-
1
-
-
21244456672
-
Passwords exposed: Users are the weakest link
-
Armstrong, I. (2003). Passwords exposed: Users are the weakest link. SC magazine. Available from: http://www.scmagazine.com/asia/news/article/419622/ passwords-exposed-users-weakest-link/ Retrieved April 22, 2008.
-
(2003)
SC Magazine
-
-
Armstrong, I.1
-
2
-
-
1542691090
-
The use of advance organizers in the learning and retention of meaningful verbal material
-
D.P. Ausubel The use of advance organizers in the learning and retention of meaningful verbal material Journal of Educational Psychology 51 1960 267 272
-
(1960)
Journal of Educational Psychology
, vol.51
, pp. 267-272
-
-
Ausubel, D.P.1
-
4
-
-
84965511184
-
Mnemonic devices: Classification, characteristics, and criteria
-
F.S. Bellezza Mnemonic devices: Classification, characteristics, and criteria Review of Educational Research 51 1981 247 275
-
(1981)
Review of Educational Research
, vol.51
, pp. 247-275
-
-
Bellezza, F.S.1
-
5
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop, and D.V. Klein Improving system security via proactive password checking Computers & Security 14 1995 233 249
-
(1995)
Computers & Security
, vol.14
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
7
-
-
0242708756
-
Safe and sound: A safety-critical approach to security
-
September 10-13, 2001. Cloudcroft, New Mexico.
-
Brostoff, S., & Sasse, M. A. (2001). Safe and sound: A safety-critical approach to security. In Proceedings of the 2001 workshop on new security paradigms (pp. 41-50), September 10-13, 2001. Cloudcroft, New Mexico.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms
, pp. 41-50
-
-
Brostoff, S.1
Sasse, M.A.2
-
11
-
-
11144294785
-
Processing strategies and the generation effect: Implications for making a better reader
-
P.A. deWinstanley, and E.L. Bjork Processing strategies and the generation effect: Implications for making a better reader Memory and Cognition 32 2004 945 955
-
(2004)
Memory and Cognition
, vol.32
, pp. 945-955
-
-
Dewinstanley, P.A.1
Bjork, E.L.2
-
13
-
-
35348884906
-
A large scale study of web password habits
-
May 8-12, 2007. Banff, BC.
-
Florêncio, D., & Herley, C. (2007). A large scale study of web password habits. WWW 2007, May 8-12, 2007. Banff, BC.
-
(2007)
WWW 2007
-
-
Florêncio, D.1
-
17
-
-
77954856395
-
-
Internet Crime Complaint Center
-
Internet Crime Complaint Center (2009). 2008 Internet Crime Report. Available from: http://www.ic3.gov/media/annualreport/2008-IC3Report.pdf Retrieved January 14, 2010.
-
(2009)
2008 Internet Crime Report
-
-
-
19
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
August, 1990. Portland, OR, USA.
-
Klein, D. V. (1990). Foiling the cracker: A survey of, and improvements to, password security. In Proceedings of the second usenix workshop on security (pp. 5-14), August, 1990. Portland, OR, USA.
-
(1990)
Proceedings of the Second Usenix Workshop on Security
, pp. 5-14
-
-
Klein, D.V.1
-
20
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
G.A. Miller The magical number seven, plus or minus two: Some limits on our capacity for processing information Psychological Review 63 1956 81 97
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
23
-
-
80054092539
-
Why are pictures easier to recall than words?
-
A. Paivio, T.B. Rogers, and P.C. Smythe Why are pictures easier to recall than words? Psychonomic Science 11 4 1968 137 138
-
(1968)
Psychonomic Science
, vol.11
, Issue.4
, pp. 137-138
-
-
Paivio, A.1
Rogers, T.B.2
Smythe, P.C.3
-
24
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
R.W. Proctor, M.-C. Lien, K.-P.L. Vu, E.E. Schultz, and G. Salvendy Improving computer security for authentication of users: Influence of proactive password restrictions Journal of Behavior Research Methods, Instruments, and Computers 34 2002 163 169
-
(2002)
Journal of Behavior Research Methods, Instruments, and Computers
, vol.34
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.-C.2
Vu, K.-P.L.3
Schultz, E.E.4
Salvendy, G.5
-
25
-
-
0024768109
-
Passwords in use in a university timesharing environment
-
B.L. Riddle, M.S. Miron, and J.A. Semo Passwords in use in a university timesharing environment Computers and Security 8 1989 569 578
-
(1989)
Computers and Security
, vol.8
, pp. 569-578
-
-
Riddle, B.L.1
Miron, M.S.2
Semo, J.A.3
-
28
-
-
77955230757
-
-
SafeNet www.safenet-inc.com.DownloadedonMay21, 2006
-
SafeNet (2005). 2004 annual password survey results. Available from: www.safenet-inc.com. Downloaded on May 21, 2006.
-
(2005)
2004 Annual Password Survey Results
-
-
-
34
-
-
0031837319
-
Episodic memory, semantic memory, and amnesia
-
L.R. Squire, and S. Zola-Morgan Episodic memory, semantic memory, and amnesia Hippocampus 8 1998 205 211
-
(1998)
Hippocampus
, vol.8
, pp. 205-211
-
-
Squire, L.R.1
Zola-Morgan, S.2
-
35
-
-
84946407085
-
Perception and memory for pictures: Single trial learning of 2500 stimuli
-
L. Standing, J. Conezio, and R.N. Haber Perception and memory for pictures: Single trial learning of 2500 stimuli Psychonomic Science 19 1970 73 74
-
(1970)
Psychonomic Science
, vol.19
, pp. 73-74
-
-
Standing, L.1
Conezio, J.2
Haber, R.N.3
-
36
-
-
38049030296
-
Inkblot Authentication
-
Microsoft Corporation, Redmond, WA, USA.
-
Stubblefield, A., & Simon, D. R. (2004). Inkblot Authentication (Technical Report MSR-TR-2004-85). Microsoft Corporation, Redmond, WA, USA.
-
(2004)
Technical Report MSR-TR-2004-85
-
-
Stubblefield, A.1
Simon, D.R.2
-
37
-
-
77955228154
-
-
CHI 2005, April 2-7, 2005. Portland, OR, USA.
-
Tullis, T. S., & Tedesco, D. P. (2005). Using personal photos as pictorial passwords. CHI 2005, April 2-7, 2005. Portland, OR, USA.
-
(2005)
Using Personal Photos As Pictorial Passwords
-
-
Tullis, T.S.1
Tedesco, D.P.2
-
38
-
-
0000838862
-
Episodic and semantic memory
-
E. Tulving Episodic and semantic memory E. Tulving, W. Donaldson, Organization of memory 1972 Academic Press New York 381 403
-
(1972)
Organization of Memory
, pp. 381-403
-
-
Tulving, E.1
-
39
-
-
44349125124
-
Imposing password restrictions for multiple accounts: Impact on generation and recall of passwords
-
Santa Monica, CA: HFES.
-
Vu, K.-P. L., Bhargav, A., & Proctor, R. W. (2003). Imposing password restrictions for multiple accounts: Impact on generation and recall of passwords. In Proceedings of the 47th annual meeting of the human factors and ergonomics society (pp. 1331-1335). Santa Monica, CA: HFES.
-
(2003)
Proceedings of the 47th Annual Meeting of the Human Factors and Ergonomics Society
, pp. 1331-1335
-
-
Vu, K.-P.L.1
Bhargav, A.2
Proctor, R.W.3
-
40
-
-
84944091033
-
Short-term and long-term retention of passwords generated by first-letter and entire-word mnemonic methods
-
April. Published on CD-ROM
-
Vu, K.-P. L., Cook, J., Bhargav, A., & Proctor, R. W. (2006, April). Short-term and long-term retention of passwords generated by first-letter and entire-word mnemonic methods. In Proceedings of the fifth annual security conference. Published on CD-ROM.
-
(2006)
Proceedings of the Fifth Annual Security Conference
-
-
Vu, K.-P.L.1
Cook, J.2
Bhargav, A.3
Proctor, R.W.4
-
41
-
-
38149070155
-
Examining user privacy policies while shopping online: What are users looking for?
-
July 22-27, 2007. Beijing, China.
-
Vu, K.-P. L., Garcia, F., Nelson, D., Sulatis, J., Creekmur, B., & Chambers, V. (2007). Examining user privacy policies while shopping online: What are users looking for? In Proceedings of the 12th international conference on human-computer interaction (pp. 792-801), July 22-27, 2007. Beijing, China.
-
(2007)
Proceedings of the 12th International Conference on Human-computer Interaction
, pp. 792-801
-
-
Vu, K.-P.L.1
Garcia, F.2
Nelson, D.3
Sulatis, J.4
Creekmur, B.5
Chambers, V.6
-
42
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
K.-P.L. Vu, R.W. Proctor, A. Bhargav-Spantzel, B.-L. Tai, J. Cook, and E.E. Schultz Improving password security and memorability to protect personal and organizational information International Journal of Human-Computer Studies 65 2007 744 757
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, pp. 744-757
-
-
Vu, K.-P.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.4
Cook, J.5
Schultz, E.E.6
-
43
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon PassPoints: Design and longitudinal evaluation of a graphical password system International Journal of Human-Computer Studies 63 2005 102 127
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
44
-
-
12844275960
-
Password memorability and security: Empirical results
-
Yan, J., Blackwell, A., Anderson, R., & Grant, A. (2005). Password memorability and security: Empirical results. IEEE Security & Privacy, 2(5), 25-31.
-
(2005)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|