Journals in DBLP
Clare-Marie Karat , John Karat , Carolyn Brodie Why HCI research in privacy and security is critical now. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:1-4 [Journal ] Rogério de Paula , Xianghua Ding , Paul Dourish , Kari Nies , Ben Pillet , David F. Redmiles , Jie Ren , Jennifer Ann Rode , Luiz Roberto Silva Filho In the eye of the beholder: A visualization-based approach to information system security. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:5-24 [Journal ] Roy A. Maxion , Robert W. Reeder Improving user-interface dependability through mitigation of human error. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:25-50 [Journal ] Volker Roth , Tobias Straub , Kai Richter Security and usability engineering with particular attention to electronic mail. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:51-73 [Journal ] Bruce Beckles , Von Welch , Jim Basney Mechanisms for increasing the usability of grid security. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:74-101 [Journal ] Susan Wiedenbeck , Jim Waters , Jean-Camille Birget , Alex Brodskiy , Nasir Memon PassPoints: Design and longitudinal evaluation of a graphical password system. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:102-127 [Journal ] Antonella De Angeli , Lynne M. Coventry , Graham Johnson , Karen Renaud Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:128-152 [Journal ] John Karat , Clare-Marie Karat , Carolyn Brodie , Jinjuan Feng Privacy in information technology: Designing to enable privacy policy management in organizations. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:153-174 [Journal ] Anne Adams , Ann Blandford Bridging the gap between organizational and user perspectives of security in the clinical domain. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:175-202 [Journal ] Carlos Jensen , Colin Potts , Christian Jensen Privacy practices of Internet users: Self-reports versus observed behavior. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:203-227 [Journal ] Blaine A. Price , Karim Adam , Bashar Nuseibeh Keeping ubiquitous computing to yourself: A practical model for user control of privacy. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:228-253 [Journal ] Linda Little , Pamela Briggs , Lynne Coventry Public space systems: Designing for privacy? [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:254-268 [Journal ]