Accepting the Inevitable: Factoring the User into Home Computer Security. Urbanska, M., Roberts, M., Ray, I., Howe, A., & Byrne, Z. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, February, 2013. Paper bibtex @INPROCEEDINGS{urbanskaEtAl13.codaspy.acceptingTheInevitable,
author = {Urbanska, Malgorzata and Roberts, Mark and Ray, Indrajit and Howe,
Adele and Byrne, Zinta},
title = {Accepting the Inevitable: Factoring the User into Home Computer Security},
booktitle = {Proceedings of the Third ACM Conference on Data and Application Security
and Privacy},
year = {2013},
address = {San Antonio, TX, USA},
month = {February},
url = {http://makro-nrl.bitbucket.io/publications/urbanskaEtAl13.codaspy.acceptingTheInevitable.pdf}
}
Downloads: 0
{"_id":"TwBJiESEXydcAyhtA","bibbaseid":"urbanska-roberts-ray-howe-byrne-acceptingtheinevitablefactoringtheuserintohomecomputersecurity-2013","downloads":0,"creationDate":"2018-02-02T15:34:07.942Z","title":"Accepting the Inevitable: Factoring the User into Home Computer Security","author_short":["Urbanska, M.","Roberts, M.","Ray, I.","Howe, A.","Byrne, Z."],"year":2013,"bibtype":"inproceedings","biburl":"makro-nrl.bitbucket.io/makro-pubs.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Urbanska"],"firstnames":["Malgorzata"],"suffixes":[]},{"propositions":[],"lastnames":["Roberts"],"firstnames":["Mark"],"suffixes":[]},{"propositions":[],"lastnames":["Ray"],"firstnames":["Indrajit"],"suffixes":[]},{"propositions":[],"lastnames":["Howe"],"firstnames":["Adele"],"suffixes":[]},{"propositions":[],"lastnames":["Byrne"],"firstnames":["Zinta"],"suffixes":[]}],"title":"Accepting the Inevitable: Factoring the User into Home Computer Security","booktitle":"Proceedings of the Third ACM Conference on Data and Application Security and Privacy","year":"2013","address":"San Antonio, TX, USA","month":"February","url":"http://makro-nrl.bitbucket.io/publications/urbanskaEtAl13.codaspy.acceptingTheInevitable.pdf","bibtex":"@INPROCEEDINGS{urbanskaEtAl13.codaspy.acceptingTheInevitable,\n author = {Urbanska, Malgorzata and Roberts, Mark and Ray, Indrajit and Howe,\n\tAdele and Byrne, Zinta},\n title = {Accepting the Inevitable: Factoring the User into Home Computer Security},\n booktitle = {Proceedings of the Third ACM Conference on Data and Application Security\n\tand Privacy},\n year = {2013},\n address = {San Antonio, TX, USA},\n month = {February},\n url = {http://makro-nrl.bitbucket.io/publications/urbanskaEtAl13.codaspy.acceptingTheInevitable.pdf}\n}\n \n","author_short":["Urbanska, M.","Roberts, M.","Ray, I.","Howe, A.","Byrne, Z."],"key":"urbanskaEtAl13.codaspy.acceptingTheInevitable","id":"urbanskaEtAl13.codaspy.acceptingTheInevitable","bibbaseid":"urbanska-roberts-ray-howe-byrne-acceptingtheinevitablefactoringtheuserintohomecomputersecurity-2013","role":"author","urls":{"Paper":"http://makro-nrl.bitbucket.io/publications/urbanskaEtAl13.codaspy.acceptingTheInevitable.pdf"},"metadata":{"authorlinks":{"roberts, m":"https://makro-nrl.bitbucket.io/"}}},"search_terms":["accepting","inevitable","factoring","user","home","computer","security","urbanska","roberts","ray","howe","byrne"],"keywords":[],"authorIDs":["5806595ce77fab9349000044","5df0295a5d7361de010000ab","5dfad9830488afde010000ac","5e1113e9730253de0100000a","5e3c49a6c798e0de0100008f","5e3f75b0518071df0100002c","5e4616acb57382df010000ac","5e5eaad42fd1fade010000d4","BwWeitWMrLusXntgD","RGqnvEXf9hTcbfHyD","TQJEKDCyC7uqizWdK","Ts43ZEMha4k95GDop"],"dataSources":["355QTC8XdKPs4cLiA","9XtNn9tRSJu8ZQEYg"]}