-
1
-
-
2642549662
-
Computer security and risky computer practices: A rational choice perspective
-
Aytes, K. and Connolly, T., 2004. Computer security and risky computer practices: a rational choice perspective. Journal of Organizational and End-User Computing, 16 (3), 22-40.
-
(2004)
Journal of Organizational and End-User Computing
, vol.16
, Issue.3
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
2
-
-
54949112302
-
Future security approaches and biometrics
-
Boukhonine, S., Krotov, V., and Rupert, B., 2005. Future security approaches and biometrics. Communications of the Association for Information Systems, 16 (48), 937-966.
-
(2005)
Communications of the Association for Information Systems
, vol.16
, Issue.48
, pp. 937-966
-
-
Boukhonine, S.1
Krotov, V.2
Rupert, B.3
-
3
-
-
77951662387
-
User behaviours associated with password security and management
-
Bryant, K. and Campbell, J., 2006. User behaviours associated with password security and management. Australasian Journal of Information Systems, 14 (1), 81-100.
-
(2006)
Australasian Journal of Information Systems
, vol.14
, Issue.1
, pp. 81-100
-
-
Bryant, K.1
Campbell, J.2
-
4
-
-
67650124268
-
The good and not so good of enforcing password composition rules
-
Campbell, J., Kleeman, D., and Ma, W., 2007. The good and not so good of enforcing password composition rules. Information Systems Security, 16 (1), 2-8.
-
(2007)
Information Systems Security
, vol.16
, Issue.1
, pp. 2-8
-
-
Campbell, J.1
Kleeman, D.2
Ma, W.3
-
5
-
-
18544374846
-
Evaluation of the human impact of password authentication practices on information security
-
Carstens, D.S., et al., 2004. Evaluation of the human impact of password authentication practices on information security. Informing Science Journal, 7 (1), 67-85. (Pubitemid 40659984)
-
(2004)
Informing Science
, vol.7
, pp. 67-85
-
-
Carstens, D.S.1
McCauley-Bell, P.R.2
Malone, L.C.3
DeMara, R.F.4
-
6
-
-
12344331343
-
Passwordbased authentication: A system perspective
-
Hawaii, USA
-
Conklin, A., Dietrich, G., and Walz, D., 2004a. Passwordbased authentication: a system perspective. In: Proceedings of the 37th Hawaii International Conference on System Sciences, Hawaii, USA.
-
(2004)
Proceedings of the 37th Hawaii International Conference on System Sciences
-
-
Conklin, A.1
Dietrich, G.2
Walz, D.3
-
8
-
-
4544248322
-
Constant capacity in an immediate serial-recall task: A logical sequel to Miller (1956)
-
DOI 10.1111/j.0956-7976.2004.00732.x
-
Cowan, N., Chen, Z., and Rouder, J.N., 2004. Constant capacity in an immediate serial-recall task: a logical sequel to Miller (1956). Psychological Science, 15 (9), 634-640. (Pubitemid 39234380)
-
(2004)
Psychological Science
, vol.15
, Issue.9
, pp. 634-640
-
-
Cowan, N.1
Chen, Z.2
Rouder, J.N.3
-
9
-
-
79956090133
-
-
[online], [Accessed 20 January 2009]
-
Fedora, 2009. Fedora core 5 [online]. Available from: http:// docs.fedoraproject.org/release-notes/fc5/release-notes-ISO/ [Accessed 20 January 2009].
-
(2009)
Fedora Core 5
-
-
-
10
-
-
18844456006
-
Have you met your organization's computer usage policy?
-
DOI 10.1108/02635570510583280
-
Foltz, C.B., Cronan, T.P., and Jones, T.W., 2005. Have you met your organization's computer usage policy? Industrial Management & Data Systems, 105 (2), 137-146. (Pubitemid 40682971)
-
(2005)
Industrial Management and Data Systems
, vol.105
, Issue.2
, pp. 137-146
-
-
Foltz, C.B.1
Cronan, T.P.2
Jones, T.W.3
-
11
-
-
0141852355
-
Automated choice heuristics
-
T. Gilovich D. Griffin, and D. Kahneman, eds., New York, NY: Cambridge University Press
-
Frederick, S., 2002. Automated choice heuristics. In: T. Gilovich, D. Griffin, and D. Kahneman, eds. Heuristics and biases: the psychology of intuitive judgment. New York, NY: Cambridge University Press, 548-558.
-
(2002)
Heuristics and Biases: The Psychology of Intuitive Judgment
, pp. 548-558
-
-
Frederick, S.1
-
12
-
-
0033633028
-
Authentication and supervision: A survey of user attitudes
-
Furnell, S.M., et al., 2000. Authentication and supervision: a survey of user attitudes. Computers & Security, 19 (6), 529-539.
-
(2000)
Computers & Security
, vol.19
, Issue.6
, pp. 529-539
-
-
Furnell, S.M.1
-
13
-
-
3943091225
-
A long-term trial of alternative user authentication technologies
-
Furnell, S.M., Papadopoulos, I., and Dowland, P., 2004. A long-term trial of alternative user authentication technologies. Information Management & Computer Security, 12 (2), 178-190.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.2
, pp. 178-190
-
-
Furnell, S.M.1
Papadopoulos, I.2
Dowland, P.3
-
14
-
-
0036066894
-
An experimental comparison of secret-based user authentication technologies
-
Irakleous, I., et al., 2002. An experimental comparison of secret-based user authentication technologies. Information Management & Computer Security, 10 (3), 100-108. (Pubitemid 34773231)
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.2-3
, pp. 100-108
-
-
Irakleous, I.1
Furnell, S.M.2
Dowland, P.S.3
Papadaki, M.4
-
15
-
-
4243096135
-
The domino effect of password reuse
-
Ives, B., Walsh, K.R., and Schneider, H., 2004. The domino effect of password reuse. Communications of the ACM, 47 (4), 75-78.
-
(2004)
Communications of the ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
16
-
-
0013305901
-
Representativeness revisited: Attribute substitution in intuitive judgment
-
T. Gilovich D. Griffin, and D. Kahneman, eds., New York, NY: Cambridge University Press
-
Kahneman, D. and Frederick, S., 2002. Representativeness revisited: attribute substitution in intuitive judgment. In: T. Gilovich, D. Griffin, and D. Kahneman, eds. Heuristics and biases: the psychology of intuitive judgment. New York, NY: Cambridge University Press, 49-81.
-
(2002)
Heuristics and Biases: The Psychology of Intuitive Judgment
, pp. 49-81
-
-
Kahneman, D.1
Frederick, S.2
-
17
-
-
0002619432
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein, V., 1965. Binary codes capable of correcting deletions, insertions, and reversals. Problems in Information Transmission, 1, 8-17.
-
(1965)
Problems in Information Transmission
, vol.1
, pp. 8-17
-
-
Levenshtein, V.1
-
18
-
-
79956089633
-
-
Microsoft, [online], [Accessed 20 January 2009]
-
Microsoft, 2009. Forcing strong password usage throughout your organization [online]. Available form: http://technet. microsoft.com/en-us/ library/cc875814.aspx [Accessed 20 January 2009].
-
(2009)
Forcing Strong Password Usage Throughout Your Organization
-
-
-
19
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
Miller, G.A., 1956. The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review, 63, 81-97.
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
20
-
-
18844379696
-
The sad and increasingly deplorable state of internet security
-
February
-
Piscitello, D. and Kent, S., 2003. The sad and increasingly deplorable state of internet security. Business Communications Review, February, 49-53.
-
(2003)
Business Communications Review
, pp. 49-53
-
-
Piscitello, D.1
Kent, S.2
-
22
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
Proctor, R.W., et al., 2002. Improving computer security for authentication of users: influence of proactive password restrictions. Behaviour Research Methods, Instruments & Computers, 34 (2), 163-169.
-
(2002)
Behaviour Research Methods, Instruments & Computers
, vol.34
, Issue.2
, pp. 163-169
-
-
Proctor, R.W.1
-
23
-
-
34547464301
-
Now what was that password again? A more flexible way of identifying and authenticating our seniors
-
DOI 10.1080/01449290601173770, PII 780572024, Designing Computer Systems for and with Older Users
-
Renaud, L. and Ramsay, J., 2007. Now what was that password again? A more flexible way of identifying and authenticating our seniors. Behaviour & Information Technology, 26 (4), July-August, 309-322. (Pubitemid 47171546)
-
(2007)
Behaviour and Information Technology
, vol.26
, Issue.4
, pp. 309-322
-
-
Renaud, K.1
Ramsay, J.2
-
24
-
-
34249671060
-
Operations security awareness: The mind has no firewall
-
Rhodes, K., 2004. Operations security awareness: the mind has no firewall. Computer Security Journal, 16 (2), 27-36.
-
(2004)
Computer Security Journal
, vol.16
, Issue.2
, pp. 27-36
-
-
Rhodes, K.1
-
27
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
Straub, D., 1990. Discovering and disciplining computer abuse in organizations: a field study. MIS Quarterly, 14 (1), 45-57.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-57
-
-
Straub, D.1
-
28
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. and Welke, R., 1998. Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22 (4), 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.1
Welke, R.2
-
29
-
-
77951996290
-
The psychology of password management: A tradeoff between security and convenience
-
Tam, L., Glassman, M., and Vandenwauver, M., 2010. The psychology of password management: a tradeoff between security and convenience. Behaviour & Information Technology, 29 (3), 233-244.
-
(2010)
Behaviour & Information Technology
, vol.29
, Issue.3
, pp. 233-244
-
-
Tam, L.1
Glassman, M.2
Vandenwauver, M.3
-
30
-
-
33947529513
-
Information systems security and human behaviour
-
DOI 10.1080/01449290500330299, PII 773433705
-
Trcek, D., et al., 2007. Information systems security and human behaviour. Behaviour & Information Technology, 26 (2), 113-118. (Pubitemid 46472136)
-
(2007)
Behaviour and Information Technology
, vol.26
, Issue.2
, pp. 113-118
-
-
Trcek, D.1
Trobec, R.2
Pavesic, N.3
Tasic, J.F.4
-
31
-
-
0016264378
-
Judgment under uncertainty: Heuristics and biases
-
Tversky, A. and Kahneman, D., 1974. Judgment under uncertainty: heuristics and biases. Science, 185, 1124-1131.
-
(1974)
Science
, vol.185
, pp. 1124-1131
-
-
Tversky, A.1
Kahneman, D.2
-
32
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
Vu, K.L., et al., 2007. Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies, 65, 744-757.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, pp. 744-757
-
-
Vu, K.L.1
-
33
-
-
2642569127
-
Introducing the check-off password systems (COPS): An advancement in user authentication methods and information security
-
Warkentin, M., Davis, K., and Bekkering, E., 2004. Introducing the check-off password systems (COPS): an advancement in user authentication methods and information security. Journal of Organizational and End User Computing, 16 (3), 41-58.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 41-58
-
-
Warkentin, M.1
Davis, K.2
Bekkering, E.3
-
35
-
-
12844275960
-
Password memorability and security: Empirical results
-
September/ October, 25-30
-
Yan, J., et al., 2004. Password memorability and security: empirical results. IEEE Security and Privacy, September/ October, 25-30.
-
(2004)
IEEE Security and Privacy
-
-
Yan, J.1
-
36
-
-
0033277446
-
Password security: An empirical study
-
Zviran, M. and Haga, W.J., 1999. Password security: an empirical study. Journal of Management Information Systems, 15 (4), 161-185. (Pubitemid 32716609)
-
(1999)
Journal of Management Information Systems
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, W.J.2
|