-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 41-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
77951567474
-
RSA Security Research Shows Volume of Business Passwords Overwhelming End Users and Hindering IT Security Efforts
-
Retrieved May 26, 2009, from
-
Bedford, M. A. (2006). RSA Security Research Shows Volume of Business Passwords Overwhelming End Users and Hindering IT Security Efforts. RSA Press Releases Retrieved May 26, 2009, from http://www.rsa.com/press-release.aspx?id= 7296
-
(2006)
RSA Press Releases
-
-
Bedford, M.A.1
-
3
-
-
7744227917
-
Generating and remembering passwords
-
Brown, A. S., Bracken, E., Zoccoli, S., & Douglas, K. (2004). Generating and remembering passwords. Applied Cognitive Psychology, 18(6), 641-651.
-
(2004)
Applied Cognitive Psychology
, vol.18
, Issue.6
, pp. 641-651
-
-
Brown, A.S.1
Bracken, E.2
Zoccoli, S.3
Douglas, K.4
-
4
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security, 11(3), 431.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
5
-
-
3242808612
-
-
Computer Security Institute San Francisco, CA: Computer Security Institute
-
Computer Security Institute (2007). 2007 CSI Computer Crime and Security Survey. San Francisco, CA: Computer Security Institute.
-
(2007)
2007 CSI Computer Crime and Security Survey
-
-
-
6
-
-
43049152961
-
Theory and measurement of working memory capacity limits
-
B. H. Ross (Ed.), Amsterdam: Elsevier B.V.
-
Cowan, N., Morey, C. C., Chen, Z., , Gilchrist, A. L., & Saults, J. S. (2008). Theory and measurement of working memory capacity limits. In B. H. Ross (Ed.), The Psychology of Learning and Motivation (Vol. 49, pp. 49-104). Amsterdam: Elsevier B.V.
-
(2008)
The Psychology of Learning and Motivation
, vol.49
, pp. 49-104
-
-
Cowan, N.1
Morey, C.C.2
Chen, Z.3
Gilchrist, A.L.4
Saults, J.S.5
-
8
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.D.1
-
11
-
-
0003532271
-
UNIX Password Security - Ten Years Later
-
Feldmeier, D. C., & Karn, P. R. (1989). UNIX Password Security - Ten Years Later. Computer Science, 435, 44-63.
-
(1989)
Computer Science
, vol.435
, pp. 44-63
-
-
Feldmeier, D.C.1
Karn, P.R.2
-
12
-
-
19944387279
-
Why users cannot use security
-
Furnell, S. (2005). Why users cannot use security. Computers & Security, 24, 274-279.
-
(2005)
Computers & Security
, vol.24
, pp. 274-279
-
-
Furnell, S.1
-
13
-
-
33749646491
-
-
San Francisco, CA: Computer Security Institute
-
Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2006). 2006 CSI/FBI Computer Crime and Security Survey (No.8). San Francisco, CA: Computer Security Institute.
-
(2006)
2006 CSI/FBI Computer Crime and Security Survey
, Issue.8
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
14
-
-
0014781338
-
How we remember what we see
-
Haber, R. N. (1970). How we remember what we see. Scientific American, 222(5), 104-112.
-
(1970)
Scientific American
, vol.222
, Issue.5
, pp. 104-112
-
-
Haber, R.N.1
-
15
-
-
77951518080
-
The use of focus groups to examine human factors in computer and information security
-
L. I. Sznelwar, F. L. Mascia & U. B. Montedo (Eds.), Santa Monica, CA: IEA Press
-
Hoonakker, P. L. T., Carayon, P., Deb, J., El Desoki, R., & Veeramani, R. (2008). The use of focus groups to examine human factors in computer and information security. In L. I. Sznelwar, F. L. Mascia & U. B. Montedo (Eds.), Human Factors in Organizational Design and Management - IX (pp. 377-382). Santa Monica, CA: IEA Press.
-
(2008)
Human Factors in Organizational Design and Management
, vol.9
, pp. 377-382
-
-
Hoonakker, P.L.T.1
Carayon, P.2
Deb, J.3
El Desoki, R.4
Veeramani, R.5
-
16
-
-
7744225382
-
Top 10 Security Mistakes
-
Retrieved Nov 13, 2008, from
-
Horowitz, A. (2001). Top 10 Security Mistakes. Computerworld Retrieved Nov 13, 2008, from http://www.computerworld.com/securitytopics/security/story/0, 10801,61986,00.html
-
(2001)
Computerworld
-
-
Horowitz, A.1
-
17
-
-
4243096135
-
The domino effect of password reuse
-
Ives, B., Walsh, K. R., & Schneider, H. (2004). The domino effect of password reuse. Communications of the ACM, 47(4), 75-78.
-
(2004)
Communications of the ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
18
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
Paper presented at the
-
Klein, D. V. (1990). Foiling the cracker: a survey of, and improvements to, password security. Paper presented at the 2nd USENIX Workshop Security.
-
(1990)
2nd USENIX Workshop Security
-
-
Klein, D.V.1
-
19
-
-
35248895598
-
Human Selection of Mnemonic Phrase-based Passwords
-
Paper presented at the
-
Kuo, C., Romanosky, S., & Cranor, L. F. (2006). Human Selection of Mnemonic Phrase-based Passwords. Paper presented at the Second symposium on Usable privacy and security, Pittsburgh, PE.
-
(2006)
Second Symposium on Usable Privacy and Security, Pittsburgh, PE
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
22
-
-
0018543411
-
PASSWORD SECURITY: A CASE HISTORY
-
DOI 10.1145/359168.359172
-
Morris, R., & Thompson, K. (1979). Password Security: A Case History. Communications of the ACM, 22(11), 594-597. (Pubitemid 10431335)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
23
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
O'Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12), 2021-2040.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O'Gorman, L.1
-
24
-
-
84855308630
-
-
Ponemon Institute LLC Elk Rapids, MI: Ponemon Institute LLC
-
Ponemon Institute LLC (2006). 2006 Annual Study: Cost of a Data Breach. Elk Rapids, MI: Ponemon Institute LLC.
-
(2006)
2006 Annual Study: Cost of a Data Breach
-
-
-
25
-
-
35348885452
-
Evaluating Authentication Mechanisms
-
L. Cranor & S. Garfinkel (Eds.)
-
Renaud, K. V. (2005). Evaluating Authentication Mechanisms. In L. Cranor & S. Garfinkel (Eds.), Security and Usability.
-
(2005)
Security and Usability
-
-
Renaud, K.V.1
-
26
-
-
56849108466
-
MySpace Passwords Aren't so Dumb
-
Retrieved Nov 12, 2008, from
-
Schneier, B. (2006). MySpace Passwords Aren't So Dumb. Wired Retrieved Nov 12, 2008, from http://www.wired.com/politics/security/commentary/ securitymatters/2006/12/72300
-
(2006)
Wired
-
-
Schneier, B.1
-
27
-
-
49949146625
-
Recognition memory for words, sentences, and pictures
-
Shepard, R. N. (1967). Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior, 6(1), 156-163.
-
(1967)
Journal of Verbal Learning and Verbal Behavior
, vol.6
, Issue.1
, pp. 156-163
-
-
Shepard, R.N.1
-
28
-
-
57849096551
-
User perceptions of security, convenience and usability for ebanking authentication tokens
-
Weir, C. S., Douglas, G., Carruthers, M., & Jack, M. (2009). User perceptions of security, convenience and usability for ebanking authentication tokens. Computers & Security, 28(1-2), 47-62.
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 47-62
-
-
Weir, C.S.1
Douglas, G.2
Carruthers, M.3
Jack, M.4
-
29
-
-
67650156801
-
Improving multiple-password recall: An empirical study
-
00
-
Zhang, J., Luo, X., Akkaladevi, S., & Ziegelmayer, J. (2009). Improving multiple-password recall: an empirical study. Eur J Inf Syst, 00, 1-12.
-
(2009)
Eur J Inf Syst
, pp. 1-12
-
-
Zhang, J.1
Luo, X.2
Akkaladevi, S.3
Ziegelmayer, J.4
|