* Ces ressources avec cet icône peut être trouvée dans la librairie de Sherloc.
Publications et portails en ligne
Adams, Anne, Martina Angela Sasse, and Peter Lunt. (1997). Making passwords secure and usable. In: People and Computers XII - Proc. of the 7th International Conference on Human-Computer Interaction (HCI'97), Springer.
Bursztein, Elie, Jonathan Aigrain, Angelika Moscicki, and John C. Mitchell. (2014). The end is nigh: Generic solving of text-based CAPTCHAs. In: Proceedings of the 8th USENIX Workshop on Offensive Technologies.
Cavusoglu Huseyin, Srinivasan Raghunathan, and Hasan Cavusoglu. (2009). Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Information Systems Research, Vol. 20(2), 198-217.
Clarke, Ronald V. (2004). 25 Techniques of Situational Crime Prevention. Presentation at Problem-Oriented Policing Conference (Charlotte, 28-30 October 2004).
Cornish, Derek B., & Clarke, R. V. G. (2003). Opportunities, precipitators, and criminal decisions: A reply to Wortley's critique of situational crime prevention. In: Martha J. Smith and Derek B. Cornish (Guest Eds.). Theory for practice in situational crime. Willan.
Cranor, Lorrie Faith and Simon L. Garfinkel. (2005). Security and Usability: Designing Secure Systems That People Can Use. O'Reilly.
Dali, Alex and Christopher Lajtha. (2012). ISO 31000 Risk Management - "The Gold Standard". EDPACS, Vol. 45(5), 1-8.
Dix, Alan, Janet Finlay, Gregory D. Abowd, and Russell Beale. (2004). Human-Computer Interaction, 3rd ed. Prentice Hall.
Eloff, M. M. and J. H. P. Eloff. (2002). Human Computer Interaction: An Information Security Perspectives. In: M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi and Heba K. Aslan. Security in the Information Society: Visions and perspectives. Springer.
Gao, Song, Manar Mohamed, Nitesh Saxena, and Chengcui Zhang. (2014). Gaming the game: defeating a game CAPTCHA with efficient and robust hybrid attacks. 2014 IEEE International Conference on Multimedia and Expo, 1-6.
Gunson, Nancy, Diarmid Marshall, Hazel Morton, and Mervyn Jack. (2011). User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Computers & Security, Vol. 30(4), 208 - 220.
ITU. (2008). Overview of cybersecurity. Recommendation ITU-T X.1205. Series X: Data Networks, Open System Communications And Security. *
Karat, Clare-Marie, John Karat, and Carolyn Brodie. (2005). Usability Design and Evaluation for Privacy and Security Solutions. In Lorrie Faith Cranor and Simon L. Garfinkel (eds), Designing Secure Systems That People Can Use. O'Reilly & Associates.
Knight, Frank. (1921). Risk, Uncertainty, and Profit. University of Chicago Press.
Lehtinen, Rick, Deborah Russell, and G. T. Gangemi Sr. (2006). Computer Security Basics . O'Reilly Media. *
Luko, Stephen N. (2013). Risk Management Terminology. Quality Engineering, Vol. 25 (3), 292-297.
Sasse, M. Angela, and Ivan Flechais. (2005). The Case for Usable Security. In: Lorrie Faith Cranor and Simon L. Garfinkel (eds), Designing Secure Systems That People Can Use. O'Reilly & Associates.
Sherwood, John, Andrew Clark, and David Lynas. (2005). Enterprise security architecture: a business-driven approach. CMP Books.
Sivakorn, Suphannee, Iasonas Polakis and Angelos D. Keromytis. (2016). I Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs. In: Proceedings of the 1st IEEE European Symposium on Security and Privacy, Saarbrucken, Germany (21-24 March 2016), 388-403.
Ur, Blase, et al. (2016). Do users' perceptions of password security match reality? In: Proceedings of the 2016 CHI conference on human factors in computing systems. ACM, 3748-3760.
Whitten, Alma and J. D. Tygar. (1999). Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, Washington D.C., America.
Yee, Ka Ping. (2004). Aligning security and usability. Security & Privacy, Vol. 2(5), 48-55.
Arrêts
Fisher v. United States, 96 S.Ct. 1569 (1976)
King v. McLellan (1974) VR 773
People v. Smith, 86 AD2d 251 (NY App Div 3d Dept 1982)
Saunders v. United Kingdom (Application no. 19187/91) (1996) 23 EHRR 313
Schmerber v. California, 384 U.S. 757 (1966)
Sorby v Commonwealth (1983) 152 CLR 281
State v. Diamond, 2018 WL 443356 (Minn. 2018)
State of U.P. v. Sunil on 2 May, 2017, judgment of Supreme Court (India)
United States v. Wade, 388 U.S. 218 (1967)
U.S. v. Dionisio, 410 U.S. 1 (1973)
Virginia v. Baust, No. CR14-1439 (Va. Cir. October 28, 2014)