Agent-based Modeling of User Circumvention of Security
Kothari, Vijay, Blythe, Jim, Smith, Sean, Koppel, Ross. 2014. Agent-based Modeling of User Circumvention of Security. Proceedings of the 1st International Workshop on Agents and CyberSecurity. :5:1–5:4.
View ArticleAgent-Based_Modeling_of_User_Circumvention_of_Security.pdf
License: Creative Commons 2.5
View ArticleCircumvention of Security: Good Users Do Bad Things
Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania, Sean Smith, Dartmouth College. 2013. Circumvention of Security: Good Users Do Bad Things.
View Article“Beyond Pleading With or Restricting Users to Achieve Cyber Security Goals:...
Ross Koppel, University of Pennsylvania, Vijay Kothari, Dartmouth College, Sean W. Smith, Darthmouth College, Jim Blythe, University of Southern California. 2016. “Beyond Pleading With or Restricting...
View ArticleBeyond_Pleading_With_or_Restricting_Users_to_Achieve_Cyber_Security_Goals_App...
License: Creative Commons 2.5
View ArticleFlawed_Mental_Models_Lead_to_Bad_Cyber_Security_Decisions_Lets_Do_a_Better_Jo...
License: Creative Commons 2.5
View ArticleFlawed Mental Models Lead to Bad Cyber Security Decisions: Let’s Do a Better Job
Sean W. Smith, Dartmouth College, Vijay Kothari, Dartmouth College, Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania. 2016. Flawed Mental Models Lead to Bad...
View ArticleEthnography of Computer Security Evasions in Healthcare Settings:...
Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania, Vijay Kothari, Dartmouth College, Sean W. Smith, Dartmouth College. 2014. Ethnography of Computer Security...
View ArticleWorkarounds to Computer Access in Healthcare Organizations: You Want My...
Ross Koppel, University of Pennsylvania, Sean W. Smith, Dartmouth College, Jim Blythe, University of Southern California, Vijay Kothari, Dartmouth College. 2015. Workarounds to Computer Access in...
View ArticleWorkarounds_to_Comuputer_Access_in_Healthcare_Organizations_You_Want_My_Passw...
License: Creative Commons 2.5
View ArticleWorkarounds to Computer Access in Healthcare Organizations: You Want My...
Ross Koppel, University of Pennsylvania, Sean W. Smith, Dartmouth College, Jim Blythe, University of Southern California, Vijay Kothari, Dartmouth College. 2015. Workarounds to Computer Access in...
View ArticleFARM: Finding the Appropriate level of Realism for Modeling
Jim Blythe, University of Southern California, Sean Smith, Dartmouth College, Ross Koppel, University of Pennsylvania, Christopher Novak, Dartmouth College, Vijay Kothari, Dartmouth College. 2017....
View ArticleTowards Privacy-Preserving Mobile Apps: A Balancing Act
Dengfeng Li, University of Illinois at Urbana-Champaign, Wing Lam, University of Illinois at Urbana-Champaign, Wei Yang, University of Illinois at Urbana-Champaign, Zhengkai Wu, University of Illinois...
View ArticleAnalysis of Two Parallel Surveys on Cybersecurity: Users and Security...
Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania, Sean Smith, Dartmouth College, Vijay Kothari, Dartmouth College. 2017. Analysis of Two Parallel Surveys on...
View Article
More Pages to Explore .....