Quantcast
Channel: CPS-VO - Science of Human Circumvention of Security
Browsing all 32 articles
Browse latest View live

Science of Human Circumvention of Security

View Article



Agent-based Modeling of User Circumvention of Security

Kothari, Vijay, Blythe, Jim, Smith, Sean, Koppel, Ross.  2014.  Agent-based Modeling of User Circumvention of Security. Proceedings of the 1st International Workshop on Agents and CyberSecurity. :5:1–5:4.

View Article

smith_sos_2016_final.pdf

License:  Creative Commons 2.5

View Article

koppel_sos_2016_final.pdf

License:  Creative Commons 2.5

View Article

Agent-Based_Modeling_of_User_Circumvention_of_Security.pdf

License:  Creative Commons 2.5

View Article


Circumvention of Security: Good Users Do Bad Things

Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania, Sean Smith, Dartmouth College.  2013.  Circumvention of Security: Good Users Do Bad Things.

View Article

Circumvention_of_Security_Good_Users_Do_Bad_Things.pdf

License:  Creative Commons 2.5

View Article

“Beyond Pleading With or Restricting Users to Achieve Cyber Security Goals:...

Ross Koppel, University of Pennsylvania, Vijay Kothari, Dartmouth College, Sean W. Smith, Darthmouth College, Jim Blythe, University of Southern California.  2016.  “Beyond Pleading With or Restricting...

View Article


Beyond_Pleading_With_or_Restricting_Users_to_Achieve_Cyber_Security_Goals_App...

License:  Creative Commons 2.5

View Article


Flawed_Mental_Models_Lead_to_Bad_Cyber_Security_Decisions_Lets_Do_a_Better_Jo...

License:  Creative Commons 2.5

View Article

Flawed Mental Models Lead to Bad Cyber Security Decisions: Let’s Do a Better Job

Sean W. Smith, Dartmouth College, Vijay Kothari, Dartmouth College, Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania.  2016.  Flawed Mental Models Lead to Bad...

View Article

Ethnography of Computer Security Evasions in Healthcare Settings:...

Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania, Vijay Kothari, Dartmouth College, Sean W. Smith, Dartmouth College.  2014.  Ethnography of Computer Security...

View Article

Workarounds to Computer Access in Healthcare Organizations: You Want My...

Ross Koppel, University of Pennsylvania, Sean W. Smith, Dartmouth College, Jim Blythe, University of Southern California, Vijay Kothari, Dartmouth College.  2015.  Workarounds to Computer Access in...

View Article


Workarounds_to_Comuputer_Access_in_Healthcare_Organizations_You_Want_My_Passw...

License:  Creative Commons 2.5

View Article

Workarounds to Computer Access in Healthcare Organizations: You Want My...

Ross Koppel, University of Pennsylvania, Sean W. Smith, Dartmouth College, Jim Blythe, University of Southern California, Vijay Kothari, Dartmouth College.  2015.  Workarounds to Computer Access in...

View Article


Jim_Blythe_HoTSoS_Poster.pdf

License:  Creative Commons 2.5

View Article

FARM: Finding the Appropriate level of Realism for Modeling

Jim Blythe, University of Southern California, Sean Smith, Dartmouth College, Ross Koppel, University of Pennsylvania, Christopher Novak, Dartmouth College, Vijay Kothari, Dartmouth College.  2017....

View Article


Towards Privacy-Preserving Mobile Apps: A Balancing Act

Dengfeng Li, University of Illinois at Urbana-Champaign, Wing Lam, University of Illinois at Urbana-Champaign, Wei Yang, University of Illinois at Urbana-Champaign, Zhengkai Wu, University of Illinois...

View Article

Tao_Xie_HoTSoS_Poster.pdf

License:  Creative Commons 2.5

View Article

Analysis of Two Parallel Surveys on Cybersecurity: Users and Security...

Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania, Sean Smith, Dartmouth College, Vijay Kothari, Dartmouth College.  2017.  Analysis of Two Parallel Surveys on...

View Article
Browsing all 32 articles
Browse latest View live




Latest Images