Naomi Woods & Mikko Siponen. (2024) How memory anxiety can influence password security behavior. Computers & Security 137, pages 103589.
Crossref
Assumpta Ezugwu, Elochukwu Ukwandu, Celestine Ugwu, Modesta Ezema, Comfort Olebara, Juliana Ndunagu, Lizzy Ofusori & Uchenna Ome. (2023) Password-based authentication and the experiences of end users. Scientific African 21, pages e01743.
Crossref
Ashraf Mady, Saurabh Gupta & Merrill Warkentin. (2023) The effects of knowledge mechanisms on employees' information security threat construal. Information Systems Journal 33:4, pages 790-841.
Crossref
Timothy McIntosh, A.S.M. Kayes, Yi-Ping Phoebe Chen, Alex Ng & Paul Watters. (2023) Applying staged event-driven access control to combat ransomware. Computers & Security 128, pages 103160.
Crossref
Saqib Saeed. (2023) Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia. Sustainability 15:7, pages 6019.
Crossref
Javaid Iqbal, Saira Hanif Soroya & Khalid Mahmood. (2023) Financial information security behavior in online banking. Information Development, pages 026666692211493.
Crossref
Yee-Yin Choong, Kerrianne Buchanan & Olivia Williams. 2023. HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust
29
48
.
Joshua Stassen, Ali Pirannejad & Kenny Meesters. 2023. Information Technology in Disaster Risk Reduction. Information Technology in Disaster Risk Reduction
215
229
.
Mohammed Aziz Al Kabir & Wael Elmedany. (2022) An Overview of the Present and Future of User Authentication. An Overview of the Present and Future of User Authentication.
Dedipyaman Das, Sibi Chakkaravarthy Sethuraman & Suresh Chandra Satapathy. (2022) A decentralized open web cryptographic standard. Computers and Electrical Engineering 99, pages 107751.
Crossref
Carlos Tam, Carolina de Matos Conceição & Tiago Oliveira. (2022) What influences employees to follow security policies?. Safety Science 147, pages 105595.
Crossref
Md. Mahmudur Rahman, Shahadat Hossain, Mimun Barid & Md. Manzurul Hasan. 2022. Intelligent Computing & Optimization. Intelligent Computing & Optimization
331
340
.
Marthie Grobler, M. A. P. Chamikara, Jacob Abbott, Jongkil Jay Jeong, Surya Nepal & Cecile Paris. (2020) The importance of social identity on password formulations. Personal and Ubiquitous Computing 25:5, pages 813-827.
Crossref
Svetlana Abramova, Artemij Voskobojnikov, Konstantin Beznosov & Rainer Böhme. (2021) Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users. Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users.
Marthie Grobler, Raj Gaire & Surya Nepal. (2021) User, Usage and Usability: Redefining Human Centric Cyber Security. Frontiers in Big Data 4.
Crossref
Rah Utami Nugrahani & Nabsiah Abdul Wahid. (2021) Technology Acceptance Model and Motivation-Opportunity-Ability Theory Influences on Indonesian Dota2 Gamer Customer to Customer Online Know-How Exchange. Journal of Physics: Conference Series 1779:1, pages 012003.
Crossref
Nelson Duarte, Nuno Coelho & Teresa Guarda. 2021. Advanced Research in Technologies, Information, Innovation and Sustainability. Advanced Research in Technologies, Information, Innovation and Sustainability
474
483
.
Polina Evtimova & James Nicholson. 2021. Human-Computer Interaction – INTERACT 2021. Human-Computer Interaction – INTERACT 2021
213
222
.
Paul Brockbanks & Martin J. Butler. 2021. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance
211
222
.
Maurice Dawson & Annamaria Szakonyi. (2020) Cybersecurity Education to Create Awareness in Artificial Intelligence Applications for Developers and End Users. Scientific Bulletin 25:2, pages 85-92.
Crossref
Rock Stevens, Josiah Dykstra, Wendy Knox Everette & Michelle L. Mazurek. (2020) It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs. IEEE Security & Privacy 18:6, pages 51-58.
Crossref
Boštjan Brumen. (2020) System-Assigned Passwords: The Disadvantages of the Strict Password Management Policies. Informatica, pages 459-479.
Crossref
Michael Stainbrook & Nicholas Caporusso. 2020. Advances in Human Factors in Cybersecurity. Advances in Human Factors in Cybersecurity
87
96
.
Thaier Fandakly & Nicholas Caporusso. 2020. Advances in Human Factors in Cybersecurity. Advances in Human Factors in Cybersecurity
48
58
.
Philip Kortum & Claudia Ziegler Acemyan. (2019) An examination of the effort hypothesis for the perceived strength of passwords. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63:1, pages 1291-1295.
Crossref
Sarah Kusumastuti, Heather Rosoff & Richard S. John. (2019) Characterizing Conflicting User Values for Cyber Authentication Using a Virtual Public Values Forum. Decision Analysis 16:3, pages 157-171.
Crossref
Karlos Luna. (2019) If it is easy to remember, then it is not secure: Metacognitive beliefs affect password selection. Applied Cognitive Psychology 33:5, pages 744-758.
Crossref
Naomi Woods & Mikko Siponen. (2019) Improving password memorability, while not inconveniencing the user. International Journal of Human-Computer Studies 128, pages 61-71.
Crossref
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Cyber Law, Privacy, and Security. Cyber Law, Privacy, and Security
20
37
.
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. National Security. National Security
60
77
.
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Multigenerational Online Behavior and Media Use. Multigenerational Online Behavior and Media Use
407
424
.
Xiang Michelle Liu. 2019. Analyzing Human Behavior in Cyberspace. Analyzing Human Behavior in Cyberspace
192
208
.
Michael Stainbrook & Nicholas Caporusso. 2019. Advances in Human Factors in Cybersecurity. Advances in Human Factors in Cybersecurity
23
32
.
Zhang Min. 2019. Simulation Tools and Techniques. Simulation Tools and Techniques
353
362
.
Burak Merdenyan & Helen Petrie. 2019. Human-Computer Interaction – INTERACT 2019. Human-Computer Interaction – INTERACT 2019
549
563
.
Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto & Youki Kadobayashi. (2018) A comparative study of smartphone-user security perception and preference towards redesigned security notifications. A comparative study of smartphone-user security perception and preference towards redesigned security notifications.
Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic & Kévin Huguenin. (2018) Towards Usable Checksums. Towards Usable Checksums.
Rika Butler & Martin Butler. (2018) Some password users are more equal than others: Towards customisation of online security initiatives. SA Journal of Information Management 20:1.
Crossref
Burak Merdenyan & Helen Petrie. Generational Differences in Password Management Behaviour. Generational Differences in Password Management Behaviour.
Shipi Kankane, Carlina DiRusso & Christen Buckley. (2018) Can We Nudge Users Toward Better Password Management?. Can We Nudge Users Toward Better Password Management?.
Lila A. Loos & Martha E. Crosby. 2018. Augmented Cognition: Users and Contexts. Augmented Cognition: Users and Contexts
117
132
.
Javier Galbally, Iwen Coisel & Ignacio Sanchez. (2017) A New Multimodal Approach for Password Strength Estimation—Part II: Experimental Evaluation. IEEE Transactions on Information Forensics and Security 12:12, pages 2845-2860.
Crossref
France Bélanger, Stéphane Collignon, Kathryn Enget & Eric Negangard. (2017) Determinants of early conformance with information security policies. Information & Management 54:7, pages 887-901.
Crossref
Samantha Bordoff, Quan Chen & Zheng Yan. (2017) Cyber Attacks, Contributing Factors, and Tackling Strategies. International Journal of Cyber Behavior, Psychology and Learning 7:4, pages 68-82.
Crossref
Chongyang Chen, Kem Z.K. Zhang, Xiang Gong, Sesia J. Zhao, Matthew K.O. Lee & Liang Liang. (2017) Understanding compulsive smartphone use: An empirical test of a flow-based model. International Journal of Information Management 37:5, pages 438-454.
Crossref
Karen Renaud & Verena Zimmerman. (2017) Enriched nudges lead to stronger password replacements … but implement mindfully. Enriched nudges lead to stronger password replacements … but implement mindfully.
Václav Šimandl & Jiří Vaníček. (2017) Influences on ICT teachers knowledge and routines in a technical e-safety context. Telematics and Informatics.
Crossref
Saja Althubaiti. (2017) Improving the Design and Usability of Password Creation Systems. Improving the Design and Usability of Password Creation Systems.
Debora Jeske & Paul van Schaik. (2017) Familiarity with Internet threats: Beyond awareness. Computers & Security 66, pages 129-141.
Crossref
Mark A. Will, Jeffery Garae, Yu Shyang Tan, Craig Scoon & Ryan K.L. Ko. (2017) Returning Control of Data to Users with a Personal Information Crunch - A Position Paper. Returning Control of Data to Users with a Personal Information Crunch - A Position Paper.
Saja Althubaiti & Helen Petrie. Instructions for Creating Passwords: How do They Help in Password Creation. Instructions for Creating Passwords: How do They Help in Password Creation.
Bostjan Brumen, Renato Ivancic & Ivan Rozman. (2016) A comparison of password management policies. A comparison of password management policies.
Francois Mouton, Louise Leenen & H.S. Venter. (2016) Social engineering attack examples, templates and scenarios. Computers & Security 59, pages 186-209.
Crossref
Kenneth D. Nguyen, Heather Rosoff & Richard S. John. (2016) The effects of attacker identity and individual user characteristics on the value of information privacy. Computers in Human Behavior 55, pages 372-383.
Crossref
Helen Petrie & Burak Merdenyan. (2016) Cultural and Gender Differences in Password Behaviors. Cultural and Gender Differences in Password Behaviors.
L. Jean Camp, Jacob Abbott & Siyu Chen. (2016) CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication.
Kirsten E. Richards & Anthony F. Norcio. 2016. Advances in Human Factors in Cybersecurity. Advances in Human Factors in Cybersecurity
305
312
.
Thang Hoang, Deokjai Choi & Thuc Nguyen. (2015) Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. International Journal of Information Security 14:6, pages 549-560.
Crossref
Martin Butler & Rika Butler. (2015) Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking. Information & Computer Security 23:4, pages 421-434.
Crossref
Pam Briggs & Lisa Thomas. (2015) An Inclusive, Value Sensitive Design Perspective on Future Identity Technologies. ACM Transactions on Computer-Human Interaction 22:5, pages 1-28.
Crossref
Rika Butler & Martin Butler. (2015) The password practices applied by South African online consumers: Perception versus reality. SA Journal of Information Management 17:1.
Crossref
Kathryn Parsons, Agata McCormac, Malcolm Pattinson, Marcus Butavicius & Cate Jerram. (2015) The design of phishing studies: Challenges for researchers. Computers & Security 52, pages 194-206.
Crossref
Katharina Krombholz, Heidelinde Hobel, Markus Huber & Edgar Weippl. (2015) Advanced social engineering attacks. Journal of Information Security and Applications 22, pages 113-122.
Crossref
Bostjan Brumen & Viktor Taneski. (2015) Moore's curse on textual passwords. Moore's curse on textual passwords.
Monica WhittyJames DoodsonSadie CreeseDuncan Hodges. (2015) Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords. Cyberpsychology, Behavior, and Social Networking 18:1, pages 3-7.
Crossref
Gráinne Kirwan. 2015. The Cloud Security Ecosystem. The Cloud Security Ecosystem
269
281
.
Norliza Katuk, Hatim Mohamad Tahir, Nur Haryani Zakaria & Mohamad Subri Halim. 2015. Pattern Analysis, Intelligent Security and the Internet of Things. Pattern Analysis, Intelligent Security and the Internet of Things
85
93
.
Michael Bachmann. (2014) Passwords are Dead: Alternative Authentication Methods. Passwords are Dead: Alternative Authentication Methods.
Rob Jenkins, Jane L. McLachlan & Karen Renaud. (2014) Facelock: familiarity-based graphical authentication. PeerJ 2, pages e444.
Crossref
B. Brumen & A. Cernezel. (2014) Brute force analysis of PsychoPass-generated Passwords. Brute force analysis of PsychoPass-generated Passwords.
Viktor Taneski, Marjan Hericko & Bostjan Brumen. (2014) Password security — No change in 35 years?. Password security — No change in 35 years?.
Karen Renaud, Melanie Volkamer & Joseph Maguire. 2014. Human Aspects of Information Security, Privacy, and Trust. Human Aspects of Information Security, Privacy, and Trust
183
194
.
Katharina Krombholz, Heidelinde Hobel, Markus Huber & Edgar Weippl. (2013) Social engineering attacks on the knowledge worker. Social engineering attacks on the knowledge worker.
Shu-Chiung Lin, David C. Yen, Patrick S. Chen & Wei-Kuo Lin. (2013) Coding behavior of authentication code on the internet. Computers in Human Behavior 29:5, pages 2090-2099.
Crossref
Norliza Katuk, Mohamad Subri Halim, Hatim Mohd. Tahir, Amran Ahmad & Sharmila Mat Yusof. (2013) Behavioral Analysis of Students? Login Credentials Management in Mobile Environment. Journal of Industrial and Intelligent Information 1:3, pages 132-138.
Crossref
Sadie Creese, Duncan Hodges, Sue Jamison-Powell & Monica Whitty. 2013. Human Aspects of Information Security, Privacy, and Trust. Human Aspects of Information Security, Privacy, and Trust
80
89
.
Kathryn Parsons, Agata McCormac, Malcolm Pattinson, Marcus Butavicius & Cate Jerram. 2013. Security and Privacy Protection in Information Processing Systems. Security and Privacy Protection in Information Processing Systems
366
378
.
Gráinne Kirwan & Andrew PowerGráinne Kirwan & Andrew Power. 2012. The Psychology of Cyber Crime. The Psychology of Cyber Crime
94
112
.
Kirsi Helkala. (2011) Password Education Based on Guidelines Tailored to Different Password Categories. Journal of Computers 6:5.
Crossref