![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
STAST 2014: Vienna, Austria
- Giampaolo Bella, Gabriele Lenzini:
2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7901-1
Security Ceremonies and Policies
- Debora Jeske, Lynne M. Coventry, Pamela Briggs:
Decision Justifications for Wireless Network Selection. 1-7 - Oliver Buckley
, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. 8-15 - Taciane Martimiano, Jean Everson Martina, Maina M. Olembo, Marcelo Carlomagno Carlos:
Modelling User Devices in Security Ceremonies. 16-23
Security and Human Behaviour
- Sven Uebelacker
, Susanne Quiel:
The Social Engineering Personality Framework. 24-30 - Jaap Boender, Marieta Georgieva Ivanova, Florian Kammüller, Giuseppe Primiero
:
Modeling Human Behaviour with Higher Order Logic: Insider Threats. 31-39
Socio-technical Security
- Sven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen:
What You Enter Is What You Sign: Input Integrity in an Online Banking Environment. 40-47 - Lydia Kraus, Ina Wechsung, Sebastian Möller:
Using Statistical Information to Communicate Android Permission Risks to Users. 48-55
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.