Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned
Tweet

connect with us

On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned

Abstract: 

Malek Ben Salem, Columbia University

Salvatore J. Stolfo, Columbia University

BibTeX
@inproceedings {266603,
author = {Malek Ben Salem and Salvatore J. Stolfo},
title = {On the Design and Execution of {Cyber-Security} User Studies: Methodology, Challenges, and Lessons Learned},
booktitle = {4th Workshop on Cyber Security Experimentation and Test (CSET 11)},
year = {2011},
address = {San Francisco, CA},
url = {https://www.usenix.org/conference/cset11/design-and-execution-cyber-security-user-studies-methodology-challenges-and},
publisher = {USENIX Association},
month = aug,
}
Download

Links

Paper: 
http://www.usenix.org/events/cset11/tech/final_files/Salem.pdf
Paper (HTML): 
Slides: 
http://www.usenix.org/events/cset11/tech/slides/salem.pdf

© USENIX

  • Privacy Policy
  • Contact Us