Proceedings of the 26th Annual Computer Security Applications Conference 2010
DOI: 10.1145/1920261.1920281
|View full text |Cite
|
Sign up to set email alerts
|

Barriers to science in security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 0 publications
0
13
0
Order By: Relevance
“…Q2: How is usability research incented and rewarded by the peer community, relative to other areas of computer Similar questions raised in the NSPW 2010 panel [28] and by Longstaff [27], remain far from resolved, and have been considered generically or relative to network security and intrusion detection more than specifically to usable security or authentication proposals.…”
Section: Specific Questions For Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Q2: How is usability research incented and rewarded by the peer community, relative to other areas of computer Similar questions raised in the NSPW 2010 panel [28] and by Longstaff [27], remain far from resolved, and have been considered generically or relative to network security and intrusion detection more than specifically to usable security or authentication proposals.…”
Section: Specific Questions For Discussionmentioning
confidence: 99%
“…Should we follow the computer scientist's preferred approach of describing a mechanism, building a prototype, and evaluating performance; or condense these to allow greater emphasis on explaining the methodology and results of one or more scientific experiments [27,28]?…”
Section: Specific Questions For Discussionmentioning
confidence: 99%
See 3 more Smart Citations