Privacy in e-commerce, Proceedings of the 1st ACM conference on Electronic commerce , EC '99, pp.1-8, 1999. ,
DOI : 10.1145/336992.336995
Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.26-33, 2005. ,
DOI : 10.1109/MSP.2005.22
Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999. ,
DOI : 10.1145/322796.322806
Biases in human estimation of interruptibility, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.50-60, 2007. ,
DOI : 10.1145/1240624.1240632
Supporting interface customization using a mixed-initiative approach, Proceedings of the 12th international conference on Intelligent user interfaces , IUI '07, pp.2007-92, 2007. ,
DOI : 10.1145/1216295.1216317
Why phishing works, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06, pp.2006-581, 2006. ,
DOI : 10.1145/1124772.1124861
Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-computer Interaction, pp.319-342, 2006. ,
DOI : 10.1207/s15327051hci2103_2
Security in the wild: user strategies for managing security as an everyday, practical problem, Personal and Ubiquitous Computing, vol.36, issue.7, pp.391-401, 2004. ,
DOI : 10.1002/0470848693
User Perceptions of Privacy and Security on the Web, p.2005, 2005. ,
Users' conceptions of web security, CHI '02 extended abstracts on Human factors in computing systems , CHI '02, pp.746-747, 2002. ,
DOI : 10.1145/506443.506577
Attitudes and Practices of Students towards Password Security, J. Comput. Small Coll, vol.23, issue.5, pp.169-174, 2008. ,
Measuring trust in wi-fi hotspots, Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems , CHI '08, pp.173-182, 2008. ,
DOI : 10.1145/1357054.1357084
Security and Trust in Mobile Interactions: A Study of Users??? Perceptions and Reasoning, UbiComp 2004, pp.196-213, 2004. ,
DOI : 10.1007/978-3-540-30119-6_12
"When I am on Wi-Fi, I am fearless", Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, p.2009, 1993. ,
DOI : 10.1145/1518701.1519004
Peripheral privacy notifications for wireless networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.90-96, 2005. ,
DOI : 10.1145/1102199.1102217
URL : http://lorrie.cranor.org/pubs/wpes05.pdf
Null Prefix Attacks against SSL http://www.thoughtcrime.org/papers/null-prefix-attacks.pdf 17 Talc: Using Desktop Graffiti to Fight Software Vulnerability, TLS Certificates, pp.2008-1055, 2008. ,
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy, San Diego Law Review, vol.44, p.998565, 2007. ,
Situating Privacy Online, Information, Communication & Society, vol.7, issue.1, pp.92-114, 2004. ,
DOI : 10.2307/3481326
Do Security Toolbars Prevent Phishing Attacks? In: CHI, pp.601-610, 2006. ,
DOI : 10.1145/1124772.1124863
URL : http://cs.union.edu/~cassa/courses/Fall2007/SRS200/papers/SecurityToolbars.pdf