Adam Beautement, M. Angela Sasse, Mike Wonham.
The compliance budget: managing security behaviour in organisations.
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates.
We have met the enemy and he is us.
Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, Bilal Shebaro.
The ecology of Malware.
Steven J. Greenwald, Brian D. Snow, Richard Ford, Richard Thieme.
Towards an ethical code for information security?
Cormac Herley, Dinei Florêncio.
A profitless endeavor: phishing as tragedy of the commons.
Ben Laurie, Abe Singer.
Choose the red pill and the blue pill: a position paper.
Mohammad Mannan, P. C. van Oorschot.
Localization of credential information to address increasingly inevitable data breaches.
Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi.
Trading in risk: using markets to improve access control.
Jeffrey Shirley, David Evans.
The user is not the enemy: fighting malware by tracking user intentions.
Glenn Wurster, P. C. van Oorschot.
The developer is the enemy
Hang Zhao, Chi-Kin Chau, Steven M. Bellovin.
ROFL: routing as the firewall layer.