Usability/Human Factors: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Usability/Human Factors]]'' | ''[[Table of Contents | TOC->]][[Issues | Issues->]][[Usability/Human Factors]]'' | ||
Moore, Tyler and Clayton, Richard (2007) [[Examining the Impact of Website Take-down on Phishing]] | Moore, Tyler and Clayton, Richard (2007) [[Examining the Impact of Website Take-down on Phishing]] | ||
Line 14: | Line 12: | ||
! style="background-color: #efefef;" | Expertise | ! style="background-color: #efefef;" | Expertise | ||
! style="background-color: #efefef;" class="unsortable" | Full Text | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |||
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf''] | |||
|- | |- | ||
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] | |National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] |
Revision as of 11:13, 11 August 2010
TOC-> Issues->Usability/Human Factors
Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Computing Research Association | 2003 | Four Grand Challenges in Trustworthy Computing | Independent Reports | None | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase | |
United States Secret Service | 2004 | Insider Threat Study | Government Report | None | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None | ||
Zittrain, Jonathan L. | 2008 | The Future of the Internet and How To Stop It | Book | None |
- Subcategories: None