A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Graphical passwords
2012
ACM Computing Surveys
Starting around 1999, a great many graphical password schemes have been proposed as alternatives to text-based password authentication. ...
We then review usability requirements for knowledge-based authentication as they apply to graphical passwords, identify security threats that such systems must address and review known attacks, discuss ...
The third author is Canada Research Chair in Authentication and Computer Security, and acknowledges NSERC funding thereof. ...
doi:10.1145/2333112.2333114
fatcat:4kdrwtfffvdkrjxcodefwr3awi
Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication
2018
Human Factors
Graphical passwords based on recognition have been shown to be more usable than those based on recall (Stobert & Biddle, 2013 ) -incidentally, the same was not found to apply to textual passwords (Wright ...
Moving beyond the ubiquitous textual passwords, many researchers have sought to develop graphical passwords also based on secrets. ...
doi:10.1177/0018720818767683
pmid:29718722
fatcat:lndojismcfedxdzfwyr4tcxy2q
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass
2021
AIS Transactions on Human-Computer Interaction
Young children routinely authenticate themselves with alphanumeric passwords but are probably not ready to use such passwords due to their emerging literacy and immaturity. ...
KidzPass proved efficacious and our younger (four-to seven-year-old) participants mostly preferred it to text passwords. ...
We also thank all the wonderful children who took part in our studies. This research was supported by the Helmholtz Association (HGF) through the subtopic Engineering Secure Systems (ESS). ...
doi:10.17705/1thci.00155
fatcat:yfzhzo4sbfelzng77lfsodrvfe
A survey on the use of graphical passwords in security
2013
Journal of Software
Beginning around 1996, numerous graphical password schemes have been proposed, motivated by improving password usability and security, two key factors in password scheme evaluation. ...
In this paper, we focus on the security aspects of existing graphical password schemes, which not only gives a simple introduction of attack methods but also intends to provide an in-depth analysis with ...
Drawmetric Schemes Drawmetric schemes are also known as recall-based schemes [55] . ...
doi:10.4304/jsw.8.7.1678-1698
fatcat:ssobdkvc3bfd3edvr6wb6fuhva
Facemail is an extension to a webmail system that aims to alleviate this problem by automatically displaying pictures of the selected recipients in a peripheral display, while the user is composing an ...
We describe techniques for obtaining faces from email addresses, and discovering mailing list memberships from existing web data sources, and a user interface design that keeps important faces recognizable ...
Passfaces has been found to be less errorprone than conventional textual passwords [2] , presumably because cued recall is easier than unassisted recall, but also because humans are very good at recognizing ...
doi:10.1145/1280680.1280696
dblp:conf/soups/LiebermanM07
fatcat:issswblocvc4rgfh3xldokoacy
'You have one identity': performing the self on Facebook and LinkedIn
2013
Media Culture and Society
And yet, both platforms deploy similar principles of connectivity and narrative -strategies that can be succinctly revealed in recent interface changes. ...
Experts in each area are recognized on LinkedIn: the more points of expertise you gain, the higher you appear on lists of experts. ...
It is important to recall how most social network sites, notably Facebook, started out as 'friends sites' in protected environments such as college campuses. ...
doi:10.1177/0163443712468605
fatcat:dbn7alrgrncbpbttqddqd6vyfe
Metadata visualization of scholarly search results
2012
Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies - i-KNOW '12
User evaluations illustrate the potential benefits of the design choices in comparison to a list-based digital library search interface. Firstly, I would like t o sincerely t hank my supervisor , Dr. ...
be searched is often more complex than simple textual information. ...
documents are order d based on their relevance to the query, and t hen are textually represented based on a set of t heir metadata l ments in a list. ...
doi:10.1145/2362456.2362483
dblp:conf/iknow/KhazaeiH12
fatcat:k2334ko5mbdxnd6htrjy3xu3iu
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
2013
IOSR Journal of Computer Engineering
To this end, we propose an approach to enable the protection of shared data associated with multiple users in OSNs. ...
These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised. ...
Now the user is entering to the PCCP System, here the textual password is replaced by the graphical password via clickpoints (cued). ...
doi:10.9790/0661-1320107
fatcat:rdpsdcqelbbzvkg5rm4og4tzba
Theory and practice of online learning
2005
British Journal of Educational Technology
Below is a partial list of the types of applications that programmers typically work with in a Web-based course. ...
To access this file please go to our site at: xxxxxxx Enter your email address as above and the password XXXX####. You have access to the file until August 7th. ...
I hope that your learning experience has been an enjoyable one. Overall, you have addressed all the topics in the course and have presented your thoughts well. ...
doi:10.1111/j.1467-8535.2005.00445_1.x
fatcat:52bxo5l2d5dwxjjcenzyawuf7m
Determining the Effectiveness of the Usability Problem Inspector: A Theory-Based Model and Tool for Finding Usability Problems
2003
Human Factors
First, the User Action Framework was developed to help organize usability concepts and issues into a knowledge base that supports usability methods and tools. ...
Practitioners often have to apply their own judgment and techniques, leading to inconsistencies in how the method is applied in the field. ...
Put your name, address, and home phone number in the rolodex so other family members can contact you in an emergency. ...
doi:10.1518/hfes.45.3.455.27255
pmid:14702996
fatcat:6jsslxew2vc3pfr3me2cxqb5vu
Theory and Practice of Online Learning
2004
International Review of Research in Open and Distance Learning
He teaches courses in distance education and is involved with research on improving design, development, delivery, and support in distance education. ...
He holds a Bachelor of Arts (Honours) degree from the University of Alberta and has worked extensively as an editor and writer on an array of electronic and print-based publishing projects. ...
Below is a partial list of the types of applications that programmers typically work with in a Web-based course. ...
doi:10.19173/irrodl.v5i3.200
fatcat:mkuyazma6vd3llklmtzhwtlzsu
Understanding and Improving Consumers' Adoption of Online Privacy-Protective Behaviors
[article]
2023
stakeholders to reimagine computer security customer support for serving survivors of intimate partner violence, and (3) a longitudinal experiment to evaluate nudges that encourage consumers to change passwords ...
In my dissertation, I combine qualitative, quantitative, and design methods to uncover the challenges consumers face in adopting online privacy behaviors, then develop and evaluate different context-specific ...
ACKNOWLEDGEMENTS The work presented in this dissertation would not be possible without the guidance and support from many people. ...
doi:10.7302/6914
fatcat:btzbsacnwffavi6xvdkaufbqz4
From Zero to Hero: How Zero-Rating Became a Debate about Human Rights
2016
IEEE Internet Computing
s co n si d er at io n s, in cl u d in g d ep lo ym en t, sc al ab ili ty , se cu ri ty , an d p ri va cy . ...
However, as suggested before, try imagining your local school system has disappeared and your children are instead being offered Wikipedia in Swahili via a $10 smartphone. ...
IEEE Computer Society Jobs is your ideal recruitment resource, targeting over 85,000 expert researchers and qualified top-level managers in software engineering, robotics, programming, artificial intelligence ...
doi:10.1109/mic.2016.88
fatcat:imrhaaoac5gifool7wjegaxl5q
Exploring Subtext Processing in Narrative Persuasion: The Role of Eudaimonic Entertainment-Use Motivation and a Supplemental Conclusion Scene
2016
Communication Quarterly
After viewing, participants completed a thought-listing task and second survey. Results show that "Harvest" did not result in persuasive outcomes related to organ donation. ...
Further examination showed that, compared to people with low eudaimonic motivation, those with high eudaimonic motivation were less likely to engage in intended elaboration, but only in the no conclusion ...
How likely do you think it is that someone in your family might need an organ transplant sometime in the future? ...
doi:10.1080/01463373.2015.1103287
fatcat:qrd62ec5vrcxbemfivv7fzr6ry
EDUCATION FOR SPECIFIC PURPOSES
[chapter]
2014
Education for Cataloging and the Organization of Information
The papers in this collection were solicited with that in mind. ...
In the course of his survey, he also gathered information about which textbooks are being used in conjunction with graduate courses in cataloging related subjects. ...
Please base your answer on the material covered in this class. ...
doi:10.4324/9781315785837-7
fatcat:vl4obtw4lzexblq3gr4rzbofhq
« Previous
Showing results 1 — 15 out of 173 results