(A sub-section of the NoteIndex)
This page lists the references that will be in our actual Note. The list here should be a subset of the references in our SharedBookmarks.
References
Note User Test Verification references:
- Why Phishing Works, Rachna Dhamija, J.D. Tygar, Marti Hearst
- Do Security Toolbars Actually Prevent Phishing Attacks? by Wu, Miller and Garfinkel
- What Do They Indicate? Evaluating Security and Privacy Indicators, Lorrie Faith Cranor
- Alma Whitten and J. D. Tygar, “Safe Security Staging”, CHI 2003 Workshop on Human-Computer Interaction and Security Systems, Ft. Lauderdale, Florida.
- Why Johnny can't encrypt, Alma Whitten and John D Tygar
- "Humane Interface, The: New Directions for Designing Interactive Systems", Chapter 2-3, by Jef Raskin
Note Design Principles references:
- Andrew S. Patrick, Pamela Briggs, and Stephen Marsh, "Designing Systems That People Will Trust", Security and Usability: Designing Secure Systems that People Can Use, ed. Lorrie Faith Cranor and Simson Garfinkel.
- Mary Ellen Zurko, Charlie Kaufman, Katherine Spanbauer, Chuck Bassett, Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision, Proceedings of 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2002.
- Ten Usability Heuristics, by Jacob Nielsen
- The {Design, Psychology, Psychopathology} of Everyday Things, Don Norman. Chapter 1. (subsection on the average user)
- Julie Downs, Mandy Holbrook, Lorrie Faith Cranor, "Decision Strategies and Susceptibility to Phishing"
- Why Phishing Works, Rachna Dhamija, J.D. Tygar, Marti Hearst
- Gathering Evidence: Use of Visual Security Cues in Web Browsers, Tara Whalen and Kori M. Inkpen
- Do Security Toolbars Actually Prevent Phishing Attacks? by Wu, Miller and Garfinkel