Age-appropriate password "best practice" ontologies for early educators and parents
暂无分享,去创建一个
[1] Hyuk-Chul Kwon,et al. Cyber Forensics Ontology for Cyber Criminal Investigation , 2009, e-Forensics.
[2] E. Burnstein,et al. “I am not guilty” vs “I am innocent”: Successful negation may depend on the schema used for its encoding☆ , 2004 .
[3] Porter E. Coggins. Implications of What Children Know About Computer Passwords , 2013 .
[4] B. Hodson,et al. Variables that influence decoding and spelling in beginning readers , 2005 .
[5] Marcus K. Rogers,et al. A cyber forensics ontology: Creating a new approach to studying cyber forensics , 2006, Digit. Investig..
[6] Robert F. Otondo,et al. "This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? , 2019, Comput. Secur..
[7] J. Wilding,et al. The nature of attentional differences between groups of children differentiated by teacher ratings of attention and hyperactivity. , 2001, British journal of psychology.
[8] Sumbal Maqsood. Children's Text Password Behaviors and Parental Advice , 2018 .
[9] Wynne Harlen,et al. Primary teachers' understanding in science and its impact in the classroom , 1997 .
[10] Tamara L. Clegg,et al. 'No Telling Passcodes Out Because They're Private' , 2017, Proc. ACM Hum. Comput. Interact..
[11] A Schlottmann,et al. Children's probability intuitions: understanding the expected value of complex gambles. , 2001, Child development.
[12] Janet C. Read,et al. Investigating Children's Passwords using a Game-based Survey , 2017, IDC.
[13] Suzanne E. Welcome,et al. Longitudinal Mapping of Cortical Thickness and Brain Growth in Normal Children , 2022 .
[14] Gordon A. Hale,et al. THE DEVELOPMENT OF ATTENTION IN CHILDREN1 , 1973 .
[15] L. Crockett,et al. Developmental Stability and Change in Self-Regulation From Childhood to Adolescence , 2005, The Journal of genetic psychology.
[16] H. Wellman. The Child's Theory of Mind , 1990 .
[17] Janet C. Read,et al. Designing textual password systems for children , 2012, IDC '12.
[18] Anneke M Metz,et al. Teaching statistics in biology: using inquiry-based learning to strengthen understanding of statistical analysis in biology laboratory courses. , 2008, CBE life sciences education.
[19] Kathleen Beullens,et al. Parent–child conflict about children’s tablet use: The role of parental mediation , 2017, New Media Soc..
[20] Sonia Chiasson,et al. No passwords needed: the iterative design of a parent-child authentication mechanism , 2017, MobileHCI.
[21] Bruce A. Murray,et al. How do beginners learn to read irregular words as sight words? , 2018, Journal of Research in Reading.
[22] Linnea C. Ehri,et al. Phases of development in learning to read words by sight , 1995 .
[23] J. Peskin,et al. Representing the Mental World in Children's Social Behavior: Playing Hide‐and‐Seek and Keeping a Secret , 2003 .
[24] Peter Nikken,et al. Guiding Young Children’s Digital Media Use: SES-Differences in Mediation Concerns and Competence , 2018, Journal of child and family studies.
[25] J. Beech. Ehri's model of phases of learning to read: a brief critique , 2005 .
[26] C. Pernet,et al. Neural dissociation of phonological and visual attention span disorders in developmental dyslexia: FMRI evidence from two case reports , 2012, Brain and Language.
[27] S. Gathercole. Cognitive approaches to the development of short-term memory , 1999, Trends in Cognitive Sciences.
[28] M. Terras,et al. Family Digital Literacy Practices and Children’s Mobile Phone Use , 2016, Front. Psychol..
[29] S. Larkin. Metacognition in Young Children , 2009 .
[30] Ellen Bialystok,et al. The relationship between bilingualism and the development of cognitive processes in problem solving , 1998, Applied Psycholinguistics.
[31] Jade Guan,et al. Children in the digital age: exploring issues of cybersecurity , 2012, iConference '12.
[32] Michael I. Norton,et al. How actions create – not just reveal – preferences , 2008, Trends in Cognitive Sciences.
[33] D. Ausubel. The transition from concrete to abstract cognitive functioning: Theoretical issues and implications for education , 1964 .
[34] Sonia Livingstone,et al. How parents of young children manage digital devices at home: the role of income, education and parental style , 2015 .
[35] L. Anagnostaki,et al. Secrets and Disclosures: How Young Children Handle Secrets , 2013, The Journal of genetic psychology.
[36] Edward Cutrell,et al. What are you looking for?: an eye-tracking study of information usage in web search , 2007, CHI.
[37] Yee-Yin Choong. A Cognitive-Behavioral Framework of User Password Management Lifecycle , 2014, HCI.
[38] Ken Appleton,et al. How Do Beginning Primary School Teachers Cope with Science? Toward an Understanding of Science Teaching Practice , 2003 .