Author: Rebecca Mercuri

Publications

Publication period start: 2003
Number of co-authors: 1

Co-authors

Number of publications with favourite co-authors
Peter G. Neumann
2

Productive Colleagues

Most productive colleagues in number of publications
Peter G. Neumann
105

Publications

Mercuri, Rebecca (2005): Challenges in forensic computing. In Communications of the ACM, 48 (12) pp. 17-21. https://dl.acm.org/doi/10.1145/1101779.1101796

Mercuri, Rebecca (2004): Superscaled security. In Communications of the ACM, 47 (3) pp. 15-18. https://dl.acm.org/doi/10.1145/971617.971631

Mercuri, Rebecca (2004): The HIPAA-potamus in health care data security. In Communications of the ACM, 47 (7) pp. 25-28. https://dl.acm.org/doi/10.1145/1005817.1005840

Mercuri, Rebecca (2003): On auditing trails. In Communications of the ACM, 46 (1) pp. 17-20. https://dl.acm.org/doi/10.1145/602421.602436

Mercuri, Rebecca (2003): Standards insecurity. In Communications of the ACM, 46 (12) pp. 21-25. https://dl.acm.org/doi/10.1145/953460.953478

Mercuri, Rebecca (2003): Analyzing security costs. In Communications of the ACM, 46 (6) pp. 15-18. https://dl.acm.org/doi/10.1145/777313.777327

Mercuri, Rebecca, Neumann, Peter G. (2003): Security by obscurity. In Communications of the ACM, 46 (11) pp. 160. https://dl.acm.org/doi/10.1145/948383.948413

Mercuri, Rebecca (2002): Uncommon criteria. In Communications of the ACM, 45 (1) pp. 172. https://dl.acm.org/doi/10.1145/502269.502310

Mercuri, Rebecca (2002): Florida 2002: sluggish systems, vanishing votes. In Communications of the ACM, 45 (11) pp. 136. https://dl.acm.org/doi/10.1145/581571.581610

Mercuri, Rebecca (2002): Computer security: quality rather than quantity. In Communications of the ACM, 45 (10) pp. 11-14. https://dl.acm.org/doi/10.1145/570907.570917

Mercuri, Rebecca, Neumann, Peter G. (2001): System integrity revisited. In Communications of the ACM, 44 (1) pp. 160. https://dl.acm.org/doi/10.1145/357489.357517

Mercuri, Rebecca (2000): Voting automation (early and often?). In Communications of the ACM, 43 (11) pp. 176. https://dl.acm.org/doi/10.1145/353360.353378

Mercuri, Rebecca (1998): In Search of Academic Integrity. In Communications of the ACM, 41 (5) pp. 136.

Mercuri, Rebecca (1993): Corrupted Polling. In Communications of the ACM, 36 (11) pp. 122.

Mercuri, Rebecca (1992): Voting-Machine Risks. In Communications of the ACM, 35 (11) pp. 138.

Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we'll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,919 designers enjoy our newsletter—sure you don't want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we'll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,919 designers enjoy our newsletter—sure you don't want to receive it?