메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Gamifying authentication

Author keywords

authentication; gamification; human computer interaction; persuasive technology; security; serious games; usability

Indexed keywords

GAMIFICATION; PERSUASIVE TECHNOLOGY; SECURITY; SERIOUS GAMES; USABILITY;

EID: 84869215735     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSA.2012.6320439     Document Type: Conference Paper
Times cited : (16)

References (44)
  • 1
    • 12844259531 scopus 로고    scopus 로고
    • Guest Editors' Introduction: Secure or Usable?
    • L. F. Cranor and S. Garfinkel, "Guest Editors' Introduction: Secure or Usable?" IEEE Security and Privacy, vol. 2, pp. 16-18, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , pp. 16-18
    • Cranor, L.F.1    Garfinkel, S.2
  • 2
    • 0038226921 scopus 로고    scopus 로고
    • Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications
    • Proceedings of the 2002 workshop on New security paradigms, ser. New York, NY, USA: ACM, [Online]. Available
    • D. K. Smetters and R. E. Grinter, "Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications," in Proceedings of the 2002 workshop on New security paradigms, ser. NSPW '02. New York, NY, USA: ACM, 2002, pp. 82-89. [Online]. Available: http://doi.acm.org/10. 1145/844102.844117
    • (2002) NSPW '02 , pp. 82-89
    • Smetters, D.K.1    Grinter, R.E.2
  • 4
    • 12844275960 scopus 로고    scopus 로고
    • Password Memorability and Security: Empirical Results
    • J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," Security Privacy, IEEE, vol. 2, no. 5, pp. 25-31, 2004.
    • (2004) Security Privacy, IEEE , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4
  • 5
    • 12844272841 scopus 로고    scopus 로고
    • In Search of Usable Security: Five Lessons from the Field
    • Sep. [Online]. Available
    • D. Balfanz, G. Durfee, D. K. Smetters, and R. E. Grinter, "In Search of Usable Security: Five Lessons from the Field," IEEE Security & Privacy Magazine, vol. 2, no. 5, pp. 19-24, Sep. 2004. [Online]. Available: http://dx.doi.org/10.1109/MSP.2004.71
    • (2004) IEEE Security & Privacy Magazine , vol.2 , Issue.5 , pp. 19-24
    • Balfanz, D.1    Durfee, G.2    Smetters, D.K.3    Grinter, R.E.4
  • 6
    • 0043232732 scopus 로고    scopus 로고
    • Users Are Not the Enemy
    • Dec. [Online]. Available
    • A. Adams and M. A. Sasse, "Users Are Not the Enemy," Commun. ACM, vol. 42, no. 12, pp. 40-46, Dec. 1999. [Online]. Available: http://doi.acm.org/10.1145/322796.322806
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 8
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the weakest linka human/computer interaction approach to usable and effective security
    • [Online]. Available
    • M. A. Sasse, S. Brostoff, and D. Weirich, "Transforming the weakest linka human/computer interaction approach to usable and effective security," BT Technology Journal, vol. 19, no. 3, pp. 122-131, 2001. [Online]. Available: http://www.springerlink.com/index/T0X7W437200G4868.pdf
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 10
    • 0006456816 scopus 로고
    • Restating the Foundation of Information Security
    • D. Parker, "Restating the Foundation of Information Security," in National Computer Security Conference, vol. 14, 1991, pp. 480-493.
    • (1991) National Computer Security Conference , vol.14 , pp. 480-493
    • Parker, D.1
  • 11
    • 0242708745 scopus 로고    scopus 로고
    • Pretty Good Persuasion: A First Step towards Effective Password Security in the Real World
    • Proceedings of the 2001 workshop on New security paradigms, ser. New York, NY, USA: ACM, [Online]. Available
    • D. Weirich and M. A. Sasse, "Pretty Good Persuasion: A First Step towards Effective Password Security in the Real World," in Proceedings of the 2001 workshop on New security paradigms, ser. NSPW '01. New York, NY, USA: ACM, 2001, pp. 137-143. [Online]. Available: http://0-doi.acm.org.innopac.up.ac. za/10.1145/508171.508195
    • (2001) NSPW '01 , pp. 137-143
    • Weirich, D.1    Sasse, M.A.2
  • 12
    • 70149118851 scopus 로고    scopus 로고
    • Entertainment Software Association, Tech. Rep., [Online]. Available
    • Entertainment Software Association, "Essential Facts About the Computer and Video Game Industry," Tech. Rep., 2011. [Online]. Available: http://www.theesa.com/facts/pdfs/ESA\ EF\ 2011.pdf
    • (2011) Essential Facts about the Computer and Video Game Industry
  • 13
    • 68149167538 scopus 로고    scopus 로고
    • Games at work: The recreational use of computer games during working hours
    • [Online]. Available
    • L. Reinecke, "Games at work: the recreational use of computer games during working hours." Cyberpsychology and Behavior, vol. 12, no. 4, pp. 461-465, 2009. [Online]. Available: http: //www.ncbi.nlm.nih.gov/pubmed/19619038
    • (2009) Cyberpsychology and Behavior , vol.12 , Issue.4 , pp. 461-465
    • Reinecke, L.1
  • 15
    • 77950853745 scopus 로고    scopus 로고
    • Blissfully Productive: Grouping and Cooperation in World of Warcraft Instance Runs
    • Proceedings of the 2008 ACM conference on Computer supported cooperative work, ser. New York, NY, USA: ACM, [Online]. Available
    • S. Bardzell, J. Bardzell, T. Pace, and K. Reed, "Blissfully Productive: Grouping and Cooperation in World of Warcraft Instance Runs," in Proceedings of the 2008 ACM conference on Computer supported cooperative work, ser. CSCW '08. New York, NY, USA: ACM, 2008, pp. 357-360. [Online]. Available: http://doi.acm.org/10.1145/1460563. 1460621
    • (2008) CSCW '08 , pp. 357-360
    • Bardzell, S.1    Bardzell, J.2    Pace, T.3    Reed, K.4
  • 16
    • 64949133458 scopus 로고    scopus 로고
    • The path taken: Consequences of attaining intrinsic and extrinsic aspirations in postcollege life
    • [Online]. Available
    • C. P. Niemiec, R. M. Ryan, and E. L. Deci, "The path taken: Consequences of attaining intrinsic and extrinsic aspirations in postcollege life," Journal of Research in Personality, vol. 43, no. 3, pp. 291-306, 2009. [Online]. Available: http://www.sciencedirect.com/science/article/pii/ S0092656608001360
    • (2009) Journal of Research in Personality , vol.43 , Issue.3 , pp. 291-306
    • Niemiec, C.P.1    Ryan, R.M.2    Deci, E.L.3
  • 17
    • 84870522369 scopus 로고    scopus 로고
    • [Online]. Available
    • C. Bateman, "Top Ten Video Game Emotions," 2008. [Online]. Available: http://onlyagame.typepad.com/only\ a\ game/2008/04/top-ten-videoga. html
    • (2008) Top Ten Video Game Emotions
    • Bateman, C.1
  • 18
    • 70350086107 scopus 로고    scopus 로고
    • Web at GamesLearningSociety, GLS University of Wisconsin-Madison, Tech. Rep., Feb.
    • T. Susi, M. Johannesson, and P. Backlund, "Serious Games: An Overview," Web at GamesLearningSociety, GLS University of Wisconsin-Madison, Tech. Rep., Feb. 2007.
    • (2007) Serious Games: An Overview
    • Susi, T.1    Johannesson, M.2    Backlund, P.3
  • 20
    • 84870504043 scopus 로고    scopus 로고
    • [Online]. Available
    • Khan Academy, "Khan Academy: About," 2012. [Online]. Available: http://www.khanacademy.org/about
    • (2012) Khan Academy: about
  • 21
    • 84870496269 scopus 로고    scopus 로고
    • [Online]. Available
    • Quest to Learn, "Learning Model." [Online]. Available: http://q2l.org/node/13
    • Learning Model.
  • 22
    • 84870525230 scopus 로고    scopus 로고
    • [Online]. Available
    • K. Davis, "Chore Wars," 2007. [Online]. Available: http://www. chorewars.com
    • (2007) Chore Wars
    • Davis, K.1
  • 23
    • 84870546133 scopus 로고    scopus 로고
    • University of Washington, [Online]. Available
    • University of Washington, "The Science Behind Foldit," 2008. [Online]. Available: http://fold.it/portal/info/science
    • (2008) The Science behind Foldit
  • 24
    • 84870538508 scopus 로고    scopus 로고
    • [Online]. Available
    • R. Talens and B. Wang, "Fitocracy," 2012. [Online]. Available: http://www.fitocracy.com/home/
    • (2012) Fitocracy
    • Talens, R.1    Wang, B.2
  • 29
    • 84900557334 scopus 로고    scopus 로고
    • Influencing users towards better passwords: Persuasive cued clickpoints
    • Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction ser. Swinton, UK, UK: British Computer Society, [Online]. Available
    • S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, "Influencing users towards better passwords: persuasive cued clickpoints," in Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1, ser. BCS-HCI '08. Swinton, UK, UK: British Computer Society, 2008, pp. 121-130. [Online]. Available: http: //0-dl.acm.org.innopac.up.ac.za/citation.cfm?id= 1531514.1531531
    • (2008) BCS-HCI '08 , vol.1 , pp. 121-130
    • Chiasson, S.1    Forget, A.2    Biddle, R.3    Van Oorschot, P.C.4
  • 30
    • 70349182104 scopus 로고    scopus 로고
    • Lessons from brain age on persuasion for computer security
    • Proceedings of the 27th international conference extended abstracts on Human factors in computing systems, ser. New York, NY, USA: ACM, [Online]. Available
    • A. Forget, S. Chiasson, and R. Biddle, "Lessons from brain age on persuasion for computer security," in Proceedings of the 27th international conference extended abstracts on Human factors in computing systems, ser. CHI EA '09. New York, NY, USA: ACM, 2009, pp. 4435-4440. [Online]. Available: http: //0-doi.acm.org.innopac.up.ac.za/10.1145/1520340.1520679
    • (2009) CHI EA '09 , pp. 4435-4440
    • Forget, A.1    Chiasson, S.2    Biddle, R.3
  • 32
    • 0004005570 scopus 로고
    • E. Avedon and B. Sutton-Smith, Eds. J. Wiley, [Online]. Available
    • E. M. Avedon and B. Sutton-Smith, The study of games, E. Avedon and B. Sutton-Smith, Eds. J. Wiley, 1971. [Online]. Available: http://www.tcrecord.org/ library/abstract.asp?contentid=1604
    • (1971) The Study of Games
    • Avedon, E.M.1    Sutton-Smith, B.2
  • 33
    • 0004264804 scopus 로고    scopus 로고
    • University of Illinois Press, [Online]. Available
    • R. Caillois and M. Barash, Man, play, and games. University of Illinois Press, 2001. [Online]. Available: http://books.google.co.za/books?id= bDjOPsjzfC4C
    • (2001) Man, Play, and Games
    • Caillois, R.1    Barash, M.2
  • 37
    • 28344431524 scopus 로고
    • Oxford University Press, [Online]. Available
    • D. S. Parlett, The Oxford guide to card games. Oxford University Press, 1990. [Online]. Available: http://books.google.co.za/books?id=gtPfAAAAMAAJ
    • (1990) The Oxford Guide to Card Games
    • Parlett, D.S.1
  • 38
    • 0038640205 scopus 로고
    • University Press of America, [Online]. Available
    • C. C. Abt, Serious Games. University Press of America, 1987. [Online]. Available: http://books.google.co.za/books?id=axUs9HA-hF8C
    • (1987) Serious Games
    • Abt, C.C.1
  • 39
    • 1342338687 scopus 로고    scopus 로고
    • I Have No Words & I Must Design: Toward a Critical Vocabulary for Games
    • F. Mäyrä, Ed., Texas State Techincal College. Tampere University Press, [Online]. Available
    • G. Costikyan, "I Have No Words & I Must Design : Toward a Critical Vocabulary for Games," in Computer, F. Mäyrä, Ed., vol. 4, no. 1, Texas State Techincal College. Tampere University Press, 2002, pp. 9-33. [Online]. Available: http://www.digra.org: 8080/Plone/dl/db/05164.51146. pdf
    • (2002) Computer , vol.4 , Issue.1 , pp. 9-33
    • Costikyan, G.1
  • 41
    • 1642363033 scopus 로고    scopus 로고
    • Taking a Graphical Approach to the Password
    • Jul.
    • L. D. Paulson, "Taking a Graphical Approach to the Password," Computer, vol. 35, no. 7, p. 19, Jul. 2002.
    • (2002) Computer , vol.35 , Issue.7 , pp. 19
    • Paulson, L.D.1
  • 43
    • 49949146625 scopus 로고
    • Recognition memory for words, sentences, and pictures
    • [Online]. Available
    • R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol. 6, no. 1, pp. 156-163, 1967. [Online]. Available: http://www.sciencedirect. com/science/article/pii/S0022537167800677
    • (1967) Journal of Verbal Learning and Verbal Behavior , vol.6 , Issue.1 , pp. 156-163
    • Shepard, R.N.1
  • 44
    • 84870525225 scopus 로고    scopus 로고
    • Helping Users Create and Remember More Secure Text Passwords
    • Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - ser. Swinton, UK, UK: British Computer Society, [Online]. Available
    • A. Forget, "Helping Users Create and Remember More Secure Text Passwords," in Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 2, ser. BCS-HCI '08. Swinton, UK, UK: British Computer Society, 2008, pp. 247-248. [Online]. Available: http://0-dl.acm.org.innopac.up.ac.za/citation.cfm?id= 1531826.1531907
    • (2008) BCS-HCI '08 , vol.2 , pp. 247-248
    • Forget, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.