Author: Rebecca Mercuri

Publications

Publication period start: 2003
Number of co-authors: 1

Co-authors

Number of publications with favourite co-authors
Peter G. Neumann
2

Productive Colleagues

Most productive colleagues in number of publications
Peter G. Neumann
105

Publications

Mercuri, Rebecca (2005): Challenges in forensic computing. In Communications of the ACM, 48 (12) pp. 17-21. https://dl.acm.org/doi/10.1145/1101779.1101796

Mercuri, Rebecca (2004): Superscaled security. In Communications of the ACM, 47 (3) pp. 15-18. https://dl.acm.org/doi/10.1145/971617.971631

Mercuri, Rebecca (2004): The HIPAA-potamus in health care data security. In Communications of the ACM, 47 (7) pp. 25-28. https://dl.acm.org/doi/10.1145/1005817.1005840

Mercuri, Rebecca (2003): On auditing trails. In Communications of the ACM, 46 (1) pp. 17-20. https://dl.acm.org/doi/10.1145/602421.602436

Mercuri, Rebecca (2003): Standards insecurity. In Communications of the ACM, 46 (12) pp. 21-25. https://dl.acm.org/doi/10.1145/953460.953478

Mercuri, Rebecca (2003): Analyzing security costs. In Communications of the ACM, 46 (6) pp. 15-18. https://dl.acm.org/doi/10.1145/777313.777327

Mercuri, Rebecca, Neumann, Peter G. (2003): Security by obscurity. In Communications of the ACM, 46 (11) pp. 160. https://dl.acm.org/doi/10.1145/948383.948413

Mercuri, Rebecca (2002): Uncommon criteria. In Communications of the ACM, 45 (1) pp. 172. https://dl.acm.org/doi/10.1145/502269.502310

Mercuri, Rebecca (2002): Florida 2002: sluggish systems, vanishing votes. In Communications of the ACM, 45 (11) pp. 136. https://dl.acm.org/doi/10.1145/581571.581610

Mercuri, Rebecca (2002): Computer security: quality rather than quantity. In Communications of the ACM, 45 (10) pp. 11-14. https://dl.acm.org/doi/10.1145/570907.570917

Mercuri, Rebecca, Neumann, Peter G. (2001): System integrity revisited. In Communications of the ACM, 44 (1) pp. 160. https://dl.acm.org/doi/10.1145/357489.357517

Mercuri, Rebecca (2000): Voting automation (early and often?). In Communications of the ACM, 43 (11) pp. 176. https://dl.acm.org/doi/10.1145/353360.353378

Mercuri, Rebecca (1998): In Search of Academic Integrity. In Communications of the ACM, 41 (5) pp. 136.

Mercuri, Rebecca (1993): Corrupted Polling. In Communications of the ACM, 36 (11) pp. 122.

Mercuri, Rebecca (1992): Voting-Machine Risks. In Communications of the ACM, 35 (11) pp. 138.

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,879 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,879 designers enjoy our newsletter—sure you don’t want to receive it?