Team for Research in
Ubiquitous Secure Technology

Predicted and Observed User Behavior in the Weakest-Link Security Game

Citation
"Predicted and Observed User Behavior in the Weakest-Link Security Game". J. Grossklags, N. Christin, J. Chuang (eds.), Proceedings of the 2008 USENIX Workshop on Usability, Psychology, and Security, April, 2008.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
     <a
    href="http://www.truststc.org/pubs/567.html"
    ><i>Predicted and Observed User Behavior in the
    Weakest-Link Security Game</i></a>, J.
    Grossklags, N. Christin, J. Chuang (eds.), Proceedings of
    the 2008 USENIX Workshop on Usability, Psychology, and
    Security, April, 2008.
  • Plain text
     "Predicted and Observed User Behavior in the
    Weakest-Link Security Game". J. Grossklags, N.
    Christin, J. Chuang (eds.), Proceedings of the 2008 USENIX
    Workshop on Usability, Psychology, and Security, April, 2008.
  • BibTeX
    @proceedings{GrossklagsChristinChuang08_PredictedObservedUserBehaviorInWeakestLinkSecurityGame,
        title = {Predicted and Observed User Behavior in the
                  Weakest-Link Security Game},
        editor = {J. Grossklags, N. Christin, J. Chuang},
        organization = {Proceedings of the 2008 USENIX Workshop on
                  Usability, Psychology, and Security},
        month = {April},
        year = {2008},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/567.html}
    }
    

Posted by Jessica Gamble on 20 Feb 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.