T. S. Amer and J. B. Maris, Signal words and signal icons in application control and information technology, Journal of Information Systems, vol.21, 2006.
DOI : 10.2308/jis.2007.21.2.1

R. Biddle, P. C. Van-oorschot, A. S. Patrick, J. Sobey, and T. Whalen, Browser interfaces and extended validation SSL certificates, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, 2009.
DOI : 10.1145/1655008.1655012

C. Forum, Extended validation ssl certificates

S. Egelman, L. F. Cranor, and J. Hong, You've been warned, Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems , CHI '08, pp.1065-1074, 2008.
DOI : 10.1145/1357054.1357219

S. Gibson and L. Laporte, Security now episode 277, 2011.

J. Grimes, On the failure to detect changes in scenes across saccades, Perception, vol.2, pp.89-110, 1996.

J. R. Lewis, IBM computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use, International Journal of Human-Computer Interaction, vol.7, issue.1, pp.57-78, 1995.
DOI : 10.1145/122672.122692

URL : http://drjim.0catch.com/usabqtr.pdf

B. Morton, SSLPersonas -SSL blog -Entrust insights. http://ssl.entrust.net/blog/?p=321 Visited 03, 2011.

T. Roessler and A. Saldhana, Web security context: User interface guidelines, 2009.

A. Whitten and J. D. Tygar, Why johnny can't encrypt: A usability evaluation of PGP 5.0, Proc. USENIX '99, pp.169-184, 1999.

M. Wu, R. C. Miller, and S. L. Garfinkel, Do security toolbars actually prevent phishing attacks?, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06, pp.601-610, 2006.
DOI : 10.1145/1124772.1124863

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=