-
1
-
-
33746633350
-
Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication
-
Adams, D. A., Nelson, R. R., and Todd, P. A. "Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication," MIS Quarterly (16:2), 1992, pp. 227-247
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 227-247
-
-
Adams, D.A.1
Nelson, R.R.2
Todd, P.A.3
-
3
-
-
0013971274
-
The Influence of Acoustic and Semantic Similarity on Long-Term Memory for Word Sequences
-
Baddeley, A. D. "The Influence of Acoustic and Semantic Similarity on Long-Term Memory for Word Sequences," Quarterly Journal of Experimental Psychology (18:4), 1966, pp. 302-309
-
(1966)
Quarterly Journal of Experimental Psychology
, vol.18
, Issue.4
, pp. 302-309
-
-
Baddeley, A.D.1
-
4
-
-
7744227917
-
Generating and Remembering Passwords
-
Brown, A. S., Bracken, E., Zoccoli, S., and Douglas, K. "Generating and Remembering Passwords," Applied Cognitive Psychology (18:6), 2004, pp. 641-651
-
(2004)
Applied Cognitive Psychology
, vol.18
, Issue.6
, pp. 641-651
-
-
Brown, A.S.1
Bracken, E.2
Zoccoli, S.3
Douglas, K.4
-
5
-
-
80053556855
-
-
ebrary.com, Syngress Publishing
-
Burnett, M. Perfect Passwords: Selection, Protection, and Authentication, ebrary.com, Syngress Publishing, 2005
-
(2005)
Perfect Passwords: Selection, Protection, and Authentication
-
-
Burnett, M.1
-
6
-
-
33644875555
-
Long-Term Memory is the Representational Basis for Semantic Verbal Short-Term Memory
-
Cameron, K. A., Haarmann, H. J., Grafman, J., and Ruchkin, D. S. "Long-Term Memory is the Representational Basis for Semantic Verbal Short-Term Memory," Psychophysiology (42:6), 2005, pp. 643-653
-
(2005)
Psychophysiology
, vol.42
, Issue.6
, pp. 643-653
-
-
Cameron, K.A.1
Haarmann, H.J.2
Grafman, J.3
Ruchkin, D.S.4
-
7
-
-
85080680160
-
-
Center for Internet Security, Version 1.3, The Center for Internet Security
-
Center for Internet Security, Windows XP Professional Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Baseline Security Settings, Version 1.3, The Center for Internet Security, www.cisecurity.org, 2004
-
(2004)
Windows XP Professional Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Baseline Security Settings
-
-
-
8
-
-
0025453517
-
On the Automatic Control of Processes: A Parallel Distributed Processing Account of the Stroop Effect
-
Cohen, J. D., McClelland, J. L., and Dunbar, K. "On the Automatic Control of Processes: A Parallel Distributed Processing Account of the Stroop Effect," Psychological Review (97:3), 1990, pp. 332-361
-
(1990)
Psychological Review
, vol.97
, Issue.3
, pp. 332-361
-
-
Cohen, J.D.1
McClelland, J.L.2
Dunbar, K.3
-
9
-
-
0002288512
-
Acoustic Confusions in Immediate Memory
-
Conrad, R. "Acoustic Confusions in Immediate Memory," British Journal of Psychology (55), 1964, pp. 75-84
-
(1964)
British Journal of Psychology
, vol.55
, pp. 75-84
-
-
Conrad, R.1
-
10
-
-
84981263306
-
The Magical Number 4 in Short-Term Memory: A Reconsideration of Mental Storage Capacity
-
Cowan, N. "The Magical Number 4 in Short-Term Memory: A Reconsideration of Mental Storage Capacity," Behavioral and Brain Sciences (24:1), 2001, pp. 87-185
-
(2001)
Behavioral and Brain Sciences
, vol.24
, Issue.1
, pp. 87-185
-
-
Cowan, N.1
-
12
-
-
55249087535
-
Perceived Usefulness, Perceived Ease of User, and User Acceptance of Technology
-
Davis, F. "Perceived Usefulness, Perceived Ease of User, and User Acceptance of Technology," MIS Quarterly (13:3), 1989, pp. 319-339
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-339
-
-
Davis, F.1
-
13
-
-
21344492992
-
Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory
-
DeSanctis, G. and Poole, M. S. "Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory," Organization Science (5:2), 1994, pp. 121-147
-
(1994)
Organization Science
, vol.5
, Issue.2
, pp. 121-147
-
-
Desanctis, G.1
Poole, M.S.2
-
14
-
-
0036611155
-
Magical Numbers: The Seven-Plus-or-Minus-Two Myth
-
Doumont, J. "Magical Numbers: The Seven-Plus-or-Minus-Two Myth," IEEE Transactions on Professional Communication (45:2), 2002, pp. 123-127
-
(2002)
IEEE Transactions on Professional Communication
, vol.45
, Issue.2
, pp. 123-127
-
-
Doumont, J.1
-
16
-
-
12044257789
-
The Role of Deliberate Practice in the Acquisition of Expert Performance
-
Ericsson, K. A., Krampe, R. T., and Tesch-Romer, C. "The Role of Deliberate Practice in the Acquisition of Expert Performance," Psychological Review (100:3), 1993, pp. 363-406
-
(1993)
Psychological Review
, vol.100
, Issue.3
, pp. 363-406
-
-
Ericsson, K.A.1
Krampe, R.T.2
Tesch-Romer, C.3
-
17
-
-
0041847762
-
-
Federal Information Processing Standards (FIPS) Publication 112, last accessed December 8, 2008
-
Federal Information Processing Standards (FIPS) Publication 112, "Password Usage," 1985 (http://www.itl.nist.gov/fipspubs/fip112.htm) last accessed December 8, 2008
-
(1985)
Password Usage
-
-
-
18
-
-
33748606606
-
The role of knowledge repositories in technical support environments: Speed versus learning in user performance
-
Gray, P. H. and Durcikova, A. "The role of knowledge repositories in technical support environments: Speed versus learning in user performance," Journal of Management Information Systems (22:3), 2005-6, 159-190
-
(2005)
Journal of Management Information Systems
, vol.22
, Issue.3
, pp. 159-190
-
-
Gray, P.H.1
Durcikova, A.2
-
19
-
-
0242652022
-
Design Science in Information Systems Research
-
Hevner, A. R., March, S. T., Park, J., and Ram, S. "Design Science in Information Systems Research," MIS Quarterly (28:1), 2004, pp. 75-105
-
(2004)
MIS Quarterly
, vol.28
, Issue.1
, pp. 75-105
-
-
Hevner, A.R.1
March, S.T.2
Park, J.3
Ram, S.4
-
20
-
-
85080650414
-
Review of BioPassword Internet Edition
-
Huston, B. "Review of BioPassword Internet Edition," Information Security, 2006, pp. 65
-
(2006)
Information Security
, pp. 65
-
-
Huston, B.1
-
21
-
-
0020832097
-
The Measurement of User Information Satisfaction
-
Ives, B., Olson, M. H., and Baroudi, J. J. "The Measurement of User Information Satisfaction," Communications of the ACM (26:10), 1983, pp. 785-793
-
(1983)
Communications of the ACM
, vol.26
, Issue.10
, pp. 785-793
-
-
Ives, B.1
Olson, M.H.2
Baroudi, J.J.3
-
22
-
-
4243096135
-
The Domino Effect of Password Reuse,"
-
Ives, B., Walsh, K. R., and Schneider, H. "The Domino Effect of Password Reuse," Communications of the ACM (47:4), 2004, pp. 75-78
-
(2004)
Communications of the ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
23
-
-
0000056454
-
On interpreting the effects of repetition: Solving a problem versus remembering a solution
-
Jacoby, L. L. "On interpreting the effects of repetition: Solving a problem versus remembering a solution," Journal of Verbal Learning and Verbal Behavior (17:6), 1978, pp. 649-667
-
(1978)
Journal of Verbal Learning and Verbal Behavior
, vol.17
, Issue.6
, pp. 649-667
-
-
Jacoby, L.L.1
-
24
-
-
85080677131
-
The Great Debates: Pass Phrases vs. Passwords. Part 1 of 3
-
(October 1, 2004a), retrieved 27 March 2007
-
Johansson, J. "The Great Debates: Pass Phrases vs. Passwords. Part 1 of 3," Microsoft TechNet, (October 1, 2004a), retrieved 27 March 2007, http://www.microsoft.com/technet/community/columns/secmgmt/sm1004.mspx
-
Microsoft TechNet
-
-
Johansson, J.1
-
25
-
-
85080730487
-
The Great Debates: Pass Phrases vs. Passwords. Part 2 of 3
-
(November 1, 2004b) retrieved 27 March 2007
-
Johansson, J. "The Great Debates: Pass Phrases vs. Passwords. Part 2 of 3," Microsoft TechNet, (November 1, 2004b) retrieved 27 March 2007, http://www.microsoft.com/technet/community/columns/secmgmt/sm1104.mspx
-
Microsoft TechNet
-
-
Johansson, J.1
-
26
-
-
85080795515
-
The Great Debates: Pass Phrases vs. Passwords. Part 3 of 3
-
(December 1, 2004c) retrieved 27 March 2007
-
Johansson, J. "The Great Debates: Pass Phrases vs. Passwords. Part 3 of 3," Microsoft TechNet, (December 1, 2004c) retrieved 27 March 2007, http://www.microsoft.com/technet/community/columns/secmgmt/sm1204.mspx
-
Microsoft TechNet
-
-
Johansson, J.1
-
27
-
-
33751199191
-
-
Upper Saddle River, New Jersey, Addison-Wesley
-
Johansson, J. M. and Riley, S. Protect Your Windows Network: From Perimeter to Data, Upper Saddle River, New Jersey, Addison-Wesley, 2005
-
(2005)
Protect Your Windows Network: From Perimeter to Data
-
-
Johansson, J.M.1
Riley, S.2
-
28
-
-
0030348707
-
TYPIST: A Theory of Performance in Skilled Typing
-
John, B. E. "TYPIST: A Theory of Performance in Skilled Typing," Human-Computer Interaction (11:4), 1996, pp. 321-355
-
(1996)
Human-Computer Interaction
, vol.11
, Issue.4
, pp. 321-355
-
-
John, B.E.1
-
29
-
-
0141548752
-
The Generation Effect with Nonwords
-
Johns, E. E., and Swanson, L. G. "The Generation Effect with Nonwords," Journal of Experimental Psychology: Learning, Memory, and Cognition (14:1), 1988, pp. 180-190
-
(1988)
Journal of Experimental Psychology: Learning, Memory, and Cognition
, vol.14
, Issue.1
, pp. 180-190
-
-
Johns, E.E.1
Swanson, L.G.2
-
30
-
-
33751168960
-
The Usability of Passphrases for Authentication: An Empirical Field Study
-
Keith, M., Shao, B., and Steinbart, P. "The Usability of Passphrases for Authentication: An Empirical Field Study," International Journal of Human-Computer Studies (65:1), 2007, pp. 17-28
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, Issue.1
, pp. 17-28
-
-
Keith, M.1
Shao, B.2
Steinbart, P.3
-
31
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein, V. I. "Binary codes capable of correcting deletions, insertions, and reversals," Soviet Physics-Doklady (10), 1966, pp. 707-710
-
(1966)
Soviet Physics-Doklady
, vol.10
, pp. 707-710
-
-
Levenshtein, V.I.1
-
32
-
-
0034827117
-
A Re-Evaluation of the Phonological Similarity Effect in Adults' Short-Term Memory of Words and Nonwords
-
Lian, A., Karlsen, P. J., and Winsvold, B. "A Re-Evaluation of the Phonological Similarity Effect in Adults' Short-Term Memory of Words and Nonwords," Memory (9:4-6), 2001, pp. 281-299
-
(2001)
Memory
, vol.9
, Issue.4-6
, pp. 281-299
-
-
Lian, A.1
Karlsen, P.J.2
Winsvold, B.3
-
34
-
-
0342906517
-
Variables Affecting Information Technology End-User Satisfaction: A Meta-Analysis of the Empirical Literature
-
Mahmood, M. A., Burn, J. M., Gemoets, L. A., and Jaquez, C. "Variables Affecting Information Technology End-User Satisfaction: A Meta-Analysis of the Empirical Literature," International Journal of Human-Computer Studies (52:4), 2000, pp. 751-771
-
(2000)
International Journal of Human-Computer Studies
, vol.52
, Issue.4
, pp. 751-771
-
-
Mahmood, M.A.1
Burn, J.M.2
Gemoets, L.A.3
Jaquez, C.4
-
35
-
-
0346313017
-
The Relationship between User Participation and User Satisfaction: An Investigation of Four Contingency Factors
-
McKeen, J. D., Guimaraes, T., and Wetherbe, J. C. "The Relationship between User Participation and User Satisfaction: An Investigation of Four Contingency Factors," MIS Quarterly (18:4), 1994, pp. 427-451
-
(1994)
MIS Quarterly
, vol.18
, Issue.4
, pp. 427-451
-
-
McKeen, J.D.1
Guimaraes, T.2
Wetherbe, J.C.3
-
36
-
-
39749093168
-
The Magical Number Seven, Plus or Minus Two: Some Limits on our Capacity for Processing Information
-
Miller, G. A. "The Magical Number Seven, Plus or Minus Two: Some Limits on our Capacity for Processing Information," Psychological Review (63:2), 1956, pp. 81-97
-
(1956)
Psychological Review
, vol.63
, Issue.2
, pp. 81-97
-
-
Miller, G.A.1
-
37
-
-
0018543411
-
Password Security: A Case History
-
Morris, R. and Thompson, K. "Password Security: A Case History," Communications of the ACM (22:11), 1979, pp. 594-597
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
38
-
-
33745788833
-
Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff
-
November 7-11, 2005, Alexandria, Virginia
-
Narayanan, A. and Shmatikov, V. "Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff," Proceedings of the 12th ACM Conference on Computer and Communications Security CCS '05, November 7-11, 2005, Alexandria, Virginia, pp. 364-372
-
Proceedings of the 12th ACM Conference on Computer and Communications Security CCS '05
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
39
-
-
0034416232
-
Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations
-
Orlikowsky, W. J. "Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations," Organization Science (11:4), 2000, pp. 404-428
-
(2000)
Organization Science
, vol.11
, Issue.4
, pp. 404-428
-
-
Orlikowsky, W.J.1
-
40
-
-
12244272072
-
Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates
-
Pond, R., Podd, J., Bunnell, J., and Henderson, R. "Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates," Computers & Security (19:7), 2000, pp. 645-656
-
(2000)
Computers & Security
, vol.19
, Issue.7
, pp. 645-656
-
-
Pond, R.1
Podd, J.2
Bunnell, J.3
Henderson, R.4
-
41
-
-
0019895650
-
A Password Extension for Improved Human Factors
-
Porter, S. N. "A Password Extension for Improved Human Factors," Computers & Security (1:1), 1982, pp. 54-56
-
(1982)
Computers & Security
, vol.1
, Issue.1
, pp. 54-56
-
-
Porter, S.N.1
-
43
-
-
56749152239
-
-
Hamburg, Germany: University of Hanburg
-
Ringle, C. M., Wende, S., and Will, A, SmartPLS, Hamburg, Germany: University of Hanburg, 2005.
-
(2005)
SmartPLS
-
-
Ringle, C.M.1
Wende, S.2
Will, A.3
-
44
-
-
33745133747
-
EnFilter: A Password Enforcement and Filter Tool Based on Pattern Recognition Techniques
-
Ruffo, G. and Bergadeno, R. "EnFilter: A Password Enforcement and Filter Tool Based on Pattern Recognition Techniques," Lecture Notes in Computer Science (3617), 2005, pp. 75-82
-
(2005)
Lecture Notes in Computer Science
, vol.3617
, pp. 75-82
-
-
Ruffo, G.1
Bergadeno, R.2
-
45
-
-
0010690715
-
Simulating a Skilled Typist: A Study of Skilled Cognitive-Motor Performance
-
Rumelhart, D. E. and Norman, D. A. "Simulating a Skilled Typist: A Study of Skilled Cognitive-Motor Performance," Cognitive Science (6:1), 1982, pp. 1-36
-
(1982)
Cognitive Science
, vol.6
, Issue.1
, pp. 1-36
-
-
Rumelhart, D.E.1
Norman, D.A.2
-
46
-
-
0022718731
-
Perceptual, Cognitive, and Motoric Aspects of Transcription Typing
-
Salthouse, T. A. "Perceptual, Cognitive, and Motoric Aspects of Transcription Typing," Psychological Bulletin (99:3), 1986, pp. 303-319
-
(1986)
Psychological Bulletin
, vol.99
, Issue.3
, pp. 303-319
-
-
Salthouse, T.A.1
-
47
-
-
37049246450
-
How Big is a Chunk?
-
Simon, H. "How Big is a Chunk?" Science (183: 4124), 1974, pp. 482-488
-
(1974)
Science
, vol.183
, Issue.4124
, pp. 482-488
-
-
Simon, H.1
-
48
-
-
0742328620
-
-
Upper Saddle River, New York, Prentice-Hall
-
Skoudis, E. and Liston, T. Counter Hack Reloaded, 2nd Edition, Upper Saddle River, New York, Prentice-Hall, 2006
-
(2006)
Counter Hack Reloaded, 2nd Edition
-
-
Skoudis, E.1
Liston, T.2
-
49
-
-
0000892349
-
The generation effect: Delineation of a phenomenon
-
Slamecka, N. J., and Graf, P. "The generation effect: Delineation of a phenomenon," Journal of Experimental Psychology: Human Learning and Memory (4:6), 1978, pp. 592-604
-
(1978)
Journal of Experimental Psychology: Human Learning and Memory
, vol.4
, Issue.6
, pp. 592-604
-
-
Slamecka, N.J.1
Graf, P.2
-
50
-
-
73549120882
-
Understanding Information Technology Usage: A Test of Competing Models
-
Taylor, S. and Todd, P. A., "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research (6:2), 1995, pp. 144-176
-
(1995)
Information Systems Research
, vol.6
, Issue.2
, pp. 144-176
-
-
Taylor, S.1
Todd, P.A.2
-
51
-
-
0002899814
-
The Influence of Decision Aids on Choice Strategies: An Experimental Analysis of the Role of Cognitive Effort
-
Todd, P. and Benbasat, I. "The Influence of Decision Aids on Choice Strategies: An Experimental Analysis of the Role of Cognitive Effort," Organizational Behavior and Human Decision Processes (60:1), 1994, pp. 36-74
-
(1994)
Organizational Behavior and Human Decision Processes
, vol.60
, Issue.1
, pp. 36-74
-
-
Todd, P.1
Benbasat, I.2
-
52
-
-
0033274708
-
Evaluating the Impact of DSS, Cognitive Effort, and Incentives on Strategy Selection
-
Todd, P., and Benbasat, I. "Evaluating the Impact of DSS, Cognitive Effort, and Incentives on Strategy Selection," Information Systems Research (10:4), 1999, pp. 356-374
-
(1999)
Information Systems Research
, vol.10
, Issue.4
, pp. 356-374
-
-
Todd, P.1
Benbasat, I.2
-
53
-
-
22844456386
-
Inducing Compensatory Information Processing Through Decision Aids That Facilitate Effort Reduction: An Experimental Assessment
-
Todd, P., and Benbasat, I. "Inducing Compensatory Information Processing Through Decision Aids That Facilitate Effort Reduction: An Experimental Assessment," Journal of Behavioral Decision Making (13:1), 2000, pp. 91-106
-
(2000)
Journal of Behavioral Decision Making
, vol.13
, Issue.1
, pp. 91-106
-
-
Todd, P.1
Benbasat, I.2
-
54
-
-
0040008172
-
A Model of the Antecedents of Perceived Ease of Use: Development and Test
-
Venkatesh, V. and Davis, F. D., "A Model of the Antecedents of Perceived Ease of Use: Development and Test," Decision Sciences (27:3), 1996, pp. 451-481
-
(1996)
Decision Sciences
, vol.27
, Issue.3
, pp. 451-481
-
-
Venkatesh, V.1
Davis, F.D.2
-
55
-
-
0033872521
-
A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies
-
Venkatesh, V. and Davis, F. D., "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science (46:2), 2000, pp. 186-204.
-
(2000)
Management Science
, vol.46
, Issue.2
, pp. 186-204
-
-
Venkatesh, V.1
Davis, F.D.2
-
56
-
-
4243198165
-
Enemy at the Gate: Threats to Information Security
-
Whitman, M. E. "Enemy at the Gate: Threats to Information Security," Communications of the ACM (46:8), 2003, pp. 91-95
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.E.1
-
57
-
-
19944381937
-
PassPoints: Design and Longitudinal Evaluation of a Graphical Password System
-
Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., and Memon, N. "PassPoints: Design and Longitudinal Evaluation of a Graphical Password System," International Journal of Human-Computer Studies (63:1-2), 2005, pp. 102-127
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.3
Brodskiy, A.4
Memon, N.5
-
58
-
-
18944367029
-
A Theoretical Integration of User Satisfaction and Technology Acceptance
-
Wixom, B. H. and Todd, P. A. "A Theoretical Integration of User Satisfaction and Technology Acceptance," Information Systems Research (16:1), 2005, pp. 85-102
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 85-102
-
-
Wixom, B.H.1
Todd, P.A.2
-
59
-
-
0003628696
-
-
last accessed on December 9
-
Wren, S. "Vocabulary," (http://www.balancedreading.com/vocabulary.html) last accessed on December 9, 2008
-
(2008)
Vocabulary
-
-
Wren, S.1
-
60
-
-
12844275960
-
Anderson, R., and Grant, A. "Password Memorability and Security: Empirical Results
-
Yan, J., Blackwell, A., Anderson, R., and Grant, A. "Password Memorability and Security: Empirical Results," IEEE Security & Privacy (2:5), 2004, pp. 25-31
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
-
61
-
-
0025545602
-
Cognitive Passwords: The Key to Easy Access Control
-
Zviran, M. and Haga, J. W. "Cognitive Passwords: The Key to Easy Access Control," Computers & Security (9:8), 1990, pp. 723-736
-
(1990)
Computers & Security
, vol.9
, Issue.8
, pp. 723-736
-
-
Zviran, M.1
Haga, J.W.2
-
62
-
-
0003369812
-
A comparison of password techniques for multilevel authentication mechanisms
-
Zviran, M. and Haga, J. W. "A comparison of password techniques for multilevel authentication mechanisms," The Computer Journal (36:3), 1993, pp. 227-237
-
(1993)
The Computer Journal
, vol.36
, Issue.3
, pp. 227-237
-
-
Zviran, M.1
Haga, J.W.2
-
63
-
-
0033277446
-
Password Security: An Empirical Study
-
Zviran, M. and Haga, J. W. "Password Security: An Empirical Study," Journal of Management Information Systems (15:4), 1999, pp. 161-185
-
(1999)
Journal of Management Information Systems
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, J.W.2
|