Author:
Still Jeremiah D.,Tiller Lauren N.
Publisher
Springer International Publishing
Reference23 articles.
1. Cain, A.A., Still, J.D.: Usability comparison of over-the-shoulder attack resistant authentication schemes. J. of Usability Studies. 13, 196–219 (2018)
2. Ashford W.: Millions of web users at risk from weak passwords [Web blog post]. http://www.computerweekly.com/Articles/2009/09/07/237569/Millions-of-web-users-at-risk-from-weak-passwords.htm. Accessed 7 Sept 2009
3. Barton, B.F., Barton, M.S.: User-friendly password methods for computer-mediated information systems. J. Comput. Secur. 3, 186–195 (1984)
4. Hoonakker, P., Bornoe, N., Carayon, P.: Password authentication from a human factors perspective: results of a survey among end-users. In: proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 53, pp. 459–463 (2009)
5. Labuschagne, W.A., Veerasamy, N., Burke, I., Eloff, M.M.: Design of cyber security awareness game utilizing a social media framework. In: Proceedings of Information Security South Africa, pp. 1–9 (2011)