Networks." International Journal of Software Innovation 9, no. 2 (April 2021): 35–68. http://dx.doi.org/10.4018/ijsi.2021040103.
Full textKarat, Clare-Marie, Carolyn Brodie, and John Karat. "Usable privacy and security for personal information management." Communications of the ACM 49, no. 1 (January 2006): 56–57. http://dx.doi.org/10.1145/1107458.1107491.
Full textShay, Rich. "CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)." XRDS: Crossroads, The ACM Magazine for Students 20, no. 1 (September 2013): 62–63. http://dx.doi.org/10.1145/2508976.
Full textFaraz, Syed Hassan, Syed Hassan Tanvir, and Saqib Saeed. "A Study on Privacy and Security Aspects of Facebook." International Journal of Technology Diffusion 3, no. 4 (October 2012): 48–55. http://dx.doi.org/10.4018/jtd.2012100105.
Full textPapoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (February 4, 2021): 1396. http://dx.doi.org/10.3390/app11041396.
Full textDistler, Verena, Matthias Fassl, Hana Habib, Katharina Krombholz, Gabriele Lenzini, Carine Lallemand, Lorrie Faith Cranor, and Vincent Koenig. "A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research." ACM Transactions on Computer-Human Interaction 28, no. 6 (December 31, 2021): 1–50. http://dx.doi.org/10.1145/3469845.
Full textDas, Sauvik. "Computer scientists in action: Sauvik Das, usable security & privacy." XRDS: Crossroads, The ACM Magazine for Students 25, no. 1 (October 2018): 61–62. http://dx.doi.org/10.1145/3265929.
Full textDissertations / Theses on the topic "Usable security and privacy"
Vaziripour, Elham. "Usable Security and Privacy for Secure Messaging Applications." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/8830.
Full textVega, Laurian. "Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physicians' Offices." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37552.
Full textPh. D.
Angulo, Julio. "Usable privacy for digital transactions : Exploring the usability aspects of three privacy enhancing mechanisms." Licentiate thesis, Karlstads universitet, Avdelningen för informatik och projektledning, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-14832.
Full textWu, Justin Chun Wah. "Resolving the Privacy Paradox: Bridging the Behavioral Intention Gap with Risk Communication Theory." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8702.
Full textDas, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.
Full textGrunwell, Daniel K. "Designing and implementing an information accountability framework for usable and useful eHealth systems." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/103323/1/Daniel%20Grunwell%20Thesis.pdf.
Full textGamagedara, Arachchilage Nalin Asanka. "Security awareness of computer users : a game based learning approach." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/7620.
Full textGalanská, Katarína. "Relevance pokynů pro použitelnou bezpečnost z pohledu IT profesionála." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445558.
Full textRahman, Md Mizanur. "Search Rank Fraud Prevention in Online Systems." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3909.
Full textSunkaralakunta, Venkatarama Reddy Rakesh. "A User-Centric Security Policy Enforcement Framework for Hybrid Mobile Applications." University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1564744609523447.
Full textBooks on the topic "Usable security and privacy"
Abraham, Ajith. Computational Social Networks: Security and Privacy. London: Springer London, 2012.
Find full textGarfinkel, Simson, and Heather Richter Lipford. Usable Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-02343-9.
Full textAnalyzing and securing social networks. Boca Raton: Taylor & Francis Group, 2016.
Find full textStănică, Pantelimon, Sugata Gangopadhyay, and Sumit Kumar Debnath, eds. Security and Privacy. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6781-4.
Full textStănică, Pantelimon, Sihem Mesnager, and Sumit Kumar Debnath, eds. Security and Privacy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90553-8.
Full textNandi, Sukumar, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, and Parvez Faruki, eds. Security and Privacy. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7561-3.
Full textStalla-Bourdillon, Sophie, Joshua Phillips, and Mark D. Ryan. Privacy vs. Security. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9.
Full textInstitute, Pennsylvania Bar. Privacy and security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2006.
Find full textMather, Tim. Cloud security and privacy. Beijing: O'Reilly, 2009.
Find full textKierkegaard, Sylvia Mercado. Cyberlaw, security and privacy. Ankara, Turkey: Ankara Bar Association Press, 2007.
Find full textBook chapters on the topic "Usable security and privacy"
Christin, Delphine, Franziska Engelmann, and Matthias Hollick. "Usable Privacy for Mobile Sensing Applications." In Information Security Theory and Practice. Securing the Internet of Things, 92–107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43826-8_7.
Full textNaqvi, Bilal, and Jari Porras. "Usable Security by Design: A Pattern Approach." In HCI for Cybersecurity, Privacy and Trust, 609–18. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3_41.
Full textTorres, Christof Ferreira, Hugo Jonker, and Sjouke Mauw. "FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting." In Computer Security -- ESORICS 2015, 3–19. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24177-7_1.
Full textCarrión, Inma, Jose L. Fernández-Alemán, and Ambrosio Toval. "Usable Privacy and Security in Personal Health Records." In Human-Computer Interaction – INTERACT 2011, 36–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23768-3_3.
Full textSeamons, Kent. "Privacy-Enhancing Technologies." In Modern Socio-Technical Perspectives on Privacy, 149–70. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82786-1_8.
Full textHochleitner, Christina, Cornelia Graf, Peter Wolkerstorfer, and Manfred Tscheligi. "uTRUSTit – Usable Trust in the Internet of Things." In Trust, Privacy and Security in Digital Business, 220–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32287-7_22.
Full textKarat, Clare-Marie, and John Karat. "Case Study 3: Security and Privacy Policy Management Technologies." In Designing and Evaluating Usable Technology in Industrial Research, 57–79. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-02190-9_4.
Full textBelk, Marios, Christos Fidas, Panagiotis Germanakos, and George Samaras. "On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security." In Lecture Notes in Computer Science, 3–10. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07620-1_1.
Full textFranz, Elke, and Katja Liesebach. "Supporting Local Aliases as Usable Presentation of Secure Pseudonyms." In Trust, Privacy and Security in Digital Business, 22–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03748-1_3.
Full textFeth, Denis, Andreas Maier, and Svenja Polst. "A User-Centered Model for Usable Security and Privacy." In Human Aspects of Information Security, Privacy and Trust, 74–89. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_6.
Full textConference papers on the topic "Usable security and privacy"
Paturi, Anand, Patrick Kelley, and Subhasish Mazumdar. "Introducing Privacy Threats from Ad Libraries to Android Users Through Privacy Granules." In Workshop on Usable Security. Reston, VA: Internet Society, 2015. http://dx.doi.org/10.14722/usec.2015.23008.
Full textPoikela, Maija, and Sebastian Mller. "The Role of Privacy Violations in Privacy Calculus." In European Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/eurousec.2018.23015.
Full textKrombholz, Katharina, Adrian Dabrowski, Matthew Smith, and Edgar Weippl. "Exploring Design Directions for Wearable Privacy." In Workshop on Usable Security. Reston, VA: Internet Society, 2017. http://dx.doi.org/10.14722/usec.2017.23001.
Full textMinkus, Tehila, and Nasir Memon. "On a Scale from 1 to 10, How Private Are You? Scoring Facebook Privacy Settings." In Workshop on Usable Security. Reston, VA: Internet Society, 2014. http://dx.doi.org/10.14722/usec.2014.23013.
Full textRashidi, Yasmeen, Kami Vaniea, and L. Jean Camp. "Understanding Saudis' Privacy Concerns When Using WhatsApp." In Workshop on Usable Security. Reston, VA: Internet Society, 2016. http://dx.doi.org/10.14722/usec.2016.23022.
Full textBrodie, Carolyn, Clare-Marie Karat, John Karat, and Jinjuan Feng. "Usable security and privacy." In the 2005 symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1073001.1073005.
Full textKumar Murukannaiah, Pradeep, Jessica Staddon, Heather Lipford, and Bart Knijnenburg. "(Work in Progress) Is this a privacy incident? Using News Exemplars to Study End User Perceptions of Privacy Incidents." In Workshop on Usable Security. Reston, VA: Internet Society, 2017. http://dx.doi.org/10.14722/usec.2017.23030.
Full textKulyk, Oksana, Paul Gerber, Karola Marky, Christopher Beckmann, and Melanie Volkamer. "Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users." In Workshop on Usable Security. Reston, VA: Internet Society, 2019. http://dx.doi.org/10.14722/usec.2019.23029.
Full textRaber, Frederic, David Ziemann, and Antonio Krueger. "The 'Retailio' Privacy Wizard: Assisting Users with Privacy Settings for Intelligent Retail Stores." In European Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/eurousec.2018.23001.
Full textAlqhatani, Abdulmajeed, and Heather Lipford. "Exploring Parents’ Security and Privacy Concerns and Practices." In Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/usec.2018.23019.
Full textReports on the topic "Usable security and privacy"
Weinberger, P., C. Callan, W. Dally, A. Peterson, and W. Press. Security and Privacy in the NII,. Fort Belvoir, VA: Defense Technical Information Center, February 1995. http://dx.doi.org/10.21236/ada293475.
Full textElkins, M. MIME Security with Pretty Good Privacy (PGP). RFC Editor, October 1996. http://dx.doi.org/10.17487/rfc2015.
Full textSmith, S. W., and J. D. Tygar. Security and Privacy for Partial Order Time. Fort Belvoir, VA: Defense Technical Information Center, April 1994. http://dx.doi.org/10.21236/ada278953.
Full textCooper, A., F. Gont, and D. Thaler. Security and Privacy Considerations for IPv6 Address Generation Mechanisms. RFC Editor, March 2016. http://dx.doi.org/10.17487/rfc7721.
Full textGilbert, Dennis M. 1989 Computer Security and Privacy Plans (CSSP) review project:. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4409.
Full textJansen, W., and T. Grance. Guidelines on security and privacy in public cloud computing. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-144.
Full textHaney, Julie M., Susanne M. Furman, and Yasemin Acar. Research Report: User Perceptions of Smart Home Privacy and Security. National Institute of Standards and Technology, November 2020. http://dx.doi.org/10.6028/nist.ir.8330.
Full textHuitema, C., and D. Kaiser. DNS-Based Service Discovery (DNS-SD) Privacy and Security Requirements. RFC Editor, September 2020. http://dx.doi.org/10.17487/rfc8882.
Full textMehta, Ketan. Security and Privacy Considerations for Implementing Mobile Driving License (mDL). Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8440.
Full textFainman, Y. Quantum and Classical Cryptography for Security and Privacy of Photonic Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada388577.
Full text