61
TITLE: Do graphical cues effectively inform users? A socio-technical security study in accessing wifi networks. A Socio-Technical Security Study in Accessing Wifi Networks
AUTHORS: Ferreira, A ; Huynen, JL; Koenig, V; Lenzini, G; Rivas, S;
PUBLISHED: 2015, SOURCE: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015 Held as Part of 17th International Conference on Human-Computer Interaction, HCI International 2015 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 9190
INDEXED IN: Scopus CrossRef: 4
IN MY: ORCID
62
TITLE: In Cyber-Space No One Can Hear You S.CREAM A Root Cause Analysis for Socio-Technical Security
AUTHORS: Ana Ferreira ; Jean Louis Huynen; Vincent Koenig; Gabriele Lenzini;
PUBLISHED: 2015, SOURCE: 11th International Workshop on Security and Trust Management (STM) in SECURITY AND TRUST MANAGEMENT (STM 2015), VOLUME: 9331
INDEXED IN: Scopus WOS CrossRef: 1
IN MY: ORCID
63
TITLE: Principles of persuasion in social engineering and their use in phishing
AUTHORS: Ferreira, A ; Coventry, L; Lenzini, G;
PUBLISHED: 2015, SOURCE: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015 Held as Part of 17th International Conference on Human-Computer Interaction, HCI International 2015 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 9190
INDEXED IN: Scopus CrossRef: 49
IN MY: ORCID
64
TITLE: A conceptual framework to study socio-technical security
AUTHORS: Ferreira, A ; Huynen, JL; Koenig, V; Lenzini, G;
PUBLISHED: 2014, SOURCE: 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 8533 LNCS
INDEXED IN: Scopus CrossRef: 10
IN MY: ORCID
65
TITLE: Envisioning secure and usable access control for patients
AUTHORS: Ana Ferreira ; Gabriele Lenzini; Cátia Santos Pereira ; Alexandre B Augusto; Manuel Eduardo Correia ;
PUBLISHED: 2014, SOURCE: SeGAH
INDEXED IN: Scopus DBLP CrossRef: 6
IN MY: ORCID
66
TITLE: Socio-technical security analysis of wireless hotspots
AUTHORS: Ferreira, A ; Huynen, JL; Koenig, V; Lenzini, G;
PUBLISHED: 2014, SOURCE: 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 8533 LNCS
INDEXED IN: Scopus CrossRef: 8
IN MY: ORCID
67
TITLE: Analysis of the quality of hospital information systems audit trails  Full Text
AUTHORS: Cruz Correia, R ; Boldt, I; Lapao, L ; Santos Pereira, C; Rodrigues, PP ; Ferreira, AM ; Freitas, A ;
PUBLISHED: 2013, SOURCE: BMC MEDICAL INFORMATICS AND DECISION MAKING, VOLUME: 13, ISSUE: 1
INDEXED IN: Scopus WOS DBLP CrossRef: 18 Handle
IN MY: ORCID
68
TITLE: Log Analysis of Human Computer Interactions Regarding <i>Break The Glass</i> Accesses to Genetic Reports
AUTHORS: Ferreira, A ; Farinha, P ; Santos Pereira, C; Correia, R ; Rodrigues, PP ; Costa Pereira, A ; Orvalho, V ;
PUBLISHED: 2013, SOURCE: 15th International Conference on Enterprise Information Systems (ICEIS) in ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 3, VOLUME: 3
INDEXED IN: Scopus WOS DBLP CrossRef
IN MY: ORCID
69
TITLE: Password sharing and how to reduce it
AUTHORS: Ferreira, A ; Correia, R ; Chadwick, DW; Santos, H ; Gomes, R; Reis, D; Luis Antunes, ;
PUBLISHED: 2013, SOURCE: IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, VOLUME: 1-3
INDEXED IN: Scopus CrossRef: 2
IN MY: ORCID
70
TITLE: Socio-technical study on the effect of trust and context when choosing WiFi names
AUTHORS: Ferreira, A ; Huynen, JL; Koenig, V; Lenzini, G; Rivas, S;
PUBLISHED: 2013, SOURCE: 9th International Workshop on Security and Trust Management, STM 2013 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 8203 LNCS
INDEXED IN: Scopus CrossRef: 11
IN MY: ORCID
Page 7 of 11. Total results: 104.