-
1
-
-
12844259531
-
Guest Editors' Introduction: Secure or Usable?
-
L. F. Cranor and S. Garfinkel, "Guest Editors' Introduction: Secure or Usable?" IEEE Security and Privacy, vol. 2, pp. 16-18, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, pp. 16-18
-
-
Cranor, L.F.1
Garfinkel, S.2
-
2
-
-
0038226921
-
Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications
-
Proceedings of the 2002 workshop on New security paradigms, ser. New York, NY, USA: ACM, [Online]. Available
-
D. K. Smetters and R. E. Grinter, "Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications," in Proceedings of the 2002 workshop on New security paradigms, ser. NSPW '02. New York, NY, USA: ACM, 2002, pp. 82-89. [Online]. Available: http://doi.acm.org/10. 1145/844102.844117
-
(2002)
NSPW '02
, pp. 82-89
-
-
Smetters, D.K.1
Grinter, R.E.2
-
4
-
-
12844275960
-
Password Memorability and Security: Empirical Results
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," Security Privacy, IEEE, vol. 2, no. 5, pp. 25-31, 2004.
-
(2004)
Security Privacy, IEEE
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
5
-
-
12844272841
-
In Search of Usable Security: Five Lessons from the Field
-
Sep. [Online]. Available
-
D. Balfanz, G. Durfee, D. K. Smetters, and R. E. Grinter, "In Search of Usable Security: Five Lessons from the Field," IEEE Security & Privacy Magazine, vol. 2, no. 5, pp. 19-24, Sep. 2004. [Online]. Available: http://dx.doi.org/10.1109/MSP.2004.71
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.5
, pp. 19-24
-
-
Balfanz, D.1
Durfee, G.2
Smetters, D.K.3
Grinter, R.E.4
-
6
-
-
0043232732
-
Users Are Not the Enemy
-
Dec. [Online]. Available
-
A. Adams and M. A. Sasse, "Users Are Not the Enemy," Commun. ACM, vol. 42, no. 12, pp. 40-46, Dec. 1999. [Online]. Available: http://doi.acm.org/10.1145/322796.322806
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
7
-
-
79957930613
-
Gamification: Using Game-Design Elements in Non-Gaming Contexts
-
[Online]. Available
-
S. Deterding, M. Sicart, L. Nacke, K. O'Hara, and D. Dixon, "Gamification: Using Game-Design Elements in Non-Gaming Contexts," Sociology The Journal Of The British Sociological Association, vol. 66, pp. 2425-2428, 2011. [Online]. Available: http://dl.acm.org/citation. cfm?id=1979742.1979575
-
(2011)
Sociology the Journal of the British Sociological Association
, vol.66
, pp. 2425-2428
-
-
Deterding, S.1
Sicart, M.2
Nacke, L.3
O'Hara, K.4
Dixon, D.5
-
8
-
-
0035387175
-
Transforming the weakest linka human/computer interaction approach to usable and effective security
-
[Online]. Available
-
M. A. Sasse, S. Brostoff, and D. Weirich, "Transforming the weakest linka human/computer interaction approach to usable and effective security," BT Technology Journal, vol. 19, no. 3, pp. 122-131, 2001. [Online]. Available: http://www.springerlink.com/index/T0X7W437200G4868.pdf
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
10
-
-
0006456816
-
Restating the Foundation of Information Security
-
D. Parker, "Restating the Foundation of Information Security," in National Computer Security Conference, vol. 14, 1991, pp. 480-493.
-
(1991)
National Computer Security Conference
, vol.14
, pp. 480-493
-
-
Parker, D.1
-
11
-
-
0242708745
-
Pretty Good Persuasion: A First Step towards Effective Password Security in the Real World
-
Proceedings of the 2001 workshop on New security paradigms, ser. New York, NY, USA: ACM, [Online]. Available
-
D. Weirich and M. A. Sasse, "Pretty Good Persuasion: A First Step towards Effective Password Security in the Real World," in Proceedings of the 2001 workshop on New security paradigms, ser. NSPW '01. New York, NY, USA: ACM, 2001, pp. 137-143. [Online]. Available: http://0-doi.acm.org.innopac.up.ac. za/10.1145/508171.508195
-
(2001)
NSPW '01
, pp. 137-143
-
-
Weirich, D.1
Sasse, M.A.2
-
12
-
-
70149118851
-
-
Entertainment Software Association, Tech. Rep., [Online]. Available
-
Entertainment Software Association, "Essential Facts About the Computer and Video Game Industry," Tech. Rep., 2011. [Online]. Available: http://www.theesa.com/facts/pdfs/ESA\ EF\ 2011.pdf
-
(2011)
Essential Facts about the Computer and Video Game Industry
-
-
-
13
-
-
68149167538
-
Games at work: The recreational use of computer games during working hours
-
[Online]. Available
-
L. Reinecke, "Games at work: the recreational use of computer games during working hours." Cyberpsychology and Behavior, vol. 12, no. 4, pp. 461-465, 2009. [Online]. Available: http: //www.ncbi.nlm.nih.gov/pubmed/19619038
-
(2009)
Cyberpsychology and Behavior
, vol.12
, Issue.4
, pp. 461-465
-
-
Reinecke, L.1
-
15
-
-
77950853745
-
Blissfully Productive: Grouping and Cooperation in World of Warcraft Instance Runs
-
Proceedings of the 2008 ACM conference on Computer supported cooperative work, ser. New York, NY, USA: ACM, [Online]. Available
-
S. Bardzell, J. Bardzell, T. Pace, and K. Reed, "Blissfully Productive: Grouping and Cooperation in World of Warcraft Instance Runs," in Proceedings of the 2008 ACM conference on Computer supported cooperative work, ser. CSCW '08. New York, NY, USA: ACM, 2008, pp. 357-360. [Online]. Available: http://doi.acm.org/10.1145/1460563. 1460621
-
(2008)
CSCW '08
, pp. 357-360
-
-
Bardzell, S.1
Bardzell, J.2
Pace, T.3
Reed, K.4
-
16
-
-
64949133458
-
The path taken: Consequences of attaining intrinsic and extrinsic aspirations in postcollege life
-
[Online]. Available
-
C. P. Niemiec, R. M. Ryan, and E. L. Deci, "The path taken: Consequences of attaining intrinsic and extrinsic aspirations in postcollege life," Journal of Research in Personality, vol. 43, no. 3, pp. 291-306, 2009. [Online]. Available: http://www.sciencedirect.com/science/article/pii/ S0092656608001360
-
(2009)
Journal of Research in Personality
, vol.43
, Issue.3
, pp. 291-306
-
-
Niemiec, C.P.1
Ryan, R.M.2
Deci, E.L.3
-
17
-
-
84870522369
-
-
[Online]. Available
-
C. Bateman, "Top Ten Video Game Emotions," 2008. [Online]. Available: http://onlyagame.typepad.com/only\ a\ game/2008/04/top-ten-videoga. html
-
(2008)
Top Ten Video Game Emotions
-
-
Bateman, C.1
-
18
-
-
70350086107
-
-
Web at GamesLearningSociety, GLS University of Wisconsin-Madison, Tech. Rep., Feb.
-
T. Susi, M. Johannesson, and P. Backlund, "Serious Games: An Overview," Web at GamesLearningSociety, GLS University of Wisconsin-Madison, Tech. Rep., Feb. 2007.
-
(2007)
Serious Games: An Overview
-
-
Susi, T.1
Johannesson, M.2
Backlund, P.3
-
20
-
-
84870504043
-
-
[Online]. Available
-
Khan Academy, "Khan Academy: About," 2012. [Online]. Available: http://www.khanacademy.org/about
-
(2012)
Khan Academy: about
-
-
-
21
-
-
84870496269
-
-
[Online]. Available
-
Quest to Learn, "Learning Model." [Online]. Available: http://q2l.org/node/13
-
Learning Model.
-
-
-
22
-
-
84870525230
-
-
[Online]. Available
-
K. Davis, "Chore Wars," 2007. [Online]. Available: http://www. chorewars.com
-
(2007)
Chore Wars
-
-
Davis, K.1
-
23
-
-
84870546133
-
-
University of Washington, [Online]. Available
-
University of Washington, "The Science Behind Foldit," 2008. [Online]. Available: http://fold.it/portal/info/science
-
(2008)
The Science behind Foldit
-
-
-
24
-
-
84870538508
-
-
[Online]. Available
-
R. Talens and B. Wang, "Fitocracy," 2012. [Online]. Available: http://www.fitocracy.com/home/
-
(2012)
Fitocracy
-
-
Talens, R.1
Wang, B.2
-
28
-
-
57049117189
-
Persuasion as Education for Computer Security
-
T. Bastiaens and S. Carliner, Eds. Quebec City, Canada: AACE, Oct. [Online]. Available
-
A. Forget, S. Chiasson, and R. Biddle, "Persuasion as Education for Computer Security," in Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007, T. Bastiaens and S. Carliner, Eds. Quebec City, Canada: AACE, Oct. 2007, pp. 822-829. [Online]. Available: http://www.editlib.org/p/26432
-
(2007)
Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007
, pp. 822-829
-
-
Forget, A.1
Chiasson, S.2
Biddle, R.3
-
29
-
-
84900557334
-
Influencing users towards better passwords: Persuasive cued clickpoints
-
Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction ser. Swinton, UK, UK: British Computer Society, [Online]. Available
-
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, "Influencing users towards better passwords: persuasive cued clickpoints," in Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1, ser. BCS-HCI '08. Swinton, UK, UK: British Computer Society, 2008, pp. 121-130. [Online]. Available: http: //0-dl.acm.org.innopac.up.ac.za/citation.cfm?id= 1531514.1531531
-
(2008)
BCS-HCI '08
, vol.1
, pp. 121-130
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.C.4
-
30
-
-
70349182104
-
Lessons from brain age on persuasion for computer security
-
Proceedings of the 27th international conference extended abstracts on Human factors in computing systems, ser. New York, NY, USA: ACM, [Online]. Available
-
A. Forget, S. Chiasson, and R. Biddle, "Lessons from brain age on persuasion for computer security," in Proceedings of the 27th international conference extended abstracts on Human factors in computing systems, ser. CHI EA '09. New York, NY, USA: ACM, 2009, pp. 4435-4440. [Online]. Available: http: //0-doi.acm.org.innopac.up.ac.za/10.1145/1520340.1520679
-
(2009)
CHI EA '09
, pp. 4435-4440
-
-
Forget, A.1
Chiasson, S.2
Biddle, R.3
-
32
-
-
0004005570
-
-
E. Avedon and B. Sutton-Smith, Eds. J. Wiley, [Online]. Available
-
E. M. Avedon and B. Sutton-Smith, The study of games, E. Avedon and B. Sutton-Smith, Eds. J. Wiley, 1971. [Online]. Available: http://www.tcrecord.org/ library/abstract.asp?contentid=1604
-
(1971)
The Study of Games
-
-
Avedon, E.M.1
Sutton-Smith, B.2
-
33
-
-
0004264804
-
-
University of Illinois Press, [Online]. Available
-
R. Caillois and M. Barash, Man, play, and games. University of Illinois Press, 2001. [Online]. Available: http://books.google.co.za/books?id= bDjOPsjzfC4C
-
(2001)
Man, Play, and Games
-
-
Caillois, R.1
Barash, M.2
-
37
-
-
28344431524
-
-
Oxford University Press, [Online]. Available
-
D. S. Parlett, The Oxford guide to card games. Oxford University Press, 1990. [Online]. Available: http://books.google.co.za/books?id=gtPfAAAAMAAJ
-
(1990)
The Oxford Guide to Card Games
-
-
Parlett, D.S.1
-
38
-
-
0038640205
-
-
University Press of America, [Online]. Available
-
C. C. Abt, Serious Games. University Press of America, 1987. [Online]. Available: http://books.google.co.za/books?id=axUs9HA-hF8C
-
(1987)
Serious Games
-
-
Abt, C.C.1
-
39
-
-
1342338687
-
I Have No Words & I Must Design: Toward a Critical Vocabulary for Games
-
F. Mäyrä, Ed., Texas State Techincal College. Tampere University Press, [Online]. Available
-
G. Costikyan, "I Have No Words & I Must Design : Toward a Critical Vocabulary for Games," in Computer, F. Mäyrä, Ed., vol. 4, no. 1, Texas State Techincal College. Tampere University Press, 2002, pp. 9-33. [Online]. Available: http://www.digra.org: 8080/Plone/dl/db/05164.51146. pdf
-
(2002)
Computer
, vol.4
, Issue.1
, pp. 9-33
-
-
Costikyan, G.1
-
41
-
-
1642363033
-
Taking a Graphical Approach to the Password
-
Jul.
-
L. D. Paulson, "Taking a Graphical Approach to the Password," Computer, vol. 35, no. 7, p. 19, Jul. 2002.
-
(2002)
Computer
, vol.35
, Issue.7
, pp. 19
-
-
Paulson, L.D.1
-
42
-
-
85084161999
-
The Design and Analysis of Graphical Passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceesdings of the 8th USENIX Security Symposium, Washington, 1999.
-
(1999)
Proceesdings of the 8th USENIX Security Symposium, Washington
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
43
-
-
49949146625
-
Recognition memory for words, sentences, and pictures
-
[Online]. Available
-
R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol. 6, no. 1, pp. 156-163, 1967. [Online]. Available: http://www.sciencedirect. com/science/article/pii/S0022537167800677
-
(1967)
Journal of Verbal Learning and Verbal Behavior
, vol.6
, Issue.1
, pp. 156-163
-
-
Shepard, R.N.1
-
44
-
-
84870525225
-
Helping Users Create and Remember More Secure Text Passwords
-
Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - ser. Swinton, UK, UK: British Computer Society, [Online]. Available
-
A. Forget, "Helping Users Create and Remember More Secure Text Passwords," in Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 2, ser. BCS-HCI '08. Swinton, UK, UK: British Computer Society, 2008, pp. 247-248. [Online]. Available: http://0-dl.acm.org.innopac.up.ac.za/citation.cfm?id= 1531826.1531907
-
(2008)
BCS-HCI '08
, vol.2
, pp. 247-248
-
-
Forget, A.1
|