@article{journals/ieeesp/SasseSHLV16, added-at = {2020-03-15T00:00:00.000+0100}, author = {Sasse, M. Angela and Smith, Matthew and Herley, Cormac and Lipford, Heather and Vaniea, Kami}, biburl = {https://www.bibsonomy.org/bibtex/25804a01570cda34fa27387e8bd395246/dblp}, ee = {http://doi.ieeecomputersociety.org/10.1109/MSP.2016.110}, interhash = {55247466a6a995892258268033093d55}, intrahash = {5804a01570cda34fa27387e8bd395246}, journal = {IEEE Secur. Priv.}, keywords = {dblp}, number = 5, pages = {33-39}, timestamp = {2020-03-17T11:55:59.000+0100}, title = {Debunking Security-Usability Tradeoff Myths.}, url = {http://dblp.uni-trier.de/db/journals/ieeesp/ieeesp14.html#SasseSHLV16}, volume = 14, year = 2016 } @article{sasse2016debunking, added-at = {2016-12-06T19:31:17.000+0100}, author = {Sasse, M Angela and Smith, Matthew and Herley, Cormac and Lipford, Heather and Vaniea, Kami}, biburl = {https://www.bibsonomy.org/bibtex/20cce05b36ecf7dd6f129a3bc6bb35ce0/smithl3s}, interhash = {55247466a6a995892258268033093d55}, intrahash = {0cce05b36ecf7dd6f129a3bc6bb35ce0}, journal = {IEEE Security \& Privacy}, keywords = {myown}, number = 5, pages = {33--39}, publisher = {IEEE}, timestamp = {2020-04-17T12:13:48.000+0200}, title = {Debunking Security-Usability Tradeoff Myths}, volume = 14, year = 2016 }