Security and human computer interfaces, vol.22, pp.675-684, 2003. ,
Usability versus complexity-striking the balance in end-user security, Network Security, pp.13-17, 2010. ,
, Towards Usable Privacy Enhancing Technologies: Lessons Learned from the PrimeLife Project, 2011.
, Enisa report: PETs controls matrix A systematic approach for assessing online and mobile privacy tools, 2016.
, Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0, USENIX Security Symposium, 1999.
User perceptions of security, convenience and usability for ebanking authentication tokens, Computers & Security, vol.28, issue.1, pp.47-62, 2009. ,
Investigating factors affecting the adoption of anti-spyware systems, Communications of the ACM, vol.48, issue.8, pp.72-77, 2005. ,
Usability engineering, 1994. ,
Integrating security and usability into the requirements and design process, Electronic Security and Digital Forensics, vol.1, issue.1, pp.12-26, 2007. ,
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service, Information systems journal, vol.24, issue.1, pp.61-84, 2014. ,
They brought in the horrible key ring thing!"Analysing the Usability of Two-Factor Authentication in UK Online Banking, NDSS Workshop on Usable Security (USEC, 2015. ,
Usability of anonymous web browsing: an examination of tor interfaces and deployability, Symposium on Usable Privacy & Security, pp.41-51, 2007. ,
Better together: Usability and security go hand in hand, IEEE Security & Privacy, vol.12, issue.6, pp.89-93, 2014. ,
Aligning security and usability, Nielsen J.:10 Usability Heuristics for User Interface Design, vol.2, p.15, 2004. ,
Usability measurement and metrics: A consolidated model, Software Quality Journal, vol.14, issue.2, pp.159-178, 2006. ,
Deciding between information security and usability: Developing value based objectives, Computers in Human Behavior, 2016. ,
, Ergonomic requirements for office work with visual display terminals, Guidance on usability, vol.11, pp.9241-9252, 1998.
The psychology of security for the home computer user, IEEE Symposium on Security and Privacy, pp.209-223, 2012. ,