Assessments of a Cloud-Based Data Wallet for Personal Identity Management
暂无分享,去创建一个
[1] Debora Shaw,et al. Handbook of usability testing: How to plan, design, and conduct effective tests , 1996 .
[2] Philip T. Kortum,et al. Determining what individual SUS scores mean: adding an adjective rating scale , 2009 .
[3] Harold Abelson,et al. No technical understanding required: helping users make informed choices about access to their personal data , 2014, MobiQuitous.
[4] Kirstie Hawkey,et al. What makes users refuse web single sign-on?: an empirical investigation of OpenID , 2011, SOUPS.
[5] Bernd Zwattendorfer,et al. CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[6] Joseph Bonneau,et al. Cognitive disconnect: understanding facebook connect login permissions , 2014, COSN '14.
[7] Mohamed Shehab,et al. Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook , 2016, DPM/QASA@ESORICS.
[8] Oriana Riva,et al. Taking data exposure into account: how does it affect the choice of sign-in accounts? , 2013, CHI.
[9] Jun Zhao,et al. Better the Devil You Know: Exposing the Data Sharing Practices of Smartphone Apps , 2017, CHI.
[10] Stephan Krenn,et al. Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider , 2016, Privacy and Identity Management.
[11] Serge Egelman,et al. My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect , 2013, CHI.
[12] Lujo Bauer,et al. A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality , 2013, Digital Identity Management.
[13] Jens Grossklags,et al. Third-party apps on Facebook: privacy and the illusion of control , 2011, CHIMIT '11.
[14] N. Leech,et al. Validity and Qualitative Research: An Oxymoron? , 2007 .
[15] Tobias Pulls,et al. Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This? , 2016, Privacy and Identity Management.
[16] Scott Ruoti,et al. Authentication Melee: A Usability Analysis of Seven Web Authentication Systems , 2015, WWW.
[17] Jens Grossklags,et al. An online experiment of privacy authorization dialogues for social applications , 2013, CSCW.
[18] Niklas Carlsson,et al. Information Sharing and User Privacy in the Third-party Identity Management Landscape , 2015, CODASPY.
[19] Blase Ur,et al. Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption , 2015 .
[20] Heather Richter Lipford,et al. Users' (mis)conceptions of social applications , 2010, Graphics Interface.
[21] J. B. Brooke,et al. SUS: A 'Quick and Dirty' Usability Scale , 1996 .
[22] L. Jean Camp,et al. Comparative eye tracking of experts and novices in web single sign-on , 2013, CODASPY '13.
[23] Mohamed Shehab,et al. Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions , 2017, Proc. Priv. Enhancing Technol..
[24] John Sören Pettersson,et al. Towards the Adoption of Secure Cloud Identity Services , 2017, ARES.
[25] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..