Purposes and scope of warnings: Handbook of warnings. Human Factors and Ergonomics. First edn, pp.3-9, 2006. ,
Decision strategies and susceptibility to phishing, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.79-90, 2006. ,
DOI : 10.1145/1143120.1143131
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.8084
You " ve been warned: an empirical study of the effectiveness of web browser phishing warnings, Proceedings of the 2008 Conference on Human Factors in Computing Systems (CHI), ACM, pp.1065-1074, 2008. ,
Crying wolf: An empirical study of ssl warning effectiveness, Proceedings of the 18th Usenix Security Symposium, Usenix Security Symposium, 2009. ,
The emperor " s new security indicators, SP " 07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp.51-65, 2007. ,
DOI : 10.1109/sp.2007.35
Mental models of privacy and security. Technology and Society Magazine, IEEE, vol.28, issue.3, pp.37-46, 2009. ,
Responses to dynamic warnings: Handbook of warnings. Human Factors and Ergonomics. First edn, pp.221-229, 2006. ,
Do security toolbars actually prevent phishing attacks?, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06, pp.601-610, 2006. ,
DOI : 10.1145/1124772.1124863
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.7624
So long, and no thanks for the externalities, Proceedings of the 2009 workshop on New security paradigms workshop, NSPW '09, pp.133-144, 2009. ,
DOI : 10.1145/1719030.1719050
Behavioral response to phishing risk, Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on , eCrime '07, pp.37-44, 2007. ,
DOI : 10.1145/1299015.1299019
URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1044&context=isr
Do windows users follow the principle of least privilege?, Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, pp.1-13, 2010. ,
DOI : 10.1145/1837110.1837112
Communication-human information processing model: Handbook of warnings. Human Factors and Ergonomics. First edn, pp.51-61, 2006. ,
A framework for reasoning about the human in the loop, 2008. ,
Apple human interface guidelines, 2010. ,
Gnome human interface guidelines 2.2.1. Online document available at http://library.gnome.org (2010) Last visit on, 2010. ,
Trust me: Design Patterns for Constructing Trustworthy Trust Indicators, 2009. ,
Users and trust: a microsoft case study Security and Usability: Designing secure systems that people can use. Theory in practice, pp.589-606, 2005. ,
Firefox and the worry-free web Security and Usability: Designing secure systems that people can use. Theory in practice, pp.577-587, 2005. ,
Bridging the gap in computer security warnings: a mental model approach (to appear). Security and Privacy Magazine, IEEE, 2011. ,
Who are the crowdworkers?, Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems, CHI EA '10, pp.2863-2872, 2010. ,
DOI : 10.1145/1753846.1753873