Back to Results
First PageMeta Content
Data security / System administration / Password / Computer security / Usability / Su / Information security / Security / Crime prevention / National security


Agent-Based Modeling of User Circumvention of Security Position Paper Vijay Kothari Jim Blythe
Add to Reading List

Document Date: 2014-06-10 16:10:16


Open Document

File Size: 169,43 KB

Share Result on Facebook

City

Paris / /

Company

Testing Resilient Control Systems / Resilient Control Systems / /

Currency

USD / /

/

Event

Product Issues / /

IndustryTerm

Online Accounts / potential applications / security protocol / bank / security tool / investment bank / Web Password Habits / security systems / security protocols / wrong services / backup systems / /

Organization

Army Research Office / Department of Computer Science Dartmouth College Department / University of Pennsylvania / University of Southern California / MIT / Security Position Paper Vijay Kothari Jim Blythe Department / Dartmouth College / /

Person

Carson Reynolds / Youngme Moon / Rosalind W. Picard / Rosalind W Picard / Winslow Burleson / Jim Blythe / Sean W Smith / Ashish Kapoor / Shirley Gaw / Richard Hazlett / Horst Rittel / Serge Egelman / Sean Smith / Stuart Schechter / Mike Wonham / Marc Spraragen / Melvin Webber / Shannon Riley / Edward W Felten / Martina Angela Sasse / Masahiro Mori / Andy Ozment / Ross Koppel / Anne Adams / Stuart E Schechter / Ian Fischer / Rachna Dhamija / Jonathan Klein / Bernheim Brush / /

Position

BDI reactive planner / author / infosec officer / designer / security officer / Emperor / General / officer / /

Product

mental models / /

ProvinceOrState

Southern California / /

PublishedMedium

Communications of the ACM / /

Region

Southern California / /

Technology

security protocol / detailed security protocols / security protocols / simulation / anti-virus software / /

URL

http /

SocialTag