The SCEAS System
Navigation Menu

Journals in DBLP

International Journal of Man-Machine Studies
2005, volume: 63, number: 1-2

  1. Clare-Marie Karat, John Karat, Carolyn Brodie
    Why HCI research in privacy and security is critical now. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:1-4 [Journal]
  2. Rogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David F. Redmiles, Jie Ren, Jennifer Ann Rode, Luiz Roberto Silva Filho
    In the eye of the beholder: A visualization-based approach to information system security. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:5-24 [Journal]
  3. Roy A. Maxion, Robert W. Reeder
    Improving user-interface dependability through mitigation of human error. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:25-50 [Journal]
  4. Volker Roth, Tobias Straub, Kai Richter
    Security and usability engineering with particular attention to electronic mail. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:51-73 [Journal]
  5. Bruce Beckles, Von Welch, Jim Basney
    Mechanisms for increasing the usability of grid security. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:74-101 [Journal]
  6. Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir Memon
    PassPoints: Design and longitudinal evaluation of a graphical password system. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:102-127 [Journal]
  7. Antonella De Angeli, Lynne M. Coventry, Graham Johnson, Karen Renaud
    Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:128-152 [Journal]
  8. John Karat, Clare-Marie Karat, Carolyn Brodie, Jinjuan Feng
    Privacy in information technology: Designing to enable privacy policy management in organizations. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:153-174 [Journal]
  9. Anne Adams, Ann Blandford
    Bridging the gap between organizational and user perspectives of security in the clinical domain. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:175-202 [Journal]
  10. Carlos Jensen, Colin Potts, Christian Jensen
    Privacy practices of Internet users: Self-reports versus observed behavior. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:203-227 [Journal]
  11. Blaine A. Price, Karim Adam, Bashar Nuseibeh
    Keeping ubiquitous computing to yourself: A practical model for user control of privacy. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:228-253 [Journal]
  12. Linda Little, Pamela Briggs, Lynne Coventry
    Public space systems: Designing for privacy? [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:254-268 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002