Clare-Marie Karat, Carolyn Brodie, J. K. (2005) ‘Usability
Design and Evaluation for Privacy and Security
Solutions’, in Security and Usability: Designing Secure
Systems That People Can Use, pp. 47–74.
Coi, J. L. de et al. (2011) ‘Controlled Natural Language
Policies’, Seventh Framework Programme, pp. 9–11.
Available at:
http://homes.esat.kuleuven.ac.be/~decockd/tas3/final.d
eliverables/pm42/TAS3_D06p3_CNLPolicies_Final.p
df%5Cnpapers2://publication/uuid/11346F46-D413-
4250-9D89-2287E40D13DF.
Cranor, L. F. and Garfinkel, S. (2004) ‘Secure or usable?’,
IEEE Security and Privacy, 2(5), pp. 16–18. doi:
10.1109/MSP.2004.69.
Ferreira, A., Rusu, C. and Roncagliolo, S. (2009) ‘Usability
and security patterns’, Proceedings of the 2nd
International Conferences on Advances in Computer-
Human Interactions, ACHI 2009, pp. 301–305. doi:
10.1109/ACHI.2009.21.
Fischer-Hübner, S., Iacono, L. and Möller, S. (2010)
‘Usable Security und Privacy’, Datenschutz und
Datensicherheit - DuD, 34, pp. 773–782. doi:
10.1007/s11623-010-0210-4.
Garfinkel, S. L. (2005) ‘Design Principles and Patterns for
Computer Systems That Are Simultaneously Secure
and Usable by’, Gene, 31(1987), pp. 234–239.
Available at:
http://dspace.mit.edu/handle/1721.1/33204.
Iacono, L. Lo et al. (2018) ‘Consolidating Principles and
Patterns for Human-centred Usable Security Research
and Development’, in European Workshop on Usable
Security. London.
ISO9241-110:2006(en) (2006) Ergonomics of human-
system interaction - Part 110: Dialogue principles.
Johnson, M. et al. (2010) ‘Optimizing a policy authoring
framework for security and privacy policies’,
Proceedings of the Sixth Symposium on Usable Privacy
and Security - SOUPS ’10, p. 1. doi:
10.1145/1837110.1837121.
Karat, C.-M. et al. (2006) ‘Evaluating interfaces for privacy
policy rule authoring’, Proceedings of the SIGCHI
conference on Human Factors in computing systems -
CHI ’06, p. 83. doi: 10.1145/1124772.1124787.
Karat, J. et al. (2005) ‘Designing Natural Language and
Structured Entry Methods for Privacy Policy
Authoring’, pp. 671–684.
Kirlappos, I. and Sasse, M. A. (2014) ‘What Usable
Security Really Means : Trusting and Engaging Users’,
Human Aspects of Information Security, Privacy, and
Trust HAS. Lecture Notes in Computer Science, (8533),
p. 11.
Lanford, P. (2006) ‘E-Commerce: A Trust Perspective’,
International Conference on Internet Computing, pp.
64–70.
Machado, C. C. et al. (2015) ‘Policy Authoring for
Software-Defined Networking Management’,
IFIP/IEEE International Symposium on Integrated
Network Management (IM)
.
Meland, P. H. and Jensen, J. (2008) ‘Secure Software
Design in Practice’, 2008 Third International
Conference on Availability, Reliability and Security,
pp. 1164–1171. doi: 10.1109/ARES.2008.48.
Norman, D. A. (2013) The Design of Everyday Things. 2nd
edn. Edited by B. Books. New York: Perseus Books
Group.
Pane, J. F., Ratanamahatana, C. A. and Myers, B. A. (2001)
‘Studying the language and structure in non-
programmers’ solutions to programming problems’,
International Journal of Human Computer Studies,
54(2), pp. 237–264. doi: 10.1006/ijhc.2000.0410.
Patrick, A., Marsh, S. and Briggs, P. (2005) ‘Designing
systems that people will trust’, Security and Usability:
Designing Secure Systems That People Can Use,
(January), pp. 75–100. Available at: http://nparc.cisti-
icist.nrc-cnrc.gc.ca/npsi/ctrl?action=shwart&inde
x=an&req=8913238&lang=en.
Prieto, L. P. et al. (2017) ‘Maybe poor Jhonny Really
Cannot Encrypt - The Case for a Complexity Theory for
Usable Security’, CEUR Workshop Proceedings, 1828,
pp. 53–59. doi: 10.1145/1235.
Reeder, R. W. et al. (2007) ‘Usability Challenges in
Security and Privacy Policy-Authoring Interfaces’,
IFIP Conference on Human-Computer Interaction, pp.
141–155. doi: 10.1007/978-3-540-74800-7_11.
Rudolph, M. (2014) ‘User-friendly and Tailored Policy
Administration Points’, (076).
Sasse, M. A., Brostoff, S. and Weirich, D. (2001)
‘Transforming the “Weakest Link”: A Human-
Computer Interaction Approach for Usable and
Effective Security’.
Shi, L. and Chadwick, D. W. (2011) ‘A controlled natural
language interface for authoring access control
policies’, Proceedings of the 2011 ACM Symposium on
Applied Computing - SAC ’11, p. 1524. doi:
10.1145/1982185.1982510.
Shneiderman, B. (2016) Designing the User Interface. 6th
edn. Edinburgh: Pearson Education Limited.
Trojer, T. et al. (2011) ‘An authoring framework for
security policies: A use-case within the healthcare
domain’, Lecture Notes of the Institute for Computer
Sciences, Social-Informatics and Telecommunications
Engineering, 69 LNICST, pp. 1–9. doi: 10.1007/978-3-
642-23635-8_1.
Vaniea, K. et al. (2008) ‘Evaluating assistance of natural
language policy authoring’, Proceedings of the 4th
symposium on Usable privacy and security - SOUPS
’08, p. 65. doi: 10.1145/1408664.1408674.
Whitten, A. and Tygar, D. (2005) ‘Why Johnny Can ’ t
Encrypt’, Security, 1999(October), pp. 679–702. doi:
169-184.
Yee, K.-P. (2002) ‘User Interaction Design for Secure
Systems’, Proceedings of the 4th International
Conference on Information and Communications
Security, pp. 278–290. doi: 10.1007/3-540-36159-
6_24.
Zurko, M. E., Simon, R. T. and Street, S. (1996) ‘User-
Centered Security’, 1(212), pp. 1–9.