-
1
-
-
34249659475
-
Privacy issues and human-computer interaction
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly, Sebastopol, CA
-
Ackerman M.S., and Mainwaring S.D. Privacy issues and human-computer interaction. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly, Sebastopol, CA 381-399
-
(2005)
Security and Usability
, pp. 381-399
-
-
Ackerman, M.S.1
Mainwaring, S.D.2
-
3
-
-
34249657866
-
Preface
-
Bidgoli H. (Ed), Wiley, Hoboken, NJ
-
Bidgoli H. Preface. In: Bidgoli H. (Ed). The Internet Encyclopedia vol. 1 (2004), Wiley, Hoboken, NJ XXIII-XXV
-
(2004)
The Internet Encyclopedia
, vol.1
-
-
Bidgoli, H.1
-
4
-
-
34249654046
-
-
Bidgoli, H. (Ed.), 2006. Handbook of Information Security. Wiley, Hoboken, NJ.
-
-
-
-
5
-
-
0029238493
-
Improving system security via proactive password checking
-
Bishop M., and Klein D.V. Improving system security via proactive password checking. Computers and Security 14 (1995) 233-249
-
(1995)
Computers and Security
, vol.14
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
7
-
-
0017660928
-
Memory for the pragmatic implications of sentences
-
Brewer W. Memory for the pragmatic implications of sentences. Memory and Cognition 5 (1977) 673-678
-
(1977)
Memory and Cognition
, vol.5
, pp. 673-678
-
-
Brewer, W.1
-
12
-
-
11144294785
-
Processing strategies and the generation effect: implications for making a better reader
-
de Winstanley P.A., and Bjork E.L. Processing strategies and the generation effect: implications for making a better reader. Memory & Cognition 32 (2004) 945-955
-
(2004)
Memory & Cognition
, vol.32
, pp. 945-955
-
-
de Winstanley, P.A.1
Bjork, E.L.2
-
13
-
-
0036053761
-
Choosing passwords: security and human factors
-
Gehringer E.F. Choosing passwords: security and human factors. Proceedings of IEEE 2002 (2002) 369-373
-
(2002)
Proceedings of IEEE
, vol.2002
, pp. 369-373
-
-
Gehringer, E.F.1
-
15
-
-
34249658392
-
-
Hilton, R., 2006. Password change policies. Retrieved from 〈http://blog.air0day.com/2006/04/27/password-change-policies/〉 . Downloaded on May 23, 2006.
-
-
-
-
17
-
-
84955753471
-
Effects of elaboration of processing at encoding and retrieval: trace distinctiveness and recovery of initial context
-
Cermak L.S., and Craik F.I.M. (Eds), Lawrence Erlbaum Associates, Hillsdale, NJ
-
Jacoby L.L., and Craik F.I.M. Effects of elaboration of processing at encoding and retrieval: trace distinctiveness and recovery of initial context. In: Cermak L.S., and Craik F.I.M. (Eds). Levels of Processing in Human Memory (1979), Lawrence Erlbaum Associates, Hillsdale, NJ 1-21
-
(1979)
Levels of Processing in Human Memory
, pp. 1-21
-
-
Jacoby, L.L.1
Craik, F.I.M.2
-
18
-
-
0040231044
-
Foiling the cracker: a survey of, and improvements to, password security
-
Klein D. Foiling the cracker: a survey of, and improvements to, password security. Proceedings of the Second USENIX Security Workshop (1990) 5-14
-
(1990)
Proceedings of the Second USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.1
-
19
-
-
34249680201
-
-
Leyden, J., 2003. Office workers give away passwords for a cheap pen. The Register. Available on-line at 〈http://www.theregister.co.uk/2003/04/18/office_workers_give_away_p asswords/〉. Downloaded May 21, 2006.
-
-
-
-
20
-
-
0003635801
-
-
Brooks/Cole, Pacific Grove, CA
-
Neath I. Human Memory: An Introduction to Research, Data, and Theory (1998), Brooks/Cole, Pacific Grove, CA
-
(1998)
Human Memory: An Introduction to Research, Data, and Theory
-
-
Neath, I.1
-
21
-
-
0001777285
-
Levels of processing, context, and facilitation of pronunciation
-
Parkin A.J. Levels of processing, context, and facilitation of pronunciation. Acta Psychologia 55 (1984) 19-29
-
(1984)
Acta Psychologia
, vol.55
, pp. 19-29
-
-
Parkin, A.J.1
-
23
-
-
34249682647
-
-
Posey, B.M., 2003. Recover lost passwords with these tricks and tools. Available online at 〈http://articles.techrepublic.com.com/5100-6329-5078287.html〉. Retrieved on December 10, 2006.
-
-
-
-
24
-
-
0036559882
-
Improving computer security for authentication of users: influence of proactive password restrictions
-
Proctor R.W., Lien M.C., Vu K.-P.L., Schultz E.E., and Salvendy G. Improving computer security for authentication of users: influence of proactive password restrictions. Behavior Research Methods, Instruments, & Computers 34 (2002) 163-169
-
(2002)
Behavior Research Methods, Instruments, & Computers
, vol.34
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.C.2
Vu, K.-P.L.3
Schultz, E.E.4
Salvendy, G.5
-
25
-
-
34249681841
-
-
Rainbow Technologies, 2003. Password survey results (June 2003). Retrieved November 14, 2005, from 〈http://mktg.rainbow.com/mk/get/pwsurvey03〉.
-
-
-
-
26
-
-
0142136617
-
Dual coding versus relational processing in memory for concrete and abstract words
-
Richardson J.T.E. Dual coding versus relational processing in memory for concrete and abstract words. European Journal of Cognitive Psychology 15 (2003) 481-509
-
(2003)
European Journal of Cognitive Psychology
, vol.15
, pp. 481-509
-
-
Richardson, J.T.E.1
-
27
-
-
0024768109
-
Passwords in use in a university timesharing environment
-
Riddle B.L., Miron M.S., and Semo J.A. Passwords in use in a university timesharing environment. Computers and Security 8 (1989) 569-579
-
(1989)
Computers and Security
, vol.8
, pp. 569-579
-
-
Riddle, B.L.1
Miron, M.S.2
Semo, J.A.3
-
28
-
-
84993728927
-
The power of testing memory: basic research and implications for educational practice
-
Roediger Jr. H.L., and Karpicke J. The power of testing memory: basic research and implications for educational practice. Perspectives on Psychological Science 1 (2006) 181-210
-
(2006)
Perspectives on Psychological Science
, vol.1
, pp. 181-210
-
-
Roediger Jr., H.L.1
Karpicke, J.2
-
29
-
-
34249707839
-
-
RSA Security, 2005. RSA security survey reveals multiple passwords creating security risks and end user frustration. Available on-line at 〈WWW.rsasecurity.com〉. Downloaded on May 7, 2006.
-
-
-
-
30
-
-
34249718910
-
-
SafeNet, 2005. 2004 annual password survey results. Available on-line at 〈www.safenet-inc.com〉. Downloaded on May 21, 2006.
-
-
-
-
31
-
-
0035387175
-
Transforming the 'weakest link'-a human/computer interaction approach to usable and effective security
-
Sasse M.A., Brostoff S., and Weirich D. Transforming the 'weakest link'-a human/computer interaction approach to usable and effective security. BT Technology Journal 19 (2001) 122-131
-
(2001)
BT Technology Journal
, vol.19
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
32
-
-
0035149763
-
Usability and security: an appraisal of usability issues in information security methods
-
Schultz E.E., Proctor R.W., Lien M.-C., and Salvendy G. Usability and security: an appraisal of usability issues in information security methods. Computers & Security 20 (2001) 620-634
-
(2001)
Computers & Security
, vol.20
, pp. 620-634
-
-
Schultz, E.E.1
Proctor, R.W.2
Lien, M.-C.3
Salvendy, G.4
-
33
-
-
34249690691
-
Web security and privacy
-
Proctor R.W., and Vu K.-P.L. (Eds), Lawrence Erlbaum Associates, Mahwah, NJ
-
Schultz E.E. Web security and privacy. In: Proctor R.W., and Vu K.-P.L. (Eds). Handbook of Human Factors in Web Design (2005), Lawrence Erlbaum Associates, Mahwah, NJ 613-625
-
(2005)
Handbook of Human Factors in Web Design
, pp. 613-625
-
-
Schultz, E.E.1
-
35
-
-
34249698104
-
-
Tari, F., Ozok, A.A., Holden, S.H., 2006. Password management, mnemonics, and mother's maiden names: a comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the Second Symposium on Usable Privacy and Security SOUPS '06. ACM Press, New York.
-
-
-
-
36
-
-
34249720525
-
Solutions to many of our security problems already exist, so why are we still so vulnerable?
-
Viega J. Solutions to many of our security problems already exist, so why are we still so vulnerable?. Queue (2005) 41-50
-
(2005)
Queue
, pp. 41-50
-
-
Viega, J.1
-
37
-
-
19944381937
-
PassPoints: design and longitudinal evaluation of a graphical password system
-
Wiedenbeck F., Waters J., Birget J.-C., Brodskiy A., and Memon N. PassPoints: design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63 (2005) 102-127
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, pp. 102-127
-
-
Wiedenbeck, F.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
|