Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








173 Hits in 8.0 sec

Graphical passwords

Robert Biddle, Sonia Chiasson, P.C. Van Oorschot
2012 ACM Computing Surveys  
Starting around 1999, a great many graphical password schemes have been proposed as alternatives to text-based password authentication.  ...  We then review usability requirements for knowledge-based authentication as they apply to graphical passwords, identify security threats that such systems must address and review known attacks, discuss  ...  The third author is Canada Research Chair in Authentication and Computer Security, and acknowledges NSERC funding thereof.  ... 
doi:10.1145/2333112.2333114 fatcat:4kdrwtfffvdkrjxcodefwr3awi

Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication

Kevin Juang, Joel Greenstein
2018 Human Factors  
Graphical passwords based on recognition have been shown to be more usable than those based on recall (Stobert & Biddle, 2013 ) -incidentally, the same was not found to apply to textual passwords (Wright  ...  Moving beyond the ubiquitous textual passwords, many researchers have sought to develop graphical passwords also based on secrets.  ... 
doi:10.1177/0018720818767683 pmid:29718722 fatcat:lndojismcfedxdzfwyr4tcxy2q

Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass

Karen Renaud, University of Strathclyde, Melanie Volkamer, Peter Mayer, Rüdiger Grimm, Karlsruhe Institute of Technology, Karlsruhe Institute of Technology, Fraunhofer Institute for Secure IT and Christian-Morgenstern-Schule Darmstadt
2021 AIS Transactions on Human-Computer Interaction  
Young children routinely authenticate themselves with alphanumeric passwords but are probably not ready to use such passwords due to their emerging literacy and immaturity.  ...  KidzPass proved efficacious and our younger (four-to seven-year-old) participants mostly preferred it to text passwords.  ...  We also thank all the wonderful children who took part in our studies. This research was supported by the Helmholtz Association (HGF) through the subtopic Engineering Secure Systems (ESS).  ... 
doi:10.17705/1thci.00155 fatcat:yfzhzo4sbfelzng77lfsodrvfe

A survey on the use of graphical passwords in security

Haichang Gao, Wei Jia, Fei Ye, Licheng Ma
2013 Journal of Software  
Beginning around 1996, numerous graphical password schemes have been proposed, motivated by improving password usability and security, two key factors in password scheme evaluation.  ...  In this paper, we focus on the security aspects of existing graphical password schemes, which not only gives a simple introduction of attack methods but also intends to provide an in-depth analysis with  ...  Drawmetric Schemes Drawmetric schemes are also known as recall-based schemes [55] .  ... 
doi:10.4304/jsw.8.7.1678-1698 fatcat:ssobdkvc3bfd3edvr6wb6fuhva

Facemail

Eric Lieberman, Robert C. Miller
2007 Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07  
Facemail is an extension to a webmail system that aims to alleviate this problem by automatically displaying pictures of the selected recipients in a peripheral display, while the user is composing an  ...  We describe techniques for obtaining faces from email addresses, and discovering mailing list memberships from existing web data sources, and a user interface design that keeps important faces recognizable  ...  Passfaces has been found to be less errorprone than conventional textual passwords [2] , presumably because cued recall is easier than unassisted recall, but also because humans are very good at recognizing  ... 
doi:10.1145/1280680.1280696 dblp:conf/soups/LiebermanM07 fatcat:issswblocvc4rgfh3xldokoacy

'You have one identity': performing the self on Facebook and LinkedIn

José van Dijck
2013 Media Culture and Society  
And yet, both platforms deploy similar principles of connectivity and narrative -strategies that can be succinctly revealed in recent interface changes.  ...  Experts in each area are recognized on LinkedIn: the more points of expertise you gain, the higher you appear on lists of experts.  ...  It is important to recall how most social network sites, notably Facebook, started out as 'friends sites' in protected environments such as college campuses.  ... 
doi:10.1177/0163443712468605 fatcat:dbn7alrgrncbpbttqddqd6vyfe

Metadata visualization of scholarly search results

Taraneh Khazaei, Orland Hoeber
2012 Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies - i-KNOW '12  
User evaluations illustrate the potential benefits of the design choices in comparison to a list-based digital library search interface. Firstly, I would like t o sincerely t hank my supervisor , Dr.  ...  be searched is often more complex than simple textual information.  ...  documents are order d based on their relevance to the query, and t hen are textually represented based on a set of t heir metadata l ments in a list.  ... 
doi:10.1145/2362456.2362483 dblp:conf/iknow/KhazaeiH12 fatcat:k2334ko5mbdxnd6htrjy3xu3iu

Privacy Management of Multi User Environment in Online Social Networks (OSNs)

P. Amrutha
2013 IOSR Journal of Computer Engineering  
To this end, we propose an approach to enable the protection of shared data associated with multiple users in OSNs.  ...  These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised.  ...  Now the user is entering to the PCCP System, here the textual password is replaced by the graphical password via clickpoints (cued).  ... 
doi:10.9790/0661-1320107 fatcat:rdpsdcqelbbzvkg5rm4og4tzba

Theory and practice of online learning

Jan van Bruggen
2005 British Journal of Educational Technology  
Below is a partial list of the types of applications that programmers typically work with in a Web-based course.  ...  To access this file please go to our site at: xxxxxxx Enter your email address as above and the password XXXX####. You have access to the file until August 7th.  ...  I hope that your learning experience has been an enjoyable one. Overall, you have addressed all the topics in the course and have presented your thoughts well.  ... 
doi:10.1111/j.1467-8535.2005.00445_1.x fatcat:52bxo5l2d5dwxjjcenzyawuf7m

Determining the Effectiveness of the Usability Problem Inspector: A Theory-Based Model and Tool for Finding Usability Problems

Terence S. Andre, H. Rex Hartson, Robert C. Williges
2003 Human Factors  
First, the User Action Framework was developed to help organize usability concepts and issues into a knowledge base that supports usability methods and tools.  ...  Practitioners often have to apply their own judgment and techniques, leading to inconsistencies in how the method is applied in the field.  ...  Put your name, address, and home phone number in the rolodex so other family members can contact you in an emergency.  ... 
doi:10.1518/hfes.45.3.455.27255 pmid:14702996 fatcat:6jsslxew2vc3pfr3me2cxqb5vu

Theory and Practice of Online Learning

Morten Paulsen
2004 International Review of Research in Open and Distance Learning  
He teaches courses in distance education and is involved with research on improving design, development, delivery, and support in distance education.  ...  He holds a Bachelor of Arts (Honours) degree from the University of Alberta and has worked extensively as an editor and writer on an array of electronic and print-based publishing projects.  ...  Below is a partial list of the types of applications that programmers typically work with in a Web-based course.  ... 
doi:10.19173/irrodl.v5i3.200 fatcat:mkuyazma6vd3llklmtzhwtlzsu

Understanding and Improving Consumers' Adoption of Online Privacy-Protective Behaviors [article]

Yixin Zou, University, My
2023
stakeholders to reimagine computer security customer support for serving survivors of intimate partner violence, and (3) a longitudinal experiment to evaluate nudges that encourage consumers to change passwords  ...  In my dissertation, I combine qualitative, quantitative, and design methods to uncover the challenges consumers face in adopting online privacy behaviors, then develop and evaluate different context-specific  ...  ACKNOWLEDGEMENTS The work presented in this dissertation would not be possible without the guidance and support from many people.  ... 
doi:10.7302/6914 fatcat:btzbsacnwffavi6xvdkaufbqz4

From Zero to Hero: How Zero-Rating Became a Debate about Human Rights

Linnet Taylor
2016 IEEE Internet Computing  
s co n si d er at io n s, in cl u d in g d ep lo ym en t, sc al ab ili ty , se cu ri ty , an d p ri va cy .  ...  However, as suggested before, try imagining your local school system has disappeared and your children are instead being offered Wikipedia in Swahili via a $10 smartphone.  ...  IEEE Computer Society Jobs is your ideal recruitment resource, targeting over 85,000 expert researchers and qualified top-level managers in software engineering, robotics, programming, artificial intelligence  ... 
doi:10.1109/mic.2016.88 fatcat:imrhaaoac5gifool7wjegaxl5q

Exploring Subtext Processing in Narrative Persuasion: The Role of Eudaimonic Entertainment-Use Motivation and a Supplemental Conclusion Scene

Elizabeth L. Cohen
2016 Communication Quarterly  
After viewing, participants completed a thought-listing task and second survey. Results show that "Harvest" did not result in persuasive outcomes related to organ donation.  ...  Further examination showed that, compared to people with low eudaimonic motivation, those with high eudaimonic motivation were less likely to engage in intended elaboration, but only in the no conclusion  ...  How likely do you think it is that someone in your family might need an organ transplant sometime in the future?  ... 
doi:10.1080/01463373.2015.1103287 fatcat:qrd62ec5vrcxbemfivv7fzr6ry

EDUCATION FOR SPECIFIC PURPOSES [chapter]

2014 Education for Cataloging and the Organization of Information  
The papers in this collection were solicited with that in mind.  ...  In the course of his survey, he also gathered information about which textbooks are being used in conjunction with graduate courses in cataloging related subjects.  ...  Please base your answer on the material covered in this class.  ... 
doi:10.4324/9781315785837-7 fatcat:vl4obtw4lzexblq3gr4rzbofhq
« Previous Showing results 1 — 15 out of 173 results