A Behavioral Analysis of Passphrase Design and Effectiveness
暂无分享,去创建一个
Benjamin B. M. Shao | Benjamin Shao | Mark Keith | Paul John Steinbart | P. J. Steinbart | M. Keith | B. Shao
[1] Donald A. Norman,et al. Simulating a Skilled Typist: A Study of Skilled Cognitive-Motor Performance , 1982, Cogn. Sci..
[2] Blake Ives,et al. The measurement of user information satisfaction , 1983, CACM.
[3] Alan S. Brown,et al. Generating and remembering passwords , 2004 .
[4] Michael E. Whitman. Enemy at the gate: threats to information security , 2003, CACM.
[5] Tor Guimaraes,et al. The Relationship Between User Participation and User Satisfaction: An Investigation of Four Contingency Factors , 1994, MIS Q..
[6] Moshe Zviran,et al. A Comparison of Password Techniques for Multilevel Authentication Mechanisms , 1990, Comput. J..
[7] J. Doumont. Magical numbers: the seven-plus-or-minus-two myth , 2002 .
[8] Edward Skoudis,et al. Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) , 2005 .
[9] Lnnny L. Jecosy. On Interpreting the Effects of Repetition : Solving a Problem Versus Remembering a Solution , 2010 .
[10] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[11] G. A. Miller. THE PSYCHOLOGICAL REVIEW THE MAGICAL NUMBER SEVEN, PLUS OR MINUS TWO: SOME LIMITS ON OUR CAPACITY FOR PROCESSING INFORMATION 1 , 1956 .
[12] M. Rieger. Automatic keypress activation in skilled typing. , 2004, Journal of experimental psychology. Human perception and performance.
[13] Moshe Zviran,et al. Cognitive passwords: The key to easy access control , 1990, Comput. Secur..
[14] Giancarlo Ruffo,et al. EnFilter: A Password Enforcement and Filter Tool Based on Pattern Recognition Techniques , 2005, ICIAP.
[15] Gerardine DeSanctis,et al. Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory , 1994 .
[16] T. Salthouse. Perceptual, cognitive, and motoric aspects of transcription typing. , 1986, Psychological bulletin.
[17] Moshe Zviran,et al. Password Security: An Empirical Study , 1999, J. Manag. Inf. Syst..
[18] Martin Bichler,et al. Design science in information systems research , 2006, Wirtschaftsinf..
[19] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[20] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[21] Peter A. Todd,et al. Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication , 1992, MIS Q..
[22] James L. McClelland,et al. On the control of automatic processes: a parallel distributed processing account of the Stroop effect. , 1990, Psychological review.
[23] W. Orlikowski. Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000 .
[24] A. Baddeley. The Influence of Acoustic and Semantic Similarity on Long-term Memory for Word Sequences , 1966, The Quarterly journal of experimental psychology.
[25] Frank A. Logan,et al. Errors in copy typewriting , 1999 .
[26] Alexandra Durcikova,et al. The Role of Knowledge Repositories in Technical Support Environments: Speed Versus Learning in User Performance , 2005, J. Manag. Inf. Syst..
[27] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[28] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[29] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[30] Bonnie E. John. TYPIST: A Theory of Performance in Skilled Typing , 1996, Hum. Comput. Interact..
[31] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[32] Elizabeth E. Johns,et al. The generation effect with nonwords. , 1988 .
[33] I. Benbasat,et al. The Influence of Decision Aids on Choice Strategies: An Experimental Analysis of the Role of Cognitive Effort , 1994 .
[34] Izak Benbasat,et al. Inducing compensatory information processing through decision aids that facilitate effort reduction: an experimental assessment , 2000 .
[35] Benjamin B. M. Shao,et al. The usability of passphrases for authentication: An empirical field study , 2007, Int. J. Hum. Comput. Stud..
[36] Barbara H Wixom,et al. A Theoretical Integration of User Satisfaction and Technology Acceptance , 2005, Inf. Syst. Res..
[37] Mo Adam Mahmood,et al. Variables affecting information technology end-user satisfaction: a meta-analysis of the empirical literature , 2000, Int. J. Hum. Comput. Stud..
[38] Fred D. Davis,et al. A Model of the Antecedents of Perceived Ease of Use: Development and Test† , 1996 .
[39] N. Cowan. The magical number 4 in short-term memory: A reconsideration of mental storage capacity , 2001, Behavioral and Brain Sciences.
[40] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..
[41] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[42] Sig Porter,et al. A password extension for improved human factors , 1982, Comput. Secur..
[43] H A Simon,et al. How Big Is a Chunk? , 1974, Science.
[44] Jordan Grafman,et al. Long-term memory is the representational basis for semantic verbal short-term memory. , 2005, Psychophysiology.
[45] R. Conrad,et al. Acoustic confusions in immediate memory. , 1964 .
[46] Mark Burnett,et al. Perfect Passwords: Selection, Protection, Authentication , 2005 .
[47] B. Winsvold,et al. A re-evaluation of the phonological similarity effect in adults' short-term memory of words and nonwords. , 2001, Memory.
[48] Julie Bunnell,et al. Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates , 2000, Comput. Secur..
[49] Marcy P. Driscoll,et al. Psychology of Learning for Instruction (3rd ed. , 2005 .
[50] Izak Benbasat,et al. Evaluating the Impact of DSS, Cognitive Effort, and Incentives on Strategy Selection , 1999, Inf. Syst. Res..
[51] Robert J. Crutcher,et al. The role of deliberate practice in the acquisition of expert performance. , 1993 .
[52] N. J. Slamecka,et al. The Generation Effect: Delineation of a Phenomenon , 1978 .