-
1
-
-
34547137028
-
Bonferroni and Sidak corrections for multiple comparisons
-
SALKIND NJ, Ed, pp, Sage, Thousand Oaks, CA
-
ABDI H (2007) Bonferroni and Sidak corrections for multiple comparisons. In Encyclopedia of Measurement and Statistics (SALKIND NJ, Ed), pp 103-107, Sage, Thousand Oaks, CA.
-
(2007)
Encyclopedia of Measurement and Statistics
, pp. 103-107
-
-
ABDI, H.1
-
2
-
-
0043232732
-
-
ADAMS Aand SASSE MA (1999) Users are not the enemy. Communications of the ACM 42(12), 41-46.
-
ADAMS Aand SASSE MA (1999) Users are not the enemy. Communications of the ACM 42(12), 41-46.
-
-
-
-
3
-
-
77956946453
-
Human memory: A proposed system and its control processes
-
SPENCE KW and SPENCE JT, Eds, pp, Academic Press, New York
-
ATKINSON RC and SHIFFRIN RM (1968) Human memory: a proposed system and its control processes. In The Psychology of Learning and Motivation (SPENCE KW and SPENCE JT, Eds), pp 89-195, Academic Press, New York.
-
(1968)
The Psychology of Learning and Motivation
, pp. 89-195
-
-
ATKINSON, R.C.1
SHIFFRIN, R.M.2
-
5
-
-
0012115918
-
An analysis of research methodologies
-
MCFARLAND FW, Ed, pp, HBS Press, Boston
-
BENBASAT I (1984) An analysis of research methodologies. In The Information Systems Research Challenge (MCFARLAND FW, Ed), pp 47-85, HBS Press, Boston.
-
(1984)
The Information Systems Research Challenge
, pp. 47-85
-
-
BENBASAT, I.1
-
6
-
-
67650189565
-
-
BISHOP M (1990) A proactive password checker. Technical Report PCS- TR90-152. [WWW document] http://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa. gov/19920018383-1992018383.pdf.
-
BISHOP M (1990) A proactive password checker. Technical Report PCS- TR90-152. [WWW document] http://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa. gov/19920018383-1992018383.pdf.
-
-
-
-
8
-
-
67650124268
-
The good and not so good of enforcing password composition rules
-
CAMPBELL J, KLEEMAN Dand MA W (2007) The good and not so good of enforcing password composition rules. Information Systems Security 16(1), 2-8.
-
(2007)
Information Systems Security
, vol.16
, Issue.1
, pp. 2-8
-
-
CAMPBELL, J.1
KLEEMAN2
Dand MA, W.3
-
9
-
-
67650176091
-
Applying chunking theory in organizational password guidelines
-
CARSTENS DS, MALONE LC and MCCAULEY-BELL P (2006) Applying chunking theory in organizational password guidelines. Journal of Information, Information Technology, and Organizations 1, 97-113.
-
(2006)
Journal of Information, Information Technology, and Organizations
, vol.1
, pp. 97-113
-
-
CARSTENS, D.S.1
MALONE, L.C.2
MCCAULEY-BELL, P.3
-
10
-
-
18544374846
-
Evaluation of the human impact of password authentication practices on information security
-
CARSTENS DS, MCCAULEY-BELL PR, MALONE LC and DEMARA RF (2004) Evaluation of the human impact of password authentication practices on information security. Information Science Journal 7(1), 67-85.
-
(2004)
Information Science Journal
, vol.7
, Issue.1
, pp. 67-85
-
-
CARSTENS, D.S.1
MCCAULEY-BELL, P.R.2
MALONE, L.C.3
DEMARA, R.F.4
-
15
-
-
12344322521
-
The demise of short-term memory revisited: Empirical and computational investigations of recency effects
-
DAVELAAR EJ, GOSHEN-GOTTSTEIN Y, ASHKENAZI A, HAARMANN HJ and USHER M (2005) The demise of short-term memory revisited: empirical and computational investigations of recency effects. Psychological Review 112(1), 3-42.
-
(2005)
Psychological Review
, vol.112
, Issue.1
, pp. 3-42
-
-
DAVELAAR, E.J.1
GOSHEN-GOTTSTEIN, Y.2
ASHKENAZI, A.3
HAARMANN, H.J.4
USHER, M.5
-
16
-
-
67650189548
-
-
DELOITTE (2007) The 2007 technology, media, and telecommunications security survey. [WWW document] http://www.deloitte.com/dtt/ cda/doc/content/dtt-tmt-securitysurvey2007.pdf. DENNIS Aand VALACICH J (2001) Conducting research in information systems. Communications of the AIS 7(5), 1-41.
-
DELOITTE (2007) The 2007 technology, media, and telecommunications security survey. [WWW document] http://www.deloitte.com/dtt/ cda/doc/content/dtt-tmt-securitysurvey2007.pdf. DENNIS Aand VALACICH J (2001) Conducting research in information systems. Communications of the AIS 7(5), 1-41.
-
-
-
-
18
-
-
34250729756
-
-
GAW Sand FELTEN EW (2006) Password management strategies for online accounts. In Proceedings of the 2nd Symposium on Usable Privacy and Security, pp 44-55, ACM Press, New York, USA.
-
GAW Sand FELTEN EW (2006) Password management strategies for online accounts. In Proceedings of the 2nd Symposium on Usable Privacy and Security, pp 44-55, ACM Press, New York, USA.
-
-
-
-
19
-
-
0036053761
-
-
GEHRINGER EF (2002) Choosing passwords: security and human factors. In Proceedings of 2002 International Symposium on Technology and Society,(HERKERT JR, Ed) pp 369-373, IEEE Computer Society, Washington, DC.
-
GEHRINGER EF (2002) Choosing passwords: security and human factors. In Proceedings of 2002 International Symposium on Technology and Society,(HERKERT JR, Ed) pp 369-373, IEEE Computer Society, Washington, DC.
-
-
-
-
20
-
-
67650143950
-
Remembering multiple passwords by way of minimal- feedback hints: Replication and further analysis
-
KJELDSKOV J, SKOV MB and STAGE J, Eds pp, Aalborg University, Aalborg, Denmark
-
HERTZUM M (2004) Remembering multiple passwords by way of minimal- feedback hints: replication and further analysis. in Proceedings of the Fourth Danish Human-Computer Interaction Research Symposium, (KJELDSKOV J, SKOV MB and STAGE J, Eds) pp 21-24, Aalborg University, Aalborg, Denmark.
-
(2004)
Proceedings of the Fourth Danish Human-Computer Interaction Research Symposium
, pp. 21-24
-
-
HERTZUM, M.1
-
21
-
-
33646671233
-
Minimal-feedback hints for remembering passwords
-
HERTZUM M (2006) Minimal-feedback hints for remembering passwords. Interactions 13(3), 38-40.
-
(2006)
Interactions
, vol.13
, Issue.3
, pp. 38-40
-
-
HERTZUM, M.1
-
22
-
-
67650153291
-
-
INFORMATIONWEEK (2007) 2007 InformationWeek/Accenture Global information security survey. [WWW document] http://www.informationweek.com/ whitepaper/Security/Privacy/2007-informationweek/accenture-global-information- wp1213826038953?articleID=21800009.
-
INFORMATIONWEEK (2007) 2007 InformationWeek/Accenture Global information security survey. [WWW document] http://www.informationweek.com/ whitepaper/Security/Privacy/2007-informationweek/accenture-global-information- wp1213826038953?articleID=21800009.
-
-
-
-
24
-
-
67650126221
-
-
LU Band TWIDALE MB (2003) Managing multiple passwords and multiple logins: MiFA minimal-feedback hints for remote authentication. In Proceedings of the IFIP INTERACT Conference,(RAUTERBERG M, MENOZZI, Mand WESSON J, Eds) pp 821-824, IOS Press, Zurich.
-
LU Band TWIDALE MB (2003) Managing multiple passwords and multiple logins: MiFA minimal-feedback hints for remote authentication. In Proceedings of the IFIP INTERACT Conference,(RAUTERBERG M, MENOZZI, Mand WESSON J, Eds) pp 821-824, IOS Press, Zurich.
-
-
-
-
25
-
-
51549085237
-
-
MASSAD Nand BEACHBOARD J (2008) A taxonomy of service failures in electronic retailing. In Proceedings of the 41st Hawaii International Conference on System Sciences, IEEE Computer Society, Washington, DC.
-
MASSAD Nand BEACHBOARD J (2008) A taxonomy of service failures in electronic retailing. In Proceedings of the 41st Hawaii International Conference on System Sciences, IEEE Computer Society, Washington, DC.
-
-
-
-
26
-
-
0002181702
-
Dilemmatics: The study of research choices and dilemmas
-
MCGRATH JE, MARTIN Jand KULKA RA, Eds, pp, Sage, Beverly Hills, CA
-
MCGRATH JE (1982) Dilemmatics: the study of research choices and dilemmas. In Judgment Calls in Research (MCGRATH JE, MARTIN Jand KULKA RA, Eds), pp 69-102, Sage, Beverly Hills, CA.
-
(1982)
Judgment Calls in Research
, pp. 69-102
-
-
MCGRATH, J.E.1
-
27
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
MILLER GA (1956) The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review 63, 81-97.
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
MILLER, G.A.1
-
28
-
-
85011548130
-
-
MULLIGAN Jand ELBIRT AJ (2005) Desktop security and usability trade-offs: an evaluation of password management systems. Information Systems Security 14(2), 10-19.
-
MULLIGAN Jand ELBIRT AJ (2005) Desktop security and usability trade-offs: an evaluation of password management systems. Information Systems Security 14(2), 10-19.
-
-
-
-
29
-
-
67650130450
-
-
10 most common passwords, WWW document, 2817,2113976,00.asp, 8 May
-
PC MAGAZINE (2007) 10 most common passwords. [WWW document] http://www.pcmag.com/article2/0,2817,2113976,00.asp, 8 May.
-
(2007)
PC MAGAZINE
-
-
-
33
-
-
0036559882
-
improving computer security for authentication of users: Influence of proactive password restrictions
-
PROCTOR RW, LIEN MC, VU Kpl, SCHULTZ EE and SALVENDY G (2002) improving computer security for authentication of users: influence of proactive password restrictions. Behavior Research Methods, Instruments, & Computers 34(2), 163-169.
-
(2002)
Behavior Research Methods, Instruments, & Computers
, vol.34
, Issue.2
, pp. 163-169
-
-
PROCTOR, R.W.1
LIEN, M.C.2
Kpl, V.3
SCHULTZ, E.E.4
SALVENDY, G.5
-
34
-
-
0038578769
-
Spacing and repetition effects in human memory: Application of the sAM model
-
RAAIJMAKERS J (2003) Spacing and repetition effects in human memory: application of the sAM model. Cognitive Science: A Multidisciplinary Journal 27(3), 431-452.
-
(2003)
Cognitive Science: A Multidisciplinary Journal
, vol.27
, Issue.3
, pp. 431-452
-
-
RAAIJMAKERS, J.1
-
35
-
-
39349101677
-
Password security: What users know and what they actually do
-
WWW document] http://psychology.wichita.edu/surl/usabilitynews/81/Passwords.asp
-
RILEY S (2006) Password security: what users know and what they actually do. Usability News 8(1). [WWW document] http://psychology.wichita.edu/surl/usabilitynews/81/Passwords.asp.
-
(2006)
Usability News
, vol.8
, Issue.1
-
-
RILEY, S.1
-
36
-
-
67650116851
-
-
RSA (2005) RSA security survey reveals multiple passwords creating security risks and end user frustration. [WWW document] http://www.rsa.com/ press-release.aspx?id = 6095.
-
RSA (2005) RSA security survey reveals multiple passwords creating security risks and end user frustration. [WWW document] http://www.rsa.com/ press-release.aspx?id = 6095.
-
-
-
-
37
-
-
67650174073
-
-
RSA (2006a) RSA security research shows of business passwords overwhelming end users and hindering iT security efforts. [WWW.document] http://www.rsa.com/press-release.aspx?id = 7296.
-
RSA (2006a) RSA security research shows volume of business passwords overwhelming end users and hindering iT security efforts. [WWW.document] http://www.rsa.com/press-release.aspx?id = 7296.
-
-
-
-
38
-
-
67650126226
-
-
RSA (2006b) Enterprise single sign-on solutions reduce IT helpdesk calls but raise concern amongst security experts, reveals RSA security. [WWW document] http://www.rsa.com/press-release.aspx?id = 6903.
-
RSA (2006b) Enterprise single sign-on solutions reduce IT helpdesk calls but raise concern amongst security experts, reveals RSA security. [WWW document] http://www.rsa.com/press-release.aspx?id = 6903.
-
-
-
-
39
-
-
33751577351
-
Analysis of rehearsal processes in free recall
-
RUNDUS DJ (1971) Analysis of rehearsal processes in free recall. Journal of Experimental Psychology 89(1), 63-77.
-
(1971)
Journal of Experimental Psychology
, vol.89
, Issue.1
, pp. 63-77
-
-
RUNDUS, D.J.1
-
40
-
-
0026047868
-
Can we have a distinctive theory of memory?
-
SCHMIDT SR (1991) Can we have a distinctive theory of memory? Memory & Cognition 19(6), 523-542.
-
(1991)
Memory & Cognition
, vol.19
, Issue.6
, pp. 523-542
-
-
SCHMIDT, S.R.1
-
41
-
-
37049246450
-
How big is a chunk?
-
SIMON HA (1974), How big is a chunk? Science 183(4124), 482-488.
-
(1974)
Science
, vol.183
, Issue.4124
, pp. 482-488
-
-
SIMON, H.A.1
-
44
-
-
25144498396
-
-
TALMI D, GRADY C, GOSHEN-GOTTSTEIN Yand MOSCOVITCH M (2005) Neuroimaging the serial position curve: a test of single-store versus dual-store models. Psychological Science 16(9), 716-723.
-
TALMI D, GRADY C, GOSHEN-GOTTSTEIN Yand MOSCOVITCH M (2005) Neuroimaging the serial position curve: a test of single-store versus dual-store models. Psychological Science 16(9), 716-723.
-
-
-
-
45
-
-
34249733184
-
improving password security and memorability to protect personal and organizational information
-
VU Kpl, PROCTOR RW, BHARGAV-SPANTZEL A, TAI Blb, COOK J and SCHULTZ EE (2007) improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies 65, 744-757.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, pp. 744-757
-
-
Kpl, V.1
PROCTOR, R.W.2
BHARGAV-SPANTZEL, A.3
Blb, T.4
COOK, J.5
SCHULTZ, E.E.6
-
46
-
-
2642569127
-
Introducing the check-off password systems (COPS): An advancement in user authentication methods and information security
-
WARKENTIN M, DAVIS Kand BEKKERING E (2004) Introducing the check-off password systems (COPS): an advancement in user authentication methods and information security. Journal of Organizational and End User Computing 16(3), 41-58.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 41-58
-
-
WARKENTIN, M.1
DAVIS2
Kand BEKKERING, E.3
-
47
-
-
19944381937
-
Passpoints: Design and longitudinal evaluation of a graphical password system
-
WIEDENBECK S, WATERS J, BIRGET JC, BRODSKIY Aand MEMON N (2005) Passpoints: design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63, 102-127.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, pp. 102-127
-
-
WIEDENBECK, S.1
WATERS, J.2
BIRGET, J.C.3
BRODSKIY4
Aand MEMON, N.5
-
49
-
-
67650174072
-
-
ZVIRAN Mand ERLICH Z (2006) Identification and authentication: technology and implementation issues. Communications of the Association for Information Systems 17(1), 90-105.
-
ZVIRAN Mand ERLICH Z (2006) Identification and authentication: technology and implementation issues. Communications of the Association for Information Systems 17(1), 90-105.
-
-
-
|