43
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Security in the wild: user strategies for managing security as an everyday, practical problem

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references13

          • Record: found
          • Abstract: not found
          • Article: not found

          Some computer science issues in ubiquitous computing

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Users are not the enemy

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility

                Bookmark

                Author and article information

                Journal
                Personal and Ubiquitous Computing
                Pers Ubiquit Comput
                Springer Nature
                1617-4909
                1617-4917
                November 2004
                September 22 2004
                : 8
                : 6
                : 391-401
                Article
                10.1007/s00779-004-0308-5
                268d684c-b328-4d06-aead-b7a8092cf832
                © 2004
                History

                Comments

                Comment on this article