Difference between revisions of "Usability/Human Factors"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 1: Line 1:
 
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Usability/Human Factors]]''
 
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Usability/Human Factors]]''
 
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
 
  
 
Moore, Tyler and Clayton, Richard  (2007) [[Examining the Impact of Website Take-down on Phishing]]
 
Moore, Tyler and Clayton, Richard  (2007) [[Examining the Impact of Website Take-down on Phishing]]
Line 14: Line 12:
 
! style="background-color: #efefef;" | Expertise
 
! style="background-color: #efefef;" | Expertise
 
! style="background-color: #efefef;" class="unsortable" | Full Text   
 
! style="background-color: #efefef;" class="unsortable" | Full Text   
 +
|-
 +
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
 
|-
 
|-
 
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
 
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']

Revision as of 16:13, 11 August 2010

TOC-> Issues->Usability/Human Factors

Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing

Author 1 Author 2 Year Title Source Expertise Full Text
Computing Research Association 2003 Four Grand Challenges in Trustworthy Computing Independent Reports None Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
Schneier, Bruce 2003 Beyond Fear Book None Scribd
Schneier, Bruce 2008 Schneier on Security Book None Purchase
United States Secret Service 2004 Insider Threat Study Government Report None Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
Zittrain, Jonathan L. 2008 The Future of the Internet and How To Stop It Book None Pdf
  • Subcategories: None

Jump to Table of Contents