-
1
-
-
34547467347
-
Usability research for the elderly people
-
Akatsu, H. & Miki, H. [2004], Usability Research for the Elderly People, Oki Technical Review 71(3).
-
(2004)
Oki Technical Review
, vol.71
, Issue.3
-
-
Akatsu, H.1
Miki, H.2
-
2
-
-
0036131436
-
Visually and motor-based knowledge of letters: Evidence from a pure alexia patient
-
Bartomoleo, P, Bachoud-Lévi, A.-C, Chokron, S. & Degos, J.-D. [2002], Visually and Motor-based Knowledge of Letters: Evidence from a Pure Alexia Patient, Neurosychologica 40(8), 1363-71.
-
(2002)
Neurosychologica
, vol.40
, Issue.8
, pp. 1363-1371
-
-
Bartomoleo, P.1
Bachoud-Lévi, A.-C.2
Chokron, S.3
Degos, J.-D.4
-
3
-
-
84864037884
-
-
BBC [2003], Clue to Old Age Memory Loss. http://news.bbc.co.Uk/2/hi/ health/3040203.stm.
-
(2003)
Clue to Old Age Memory Loss
-
-
-
4
-
-
84962052143
-
Identity theft, social security numbers, and the web
-
Berghel, H. [2000], Identity Theft, Social Security Numbers, and the Web, Communications of the ACM 43(2111-21.
-
(2000)
Communications of the ACM
, vol.43
, pp. 2111-2121
-
-
Berghel, H.1
-
5
-
-
79955925687
-
-
last accessed 2005-04-13
-
Braghin, C. [2000], Biometric Authentication. Available at http://citeseer.ist.psu.edu/436492.html (last accessed 2005-04-13).
-
(2000)
Biometric Authentication
-
-
Braghin, C.1
-
8
-
-
84864052708
-
Social engineering: A tip of the iceberg
-
Damle, P. [2002], Social Engineering: A Tip of the Iceberg, Information Systems Control Journal 2. http://www.isaca.org/Template.cfm?Section= Archives&CONTENTID=17032&TEMPLATE=/ContentManagement/ContentDisplay.cfm.
-
(2002)
Information Systems Control Journal
, vol.2
-
-
Damle, P.1
-
9
-
-
0037668484
-
VIP: A visual approach to user authentication
-
S. Levialdi (ed.). ACM Press
-
De Angeli, A., Coutts, M., Coventry, L. & Johnson, G. I. [2002], VIP: A Visual Approach to User Authentication, in S. Levialdi (ed.). Proceedings of the Conference on Advanced Visual Interface (AVI2002) ACM Press, pp.316-23.
-
(2002)
Proceedings of the Conference on Advanced Visual Interface (AVI2002)
, pp. 316-323
-
-
De Angeli, A.1
Coutts, M.2
Coventry, L.3
Johnson, G.I.4
-
10
-
-
85084161493
-
Déjà vu: A user study using images for authentication
-
Denver, Colorado
-
Dhamija, R. & Perrig, A. [2000], Déjà vu: A User Study Using Images for Authentication, in Proceedings of 9th USENIX Security Symposium, The USENDC Association,Denver, Colorado, pp.45-58. http://www.usenix.org/events/sec2000/fulLpapers/dhaniija/dhamija.pdf.
-
(2000)
Proceedings of 9th USENIX Security Symposium
, pp. 45-58
-
-
Dhamija, R.1
Perrig, A.2
-
12
-
-
0034140877
-
Protecting secret keys with personal entropy
-
Ellison, C, Hall, C, Milbert, R. & Schneier, B. [2000], Protecting Secret Keys with Personal Entropy, Future Generation Computer Systems 16, 311-8.
-
(2000)
Future Generation Computer Systems
, vol.16
, pp. 311-318
-
-
Ellison, C.1
Hall, C.2
Milbert, R.3
Schneier, B.4
-
13
-
-
33745910352
-
Global aging
-
JANUARY 31
-
Engardio, R & Matlack, C. [2005], Global Aging. Business Week, JANUARY 31, http://www.businessweek.com/magazine/content/05-05/b3918011.htm.
-
(2005)
Business Week
-
-
Engardio, R.1
Matlack, C.2
-
14
-
-
0038049672
-
Users' conceptions of risks and harms on the web: A comparative study
-
D. Wixon (ed.). ACM Press
-
Friedman, B., Hurley, D., Howe, D. C, Nissenbaum, H. & Felten, E. [2002], Users' Conceptions of Risks and Harms on the Web: A Comparative Study, in D. Wixon (ed.). Proceedings of SIGCHI Conference on Human Factors in Computing Systems: Changing our World, Changing Ourselves (CHI'02), CHI Letters 4(1), ACM Press, pp.614-15.
-
(2002)
Proceedings of SIGCHI Conference on Human Factors in Computing Systems: Changing Our World, Changing Ourselves (CHI'02), CHI Letters
, vol.4
, Issue.1
, pp. 614-615
-
-
Friedman, B.1
Hurley, D.2
Howe, D.C.3
Nissenbaum, H.4
Felten, E.5
-
16
-
-
84864045656
-
Design of smart card systems to meet the needs of disabled and elderly persons
-
Gill, J. [2004], Design of Smart Card Systems to Meet the Needs of Disabled and Elderly Persons. Tiresias.org Scientific and Technological Reports, http://www.tiresias.org/reports/ecart.htm.
-
(2004)
Tiresias.org Scientific and Technological Reports
-
-
Gill, J.1
-
18
-
-
0035846641
-
Recognition of familiar handwriting in stroke and dementia
-
Heckman, J. G., Lang, C. J. & Neundorfer, B. [2001], Recognition of Familiar Handwriting in Stroke and Dementia, Neurology 57(11), 2128-31.
-
(2001)
Neurology
, vol.57
, Issue.11
, pp. 2128-2131
-
-
Heckman, J.G.1
Lang, C.J.2
Neundorfer, B.3
-
19
-
-
84864031317
-
-
IASEP. Purdue Research Foundation, Center for Information Assurance and Security and the Indiana Assessment System of Education Proficiencies
-
IASEP [2000], Data Security Protocol for Education, http://iasep.soe. purdue.edu/Protocol/home-page.htm. Center for Information Assurance and Security and the Indiana Assessment System of Education Proficiencies. Purdue Research Foundation.
-
(2000)
Data Security Protocol for Education
-
-
-
21
-
-
84864045661
-
The importance of being secure: The ROI of web security
-
Leonard, K. [2003], The Importance of Being Secure: The ROI of Web Security, Information Systems Control Journal 5. http://www.isaca.org/Template. cfm?Section=Archives&CONTENTID=16729&TEMPLATE=/ContentManagement/ ContentDisplay.cfm.
-
(2003)
Information Systems Control Journal
, vol.5
-
-
Leonard, K.1
-
22
-
-
0042425758
-
Visual presentation of single letters activates a premotor area involved in writing
-
Longcamp, M., Anton, J. L., Roth, M. & Velay, J. L. [2003], Visual Presentation of Single Letters Activates a Premotor Area Involved in Writing, Neuroimage 19(4), 1492-500.
-
(2003)
Neuroimage
, vol.19
, Issue.4
, pp. 1492-1500
-
-
Longcamp, M.1
Anton, J.L.2
Roth, M.3
Velay, J.L.4
-
23
-
-
0031857137
-
Postal surveys versus electronic mail surveys. The tortoise and the hare revisited
-
Mavis, B. E. & Brocato, J. J. [1998], Postal Surveys versus Electronic Mail Surveys. The Tortoise and the Hare Revisited, Evaluation & The Health Professions 21(3), 395-408.
-
(1998)
Evaluation & the Health Professions
, vol.21
, Issue.3
, pp. 395-408
-
-
Mavis, B.E.1
Brocato, J.J.2
-
24
-
-
84864047895
-
-
Miller, J. C. [2000], Risk Assessment for your Web Site, http://www.irmi.com/irmicom/expert/articles/2000/schoenfeld09.aspx. IRMLcom. International Risk Management Institute.
-
(2000)
Risk Assessment for Your Web Site
-
-
Miller, J.C.1
-
25
-
-
0022672155
-
Memory for pictures: Does an age-related decline exist?
-
Park, D. C, Puglisi, J. T. & Smith, A. D. [1986], Memory for pictures: Does an age-related decline exist?. Journal of Psychology and Aging 1(1), 11-7.
-
(1986)
Journal of Psychology and Aging
, vol.1
, Issue.1
, pp. 11-17
-
-
Park, D.C.1
Puglisi, J.T.2
Smith, A.D.3
-
26
-
-
9944240263
-
My password is here! An investigation into visuospatial authentication mechanisms
-
Renaud, K. & De Angeli, A. [2004], My Password is Here! An Investigation into Visuospatial Authentication Mechanisms, Interacting with Computers 16(6), 1017-41.
-
(2004)
Interacting with Computers
, vol.16
, Issue.6
, pp. 1017-1041
-
-
Renaud, K.1
De Angeli, A.2
-
27
-
-
33751109662
-
Quantification of authentication mechanisms - A usabiuty perspective
-
Renaud, K. V. [2004], Quantification of Authentication Mechanisms - A UsabiUty Perspective, Journal of Web Engineering 3(2), 95-123.
-
(2004)
Journal of Web Engineering
, vol.3
, Issue.2
, pp. 95-123
-
-
Renaud, K.V.1
-
28
-
-
84864045659
-
Risk assessment tools: A primer
-
Schreider, T. [2003], Risk Assessment Tools: A Primer, Information Systems Control Journal 2. http://www.isaca.org/TemplateRedirect.cfm?template=/ ContentManagement/ContentDisplay.cfm&ContentID=16222.
-
(2003)
Information Systems Control Journal
, vol.2
-
-
Schreider, T.1
-
29
-
-
0029042494
-
The efficacy of kinesthetic reading treatment for pure alexia
-
Seki, K., Yajima, M. & Sugishita, M. [1995], The Efficacy of Kinesthetic Reading Treatment for Pure Alexia, Neuropsychologica 33(5), 595-609.
-
(1995)
Neuropsychologica
, vol.33
, Issue.5
, pp. 595-609
-
-
Seki, K.1
Yajima, M.2
Sugishita, M.3
-
30
-
-
33745571682
-
Individuality of numerals
-
A. Antonacopoulos (ed.), IEEE Computer Society Press, Edinburgh, Scotland
-
Srihari, S. N., Tomai, C, Lee, S. & Zhang, B. [2003], Individuality of Numerals, in A. Antonacopoulos (ed.), Proceedings of the Seventh IEEE International Conference on Document Analysis and Recognition, IEEE Computer Society Press, Edinburgh, Scotland, pp. 1096-100.
-
(2003)
Proceedings of the Seventh IEEE International Conference on Document Analysis and Recognition
, pp. 1096-1100
-
-
Srihari, S.N.1
Tomai, C.2
Lee, S.3
Zhang, B.4
-
31
-
-
0035756262
-
Making grandma's data secure: A security architecture for home telemedicine
-
S. Bakken (ed.). AMIA
-
Starren, J., Sengupta, S., Hripcsak, G., Ring, G., Klerer, R. & Shea, S. [2001], Making Grandma's Data Secure: A Security Architecture for Home Telemedicine, in S. Bakken (ed.). Proceedings of the AMlA Symposium, AMIA, pp.657-61.
-
(2001)
Proceedings of the AMlA Symposium
, pp. 657-661
-
-
Starren, J.1
Sengupta, S.2
Hripcsak, G.3
Ring, G.4
Klerer, R.5
Shea, S.6
-
32
-
-
0035600051
-
Theory of time preference
-
Trostel, P A. & Taylor, G. A. [2001], Theory of Time Preference, Economic Inquiry 39(3), 379-95.
-
(2001)
Economic Inquiry
, vol.39
, Issue.3
, pp. 379-395
-
-
Trostel, P.A.1
Taylor, G.A.2
-
33
-
-
84864031318
-
Fighting security breaches and cyberattacks with twofactor authentication technology
-
Walker, T [2001], Fighting Security Breaches and Cyberattacks with Twofactor Authentication Technology, Information Systems Control Journal 2. http://www.isaca.org/TemplateRedirect.cfm?template=/ContentManagement/ ContentDisplay.cfm&ContentID=17187.
-
(2001)
Information Systems Control Journal
, vol.2
-
-
Walker, T.1
-
34
-
-
34547490844
-
Secure authentication schemes suitable for an associative memory
-
Leibniz Center for Research in Computer Science
-
Weinshall, D. [2004], Secure Authentication Schemes suitable for an Associative Memory, Technical Report TR 2004-30, Hebrew University, Leibniz Center for Research in Computer Science.
-
(2004)
Technical Report TR 2004-30, Hebrew University
-
-
Weinshall, D.1
-
35
-
-
0020433741
-
Do we see what makes our script characteristic - Or do we only feel it? Modes of sensory control in handwriting
-
Zimmer, A. [1982], Do We See What Makes Our Script Characteristic - Or Do We Only Feel It? Modes of Sensory Control in Handwriting, Psychological Research 44(2).
-
(1982)
Psychological Research
, vol.44
, Issue.2
-
-
Zimmer, A.1
|