Author:
Schultz E.Eugene,Proctor Robert W,Lien Mei-Ching,Salvendy Gavriel
Subject
Law,General Computer Science
Reference22 articles.
1. Al-Ghatani, S. S., & King, M. (1999). Attitudes, satisfaction and usage: Factors contributing to each in the acceptance of information technology. Behaviour & Information Technology, 18, 277-297.
2. Aspillaga, M. (1996). Perceptual foundations in the design of visual displays. Computers in Human Behaviour, 12, 587-600.
3. Barrelle, K., Laverty, W., Henderson, R., Gough, J., Wagner, M., & Hiron, M. (1996). User verification through pointing characteristics: An exploration examination. International Journal of Human-Computer Studies, 45, 47-57.
4. Bernstein, T., Bhimani, A. B., Schultz, E. E., & Siegel, C. A. (1996). Internet Security for Business. New York: Wiley.
5. De Alvare, A. M., & Schultz, E. E. (1988) A framework for password selection. USENIX Security Workshop Proceedings, 1, 8–9.
Cited by
67 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献