How users use access control

Diana K. Smetters, Nathan Good. How users use access control. In Lorrie Faith Cranor, editor, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009. ACM International Conference Proceeding Series, ACM, 2009. [doi]

@inproceedings{SmettersG09,
  title = {How users use access control},
  author = {Diana K. Smetters and Nathan Good},
  year = {2009},
  doi = {10.1145/1572532.1572552},
  url = {http://doi.acm.org/10.1145/1572532.1572552},
  tags = {access control},
  researchr = {https://researchr.org/publication/SmettersG09},
  cites = {0},
  citedby = {0},
  booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009},
  editor = {Lorrie Faith Cranor},
  series = {ACM International Conference Proceeding Series},
  publisher = {ACM},
  isbn = {978-1-60558-736-3},
}