M. S. Ackerman, L. F. Cranor, and J. And-reagle, Privacy in e-commerce, Proceedings of the 1st ACM conference on Electronic commerce , EC '99, pp.1-8, 1999.
DOI : 10.1145/336992.336995

A. Acquisiti and J. Grossklags, Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.26-33, 2005.
DOI : 10.1109/MSP.2005.22

A. Adams and M. A. Sasse, Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999.
DOI : 10.1145/322796.322806

D. Avrahami, J. Fogarty, H. , and S. E. , Biases in human estimation of interruptibility, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.50-60, 2007.
DOI : 10.1145/1240624.1240632

A. Bunt, C. Conati, and J. Mcgrenere, Supporting interface customization using a mixed-initiative approach, Proceedings of the 12th international conference on Intelligent user interfaces , IUI '07, pp.2007-92, 2007.
DOI : 10.1145/1216295.1216317

R. Dhamija, J. D. Tygar, and M. Hearst, Why phishing works, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06, pp.2006-581, 2006.
DOI : 10.1145/1124772.1124861

P. Dourish and K. Anderson, Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-computer Interaction, pp.319-342, 2006.
DOI : 10.1207/s15327051hci2103_2

P. Dourish, R. Grinter, J. Delgado-de-la-flor, J. , and M. , Security in the wild: user strategies for managing security as an everyday, practical problem, Personal and Ubiquitous Computing, vol.36, issue.7, pp.391-401, 2004.
DOI : 10.1002/0470848693

S. Flinn and J. Lumsden, User Perceptions of Privacy and Security on the Web, p.2005, 2005.

B. Friedman, D. Hurley, D. C. Howe, E. Felten, and H. Nissenbaum, Users' conceptions of web security, CHI '02 extended abstracts on Human factors in computing systems , CHI '02, pp.746-747, 2002.
DOI : 10.1145/506443.506577

D. Hart, Attitudes and Practices of Students towards Password Security, J. Comput. Small Coll, vol.23, issue.5, pp.169-174, 2008.

T. Kindberg, E. O-'neill, C. Bevan, V. Kostakos, S. Fraser et al., Measuring trust in wi-fi hotspots, Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems , CHI '08, pp.173-182, 2008.
DOI : 10.1145/1357054.1357084

T. Kindberg, A. Sellen, and E. Geelhoed, Security and Trust in Mobile Interactions: A Study of Users??? Perceptions and Reasoning, UbiComp 2004, pp.196-213, 2004.
DOI : 10.1007/978-3-540-30119-6_12

P. Klasnja, S. Consolvo, J. Jung, B. M. Greenstein, L. Legrand et al., "When I am on Wi-Fi, I am fearless", Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, p.2009, 1993.
DOI : 10.1145/1518701.1519004

B. Kowitz and L. Cranor, Peripheral privacy notifications for wireless networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.90-96, 2005.
DOI : 10.1145/1102199.1102217

URL : http://lorrie.cranor.org/pubs/wpes05.pdf

M. W. Marlinspike, Null Prefix Attacks against SSL http://www.thoughtcrime.org/papers/null-prefix-attacks.pdf 17 Talc: Using Desktop Graffiti to Fight Software Vulnerability, TLS Certificates, pp.2008-1055, 2008.

D. J. Solove, 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy, San Diego Law Review, vol.44, p.998565, 2007.

A. Viseu, A. Clement, and J. , Situating Privacy Online, Information, Communication & Society, vol.7, issue.1, pp.92-114, 2004.
DOI : 10.2307/3481326

M. Wu, R. C. Miller, and S. L. Garfinkel, Do Security Toolbars Prevent Phishing Attacks? In: CHI, pp.601-610, 2006.
DOI : 10.1145/1124772.1124863

URL : http://cs.union.edu/~cassa/courses/Fall2007/SRS200/papers/SecurityToolbars.pdf