-
1
-
-
84866496149
-
Graphical passwords learning from the first twelve years
-
R. Biddle, S. Chiasson, and P. C. van Oorschot, "Graphical passwords learning from the first twelve years," ACM Computing Surveys, vol. 44, no. 4, 2012.
-
(2012)
ACM Computing Surveys
, vol.44
, Issue.4
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.C.3
-
6
-
-
36849064867
-
The myth of user education
-
S. G̈orling, "The myth of user education," in Virus Bulletin Conference, vol. 11, 2006, p. 13.
-
(2006)
Virus Bulletin Conference
, vol.11
, pp. 13
-
-
Gorling, S.1
-
7
-
-
84900800711
-
User education is not the answer to security problems
-
October
-
J. Nielsen, "User education is not the answer to security problems," Alertbox, October, 2004.
-
(2004)
Alertbox
-
-
Nielsen, J.1
-
8
-
-
0030551732
-
When less is more meaningful learning from visual and verbal summaries of science textbook lessons
-
R. Mayer, W. Bove, A. Bryman, R. Mars, and L. Tapangco, "When less is more Meaningful learning from visual and verbal summaries of science textbook lessons." Journal of educational psychology, vol. 88, no. 1, p. 64, 1996.
-
(1996)
Journal of Educational Psychology
, vol.88
, Issue.1
, pp. 64
-
-
Mayer, R.1
Bove, W.2
Bryman, A.3
Mars, R.4
Tapangco, L.5
-
9
-
-
52249117807
-
The effects of verbal elaboration and visual elaboration on student learning
-
L. Chanlin, "The effects of verbal elaboration and visual elaboration on student learning." International Journal of Instructional Media, vol. 24, no. 4, pp. 333-39, 1997.
-
(1997)
International Journal of Instructional Media
, vol.24
, Issue.4
, pp. 333-339
-
-
Chanlin, L.1
-
12
-
-
70350731253
-
A nutrition label for privacy
-
P. Kelley, J. Bresee, L. Cranor, and R. Reeder, "A nutrition label for privacy," in Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, 2009, p. 4.
-
(2009)
Proceedings of the 5th Symposium on Usable Privacy and Security. ACM
, pp. 4
-
-
Kelley, P.1
Bresee, J.2
Cranor, L.3
Reeder, R.4
-
13
-
-
77953569639
-
Teaching johnny not to fall for phish
-
P. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong, "Teaching johnny not to fall for phish," ACM Transactions on Internet Technology (TOIT), vol. 10, no. 2, p. 7, 2010.
-
(2010)
ACM Transactions on Internet Technology (TOIT
, vol.10
, Issue.2
, pp. 7
-
-
Kumaraguru, P.1
Sheng, S.2
Acquisti, A.3
Cranor, L.4
Hong, J.5
-
14
-
-
41949111662
-
Using cartoons to teach internet security
-
S. Srikwan and M. Jakobsson, "Using cartoons to teach internet security," Cryptologia, vol. 32, no. 2, pp. 137-154, 2008.
-
(2008)
Cryptologia
, vol.32
, Issue.2
, pp. 137-154
-
-
Srikwan, S.1
Jakobsson, M.2
-
18
-
-
38549175577
-
Mental models of security risks
-
F. Asgharpour, D. Liu, and L. Camp, "Mental models of security risks," Financial Cryptography and Data Security, pp. 367-377, 2007.
-
(2007)
Financial Cryptography and Data Security
, pp. 367-377
-
-
Asgharpour, F.1
Liu, D.2
Camp, L.3
-
19
-
-
70350230128
-
Mental models of privacy and security
-
L. Camp, "Mental models of privacy and security," Technology and Society Magazine, IEEE, vol. 28, no. 3, pp. 37-46, 2009.
-
(2009)
Technology and Society Magazine, IEEE
, vol.28
, Issue.3
, pp. 37-46
-
-
Camp, L.1
-
23
-
-
0036395274
-
Scaffolding cognitive and metacognitive processes in low verbal ability learners use of diagrams in computer-based training environments
-
H. M. Cuevas, S. M. Fiore, and R. L. Oser, "Scaffolding cognitive and metacognitive processes in low verbal ability learners Use of diagrams in computer-based training environments," Instructional Science, vol. 30, no. 6, pp. 433-464, 2002.
-
(2002)
Instructional Science
, vol.30
, Issue.6
, pp. 433-464
-
-
Cuevas, H.M.1
Fiore, S.M.2
Oser, R.L.3
-
24
-
-
34248927969
-
The metaphorical structure of the human conceptual system
-
G. Lakoff and M. Johnson, "The metaphorical structure of the human conceptual system," Cognitive Science, vol. 4, no. 2, pp. 195-208, 2010.
-
(2010)
Cognitive Science
, vol.4
, Issue.2
, pp. 195-208
-
-
Lakoff, G.1
Johnson, M.2
-
25
-
-
84862937206
-
A brick wall, a locked door, and a bandit a physical security metaphor for firewall warnings
-
F. Raja, K. Hawkey, S. Hsu, K. Wang, and K. Beznosov, "A brick wall, a locked door, and a bandit a physical security metaphor for firewall warnings," in Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, 2011.
-
(2011)
Proceedings of the 7th Symposium on Usable Privacy and Security. ACM
-
-
Raja, F.1
Hawkey, K.2
Hsu, S.3
Wang, K.4
Beznosov, K.5
-
26
-
-
34249063189
-
Metaphors and user interfaces in the 21st century
-
A. Marcus, "Metaphors and user interfaces in the 21st century," interactions, vol. 9, no. 2, pp. 7-10, 2002.
-
(2002)
Interactions
, vol.9
, Issue.2
, pp. 7-10
-
-
Marcus, A.1
-
27
-
-
84900796553
-
-
March
-
Royal Bank of Canada, "Don't be a Target," Accessed March 2013, http//www.rbc.com/privacysecurity/ca/popup-dontbe-A-target.html.
-
(2013)
Don't Be A Target
-
-
-
28
-
-
84900796674
-
-
March
-
Fontana, J., "Password life expectancy down to seconds," Accessed March 2013, http//www.zdnet.com/password-lifeexpectancy-down-to- seconds-7000009851.
-
(2013)
-
-
Fontana, J.1
-
29
-
-
84900807371
-
-
March
-
Microsoft Developer Network, "Password Policy," Accessed March 2013, http//msdn.microsoft.com/en-us/library/ ms161959.aspx.
-
(2013)
Password Policy
-
-
-
30
-
-
84900821232
-
-
March
-
Deloitte, "P$$1234 the end of strong password-only security," Accessed March 2013, http//deloitte.com/view/ en-GX/global/industries/ technologymediatelecommunications/ tmt-predictions- 2013.
-
(2013)
P$$1234 the End of Strong Password-only Security
-
-
-
32
-
-
70749087044
-
A behavioral analysis of passphrase design and effectiveness
-
M. Keith, B. Shao, and P. Steinbart, "A behavioral analysis of passphrase design and effectiveness," Journal of the Association for Information Systems, vol. 10, no. 2, pp. 63-89, 2009.
-
(2009)
Journal of the Association for Information Systems
, vol.10
, Issue.2
, pp. 63-89
-
-
Keith, M.1
Shao, B.2
Steinbart, P.3
-
35
-
-
84900789973
-
-
March
-
Wikipedia, "Password Cracking," Accessed March 2013, http//en.wikipedia.org/wiki/Password-cracking.
-
(2013)
Password Cracking
-
-
-
36
-
-
12844275960
-
Password memorability and security empirical results
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password memorability and security Empirical results," Security &Privacy, IEEE, vol. 2, no. 5, pp. 25-31, 2004.
-
(2004)
Security &Privacy, IEEE
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
37
-
-
84900820497
-
-
December
-
Adams, S., "Dilbert," Accessed December 2012, http//search.dilbert.com/comic/Security.
-
(2012)
-
-
Adams, S.1
-
38
-
-
85003445370
-
-
December
-
Munroe, R., "XKCD a webcomic of romance, sarcasm, math, and language," Accessed December 2012, http//xkcd.com/936/.
-
(2012)
XKCD A Webcomic of Romance, Sarcasm, Math, and Language
-
-
Munroe, R.1
-
39
-
-
84871289798
-
-
June
-
Google Chrome Team, McCloud, S., "Google Chrome," Accessed June 2012, http//www.google.com/googlebooks/chrome.
-
(2012)
Google Chrome
-
-
McCloud, S.1
-
40
-
-
70449698147
-
A review of humor for computer games play, laugh and more
-
C. Dormann and R. Biddle, "A review of humor for computer games Play, laugh and more," Simulation &gaming, vol. 40, no. 6, pp. 802-824, 2009.
-
(2009)
Simulation &Gaming
, vol.40
, Issue.6
, pp. 802-824
-
-
Dormann, C.1
Biddle, R.2
-
41
-
-
3242722005
-
Embodied agents a new impetus to humor research
-
ser. Twente Workshops on Language Technology University of Twente,.
-
A. Nijholt, "Embodied agents A new impetus to humor research," in The April Fools' Day Workshop on Computational Humour, ser. Twente Workshops on Language Technology, vol. 20. University of Twente, 2002.
-
(2002)
The April Fools' Day Workshop on Computational Humour
, vol.20
-
-
Nijholt, A.1
|