2,312
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Enhancing the user authentication process with colour memory cues

&
Pages 1548-1567 | Received 12 Jan 2022, Accepted 14 Jun 2022, Published online: 15 Jul 2022

References

  • Adams, A., and M. Sasse. 1999. “Users Are Not the Enemy.” Communications of the ACM 42 (12): 41–46.
  • Al-Ameen, M. N., S. T. Marne, K. Fatema, M. Wright, and S. Scielzo. 2020. “On Improving the Memorability of System-assigned Recognition-based Passwords.” Behaviour & Information Technology 41 (5): 1115–1131.
  • Al-Ameen, M. N., M. Wright, and S. Scielzo. 2015. “Towards Making Random Passwords Memorable: Leveraging Users’ Cognitive Ability Through Multiple Cues.” Proceedings of the Enhanced Security with Passwords & CAPTCHAs, CHI ‘15, Seoul, Republic of Korea, 2315–2324.
  • Albers, J. 1975. Interaction of Color: Text of the Original Edition with Revised Plate Section. New Haven, CT: Yale University Press.
  • Alkaldi, N., K. Renaud, and L. Mackenzie. 2018. “Encouraging Password Manager Adoption by Meeting Adopter Self-Determination Needs.” Proceedings of the 52nd Hawaii International Conference on System Sciences, HICSS, Hawaii.
  • Anderson, M. 2009. “Incidental Forgetting.” In Memory, edited by A. D. Baddeley, M. W. Eysenck, and M. C. Anderson, 191–216. Hove & New York, NY: Psychology Press.
  • Atkinson, R. C., and R. M. Shiffrin. 1968. “Human Memory: A Proposed System and Its Control Processes.” Psychology of Learning and Motivation 2: 89–195.
  • Baddeley, A. D. 1992. “Working Memory.” Science 255: 556–559.
  • Baddeley, A. D. 2009a. “What is Memory?” In Memory, edited by A. D. Baddeley, M. W. Eysenck, and M. C. Anderson, 1–18. Hove & New York, NY: Psychology Press.
  • Baddeley, A. D. 2009b. “Memory and Aging.” In Memory, edited by A. D. Baddeley, M. W. Eysenck, and M. C. Anderson, 293–316. Hove & New York, NY: Psychology Press.
  • Baddeley, A., and G. J. Hitch. 1974. “Working Memory.” In Recent Advances in Learning and Motivation, edited by G. A. Bower, 8, 47–89. New York: Academic Press.
  • Baddeley, A., and G. J. Hitch. 1977. Recency re-Examined, Attention and Performance VI. Hillsdale, NJ: Lawrence Erlbaum Associates, pp. 647–667.
  • Bang, Y., D. Lee, Y. Bae, and J. Ahn. 2012. “Improving Information Security Management: An Analysis of ID–Password Usage and a New Login Vulnerability Measure.” International Journal of Information Management 32: 409–418. doi:10.1016/j.ijinfomgt.2012.01.001.
  • Berlin, B., and P. Kay. 1969. Basic Color Terms: Their Universality and Evolution. Berkeley: University of California.
  • Biddle, R., S. Chiasson, and P. C. Van Orschot. 2012. “Graphical Passwords: Learning from the First Twelve Years.” ACM Computing Surveys 44 (4): 19:11–19:41. doi:10.1145/2333112.2333114.
  • Biggam, C. P. 2012. The Semantics of Colour: A Historical Approach. Cambridge: Cambridge University Press.
  • Bonneau, J., and S. Preibusch. 2010. “The Password Thicket: Technical and Markey Failures in Human Authentication on the Web.” Proceedings of the 9th Workshop on the Economics of Information Security, WEIS 2010, Boston, MA, 1–49.
  • Brostoff, S., and M. A. Sasse. 2000. “Are Passfaces More Usable Than Passwords? A Field Trial Investigation.” Proceedings of the HCI2000: People and Computers XIV – Usability or Else. Springer, Sunderland, UK, 405–424. doi:10.1007/978-1-4471-0515-2_27.
  • Brown, A. S., E. Bracken, S. Zoccoli, and K. Douglas. 2004. “Generating and Remembering Passwords.” Applied Cognitive Psychology 18 (6): 641–651.
  • Campbell, J., D. Kleeman, and W. Ma. 2006. “Password Composition Policy: Does Enforcement Lead to Better Password Choices?” Proceedings of the17th. Australasian Conference on Information Systems Password Composition Policy, ACIS, Adelaide, Australia, 60.
  • Chiang, H. Y., and S. Chiasson. 2013. “Improving User Authentication on Mobile Devices: A Touchscreen Graphical Password.” Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 251–260.
  • Chiasson, S., P. C. van Oorschot, and R. Biddle. 2006. “A Usability Study and Critique of Two Password Managers.” The Proceedings of the 15th USENIX Security Symposium ‘06, 1–16.
  • Cohen, J. 1992. “A Power Primer.” Psychological Bulletin 112 (1): 155–159.
  • Craik, F., and R. Lockhart. 1972. “Levels of Processing. A Framework for Memory Research.” Journal of Verbal Learning and Verbal Behavior 11: 671–684.
  • Das, A., J. Bonneau, M. Caesar, N. Borisov, and X. Wang. 2014. “The Tangled Web of Password Reuse.” Proceeding of NDSS’14, San Diego, CA, 23–26.
  • Dennis, A., and J. Valacich. 2001. “Conducting Research in Information Systems.” Communications of the AIS 7 (5): 1–41.
  • Derefeldt, G., T. Swartling, U. Berggrund, and P. Bodrogi. 2004. “Cognitive Color. Color Research & Application: Endorsed by Inter-Society Color Council, The Colour Group (Great Britain), Canadian Society for Color, Color Science Association of Japan, Dutch Society for the Study of Color, The Swedish Colour Centre Foundation, Colour Society of Australia.” Centre Français de la Couleur 29 (1): 7–19.
  • Duggan, G. B., H. Johnson, and B. Grawemeyer. 2012. “Rational Security: Modelling Everyday Password Use.” International Journal of Human-Computer Studies 70: 415–431. doi:10.1016/j.ijhcs.2012.02.008.
  • Fahl, S., M. Harbach, Y. Acar, and M. Smith. 2013. “On the Ecological Validity of a Password Study.” Proceedings of the ninth Symposium on Usable Privacy and Security (June 201), 1–13.
  • Farley, F. H., and A. P. Grant. 1976. “Arousal and Cognition: Memory for Color Versus Black and White Multimedia Presentation.” The Journal of Psychology: Interdisciplinary and Applied 94 (1): 147–150.
  • Farnsworth, D. 1943. “The Farnsworth–Munsell 100-Hue and Dichotomous Tests for Color Vision.” Journal of the Optical Society of America 33 (10): 568–574.
  • Florêncio, D., and C. Herley. 2007. “A Large-Scale Study of web Password Habits.” Proceedings of the 16th International Conference on World Wide Web. ACM, 657–666.
  • Florêncio, D., and C. Herley. 2010. “Where Do Security Policies Come From?” In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS’ 10), ACM, New York, NY, 10. doi:10.1145/1837110.1837124.
  • Forget, A., S. Chiasson, and R. Biddle. 2008. “Lessons from Brain Age on Password Memorability.” Proceedings of the 2008 Conference on Future Play: Research, Play, Share, ACM, Toronto, Canada, 262–263.
  • Furnell, S., K. Helkala, and N. Woods. 2022. “Accessible Authentication: Assessing the Applicability for Users with Disabilities.” Computers & Security 113: 102561.
  • Gao, X., Y. Yang, C. Liu, C. Mitropoulos, J. Lindqvist, and A. Oulasvirta. 2018. “Forgetting of Passwords: Ecological Theory and Data.” Proceedings of 27th USENIX Security Symposium (USENIX Security 18), 221–238.
  • Gaw, S., and E. Felten. 2006. “Password Management Strategies for Online Accounts.” Proceedings of the Second Symposium on Usable Privacy and Security, (SOUPS), ACM, New York, NY, 44–55. doi:10.1145/1143120.1143127.
  • Grawemeyer, B., and H. Johnson. 2011. “Using and Managing Multiple Passwords: A Week to a View.” Interacting with Computers 23: 256–267. doi:10.1016/j.intcom.2011.03.007.
  • Guo, K. H. 2013. “Security-related Behavior in Using Information Systems in the Workplace: A Review and Synthesis.” Computers & Security 32: 242–251. http://doi.org/10.1016/j.cose.2012.10.003.
  • Guo, K. H., and Y. Yuan. 2012. “The Effects of Multilevel Sanctions on Information Security Violations: A Mediating Model.” Information & Management 49 (6): 320–326.
  • Habib, H., P. E. Naeini, S. Devlin, M. Oates, C. Swoopes, L. Bauer, and L. F. Cranor. 2018. “User Behaviors and Attitudes Under Password Expiration Policies.” Proceedings of Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 13–30.
  • Hanna, A., and G. R. Loftus. 1993. “A Model for Conceptual Processing of Naturalistic Scenes.” Canadian Journal of Experimental Psychology 47: 548–569.
  • Hanna, A., and R. Remington. 1996. “The Representation of Color and Form in Long-Term Memory.” Memory & Cognition 24 (3): 322–330.
  • Haque, S. T., M. N. Al-Ameen, S. Scielzo, and M. Wright. 2017. “Learning System-assigned Passwords (up to 56 Bits) in a Single Registration Session with the Methods of Cognitive Psychology.” Proceedings of the USEC ‘17, San Diego, CA: The Internet Society, 1–10, http://doi.org/10.14722/usec.2017.23034.
  • Hartwig, K., and C. Reuter. 2021. “Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualisations.” Behaviour & Information Technology 41 (7): 1357–1380.
  • Hayashi, E., B. A. Pendleton, F. K. Ozenc, and J. I. Hong. 2012. “WebTicket: Account Management Using Printable Tokens.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, ACM, New York, NY, 997–1006.
  • Helkala, K., and N. K. Svendsen. 2011. “The Security and Memorability of Passwords Generated by Using an Association Element and a Personal Factor.” Proceedings of the Nordic Conference on Secure IT Systems, Springer, Berlin Heidelberg, 114–130.
  • Herath, T., and H. R. Rao. 2009. “Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations.” European Journal of Information Systems 18 (2): 106–125.
  • Herley, C., and P. Van Oorschot. 2012. “A Research Agenda Acknowledging the Persistence of Passwords.” IEEE Security & Privacy 10 (1): 28–36.
  • Hoonakker, P., N. Bornoe, and P. Carayon. 2009. “Password Authentication from a Human Factors Perspective: Results of a Survey Among End-Users.” Proceedings of the Human Factors and Ergonomics Society Annual Meeting, SAGE, Vol. 53, No. 6, 459–463.
  • Huang, K., C. Lin, and S. Chiang. 2008. “Color Preferences and Familiarity in Performance on Brand Logo Recall.” Perceptual and Motor Skills 107: 587–596.
  • Inglesant, P., and M. A. Sasse. 2010. “The True Cost of Unusable Password Policies: Password Use in the Wild.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010, ACM, New York, NY, 383–392. doi:10.1145/1753326.1753384.
  • Ishihara, S. 1917. “Tests for Color-blindness” (Handaya, Tokyo, Hongo Harukicho, 1917).
  • Itten, J. 1973. The Art of Color: The Subjective Experience and Objective Rationale of Color. New York: Van Nostrand Reinhold.
  • Ives, B., K. Walsh, and H. Schneider. 2004. “The Domino Effect of Password Reuse.” Communications of the ACM 47 (4): 75–78. doi:10.1145/975817.975820.
  • Jenkins, J. L., M. Grimes, J. Proudfoot, and P. B. Lowry. 2014. “Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Warnings.” Information Technology for Development 20 (2): 196–213.
  • Johnston, A. C., M. Warkentin, and M. Siponen. 2015. “An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric.” MIS Quarterly 39 (1): 113–134.
  • Kawasaki, M., and Y. Yamaguchi. 2012. “Individual Visual Working Memory Capacities and Related Brain Oscillatory Activities Are Modulated by Color Preferences.” Frontiers in Human Neuroscience 6: 318.
  • Keith, M., B. Shao, and P. Steinbart. 2009. “A Behavioral Analysis of Passphrase Design and Effectiveness.” Journal of the Association for Information Systems 10 (2): 63–89.
  • Khamis, M., T. Seitz, L. Mertl, A. Nguyen, M. Schneller, and Z. Li. 2019. “Passquerade: Improving Error Correction of Text Passwords on Mobile Devices by Using Graphic Filters for Password Masking.” Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–8.
  • Kharrufa, A., T. Ploetz, and P. Olivier. 2017. “A Unified Model for User Identification on Multi-Touch Surfaces: A Survey and Meta-Analysis.” ACM Transactions on Computer-Human Interaction (TOCHI) 24 (6): 1–39.
  • Komanduri, S., R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, … S. Egelman. 2011, May. “Of Passwords and People: Measuring the Effect of Password-Composition Policies.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2595–2604.
  • Legner, C., T. Eymann, T. Hess, C. Matt, T. Böhmann, P. Drews, A. Mädche, N. Urbach, and F. Ahlemann. 2017. “Digitalization: Opportunity and Challenge for the Business and Information Systems Engineering Community.” Business & Information Systems Engineering 59 (4): 301–308.
  • Liu, F., and M. D. Myers. 2011. “An Analysis of the AIS Basket of Top Journals.” Journal of Systems and Information Technology 13 (1): 5–24.
  • Livingstone, M. S., and D. H. Hubel. 1987. “Psychophysical Evidence for Separate Channels for the Perception of Form, Color, Movement, and Depth.” Journal of Neuroscience 7: 3416–3468.
  • Loreto, V., A. Mukherjee, and F. Tria. 2012. “On the Origin of the Hierarchy of Color Names.” PNAS 109 (18): 6819–6824.
  • Maier, M. A., P. Barchfeld, A. J. Elliot, and R. Pekrun. 2009. “Context Specificity of Implicit Preferences: The Case of Human Preference for Red.” Emotion 9 (5): 734.
  • Mamonov, S., and R. Benbunan-Fich. 2018. “The Impact of Information Security Threat Awareness on Privacy-Protective Behaviors.” Computers in Human Behavior 83: 32–44.
  • Marquardson, J. 2012. “Password Policy Effects on Entropy and Recall: Research in Progress.” In Proceedings of the 8th Americas Conference on Information Systems (AMCIS), AISeL, Seattle, Washington.
  • Masui, T. 2013. “Episopass: Password Management Based on Episodic Memories.” Proceedings of the 21st Workshop on Interactive Systems and Software (WISS2013) (pp. 109-114).
  • Mazurek, M. L., S. Komanduri, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, P. G. Kelley, R. Shay, and B. Ur. 2013. “Measuring Password Guessability for an Entire University.” Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security 173–186.
  • Merdenyan, B., and H. Petrie. 2022. “Two Studies of the Perceptions of Risk, Benefits and Likelihood of Undertaking Password Management Behaviours.” Behaviour & Information Technology, 1–14. Ahead of print.
  • Nelson, D., and K. L. Vu. 2010. “Effectiveness of Image-Based Mnemonic Techniques for Enhancing the Memorability and Security of User-Generated Passwords.” Computers in Human Behavior 26 (4): 705–715.
  • Notoatmodjo, G., and C. Thomborson. 2009. “Passwords and Perceptions.” Proceedings of the 7th Australasian Information Security Conference, AISC, Wellington, New Zealand.
  • Paivio, A. 1971. Imagery and Verbal Processes. London: Holt Rinehart and Winston.
  • Palmer, S. E., and K. B. Schloss. 2010. “An Ecological Valence Theory of Human Color Preference.” In Proceedings of the National Academy of Sciences 107 (19): 8877–8882.
  • Pasquini, D., M. Cianfriglia, G. Ateniese, and M. Bernaschi. 2021. “Reducing Bias in Modeling Real-World Password Strength via Deep Learning and Dynamic Dictionaries.” 30th USENIX Security Symposium (USENIX Security 21), 821–838.
  • Peer, E., S. Egelman, M. Harbach, N. Malkin, A. Mathur, and A. Frik. 2020. “Nudge Me Right: Personalizing Online Security Nudges to People’s Decision-Making Styles.” Computers in Human Behavior 109: 106347.
  • Poulin, R. 2011. The Language of Graphic Design: An Illustrated Handbook for Understanding Fundamental Design Principles. Beverly, MA: Rockport.
  • Renaud, K., and A. De Angeli. 2009. “Visual Passwords: Cure-all or Snake-oil?” Communications of the ACM 52 (12): 135–140.
  • Renaud, K., and J. Ramsay. 2014. “How Helpful is Colour-Cueing of PIN Entry?”. Cornell University arXiv preprint arXiv:1407.8007.
  • Ryan, G., and M. Valverde. 2006. “Waiting in Line for Online Services: A Qualitative Study of the User’s Perspective.” Information Systems Journal 16 (2): 181–211.
  • Saastamoinen, A. 2014. “Lomalla unohtuneet salasanat tulevat työnantajille kalliiksi – jopa satojen tuhansien kustannukset.” Accessed 24.09.15. http://yle.fi/ylex/uutiset/lomalla_unohtuneet_salasanat_tulevat_tyonantajille_kalliiksi__jopa_satojen_tuhansien_kustannukset/3-7580109.
  • Sasse, M. A., S. Brostoff, and D. Weirich. 2001. “Transforming the ‘Weakest Link’ – a Human/Computer Interaction Approach to Usable and Effective Security.” BT Technological Journal 19 (3): 122–131.
  • Seitz, T., M. Hartmann, J. Pfab, and S. Souque. 2017. “Do Differences in Password Policies Prevent Password Reuse?” Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA ‘17, ACM, New York, NY, 2056–2063.
  • Seo, B. G., and D. H. Park. 2019. “The Effect of Message Framing on Security Behavior in Online Services: Focusing on the Shift of Time Orientation via Psychological Ownership.” Computers in Human Behavior 93: 357–369.
  • Shay, R., L. Bauer, N. Christin, L. F. Cranor, A. Forget, S. Komanduri, Michelle L. Mazurek, William Melicher, Sean M. Segreti, and B. Ur. 2015, April. “A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior.” Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing systems, 2903–2912.
  • Shay, R., Saranga Komanduri, Adam L. Durity, Huh Phillip (Seyoung), Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2016. “Designing Password Policies for Strength and Usability.” ACM Transactions on Information and System Security (TISSEC) 18 (4): 13–34.
  • Shay, R., S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor. 2010. “Encountering Stronger Password Requirements: User Attitudes and Behaviors.” Proceedings of the 6th Symposium on Usable Privacy and Security, SOUPS’ 10, ACM, New York, NY, 2.
  • Siponen, M., and A. Vance. 2014. “Guidelines for Improving the Contextual Relevance of Field Surveys: The Case of Information Security Policy Violations.” European Journal of Information Systems 23 (3): 289–305.
  • Stobert, E., and R. Biddle. 2014. “A Password Manager That Doesn’t Remember Passwords.” Proceedings of the 2014 New Security Paradigms Workshop, NSPW ‘14, ACM, New York, NY, 39–52.
  • Tam, L., M. Glassman, and M. Vandenwauver. 2010. “The Psychology of Password Management: A Tradeoff Between Security and Convenience.” Behaviour & Information Technology 29 (3): 233–244.
  • Taylor, C., A. Clifford, and A. Franklin. 2013. “Color Preferences Are Not Universal.” Journal of Experimental Psychology: General 142 (4): 1015–1027.
  • Thoopsamut, P., and B. Limthanmaphon. 2019. “Handwritten Signature Authentication Using Color Coherence Vector and Signing Behavior.” Proceedings of the 2019 2nd International Conference on Information Science and Systems, 38–42.
  • Tulving, E., and D. Thomson. 1973. “Encoding Specificity and Retrieval Processes in Episodic Memory.” Psychological Review 80 (5): 352–373.
  • Ur, B., J. Bees, S. M. Segreti, L. Bauer, N. Christin, and L. F. Cranor. 2016. “Do Users’ Perceptions of Password Security Match Reality?” Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI’16, ACM, New York, NY, 3748–3760. doi:10.1145/2858036.2858546.
  • Vance, A., D. Eargle, K. Ouimet, and D. Straub. 2013. “Enhancing Password Security Through Interactive Fear Appeals: A Web-based Field Experiment.” Proceedings of 46th Hawaii International Conference on System Sciences (HICSS), Hawaii: IEEE, 2988–2997. doi:10.1109/HICSS.2013.196.
  • van Oorschot, P. C., and J. Thorpe. 2008. “On Predictive Models and User-Drawn Graphical Passwords.” ACM Transactions on Information and System Security (TISSEC) 10 (4): 1–33.
  • Vu, K. L., R. W. Proctorb, A. Bhargav-Spantzel, B. Tai, J. Cook, and E. E. Schultz. 2007. “Improving Password Security and Memorability to Protect Personal and Organizational Information.” International Journal of Human-Computer Studies 65: 744–757. https://doi.org/10.1016/j.ijhcs.2007.03.007.
  • Wang, D., P. Wang, D. He, and Y. Tian. 2019. “Birthday, Name and Bifacial-Security: Understanding Passwords of Chinese web Users.” 28th USENIX Security Symposium (USENIX Security 19), 1537–1555.
  • Wang, D., Z. Zhang, P. Wang, J. Yan, and X. Huang. 2016. “Targeted Online Password Guessing: An Underestimated Threat.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 1242–1254.
  • Weir, C. S., G. Douglas, M. Carruthers, and M. Jack. 2009. “User Perceptions of Security, Convenience and Usability for ebanking Authentication Tokens.” Computers & Security 28 (1): 47–62.
  • Wichmann, F. A., L. T. Sharpe, and K. R. Gegenfurtner. 2002. “The Contributions of Color to Recognition Memory for Natural Scenes.” Journal of Experimental Psychology: Learning, Memory, and Cognition 28 (3): 509–520.
  • Wiedenbeck, S., J. Waters, J. Birget, A. Brodskiy, and N. Memon. 2005. “PassPoints: Design and Longitudinal Evaluation of a Graphical Password System.” International Journal of Human-Computer Studies 63: 102–127.
  • Woo, S., R. Artstein, E. Kaiser, X. Le, and J. Mirkovic. 2019. “Using Episodic Memory for User Authentication.” ACM Transactions on Privacy and Security (TOPS) 22 (2): 1–34.
  • Woods, N. 2017. “Frequently Using Passwords Increases Their Memorability – A False Assumption or Reality?” Proceedings of the 23rd Americas Conference on Information Systems (AMCIS 2017), AISeL, Boston, MA, 1–5.
  • Woods, N. 2022. “Users’ Psychopathologies: Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior.” In Cyber Security, 93–134. Cham: Springer.
  • Woods, N., and M. Siponen. 2018. “Too Many Passwords? How Understanding our Memory Can Increase Password Memorability.” International Journal of Human-Computer Studies 111: 36–48.
  • Woods, N., and M. Siponen. 2019. “Improving Password Memorability, While Not Inconveniencing the User.” International Journal of Human-Computer Studies 128: 61–71.
  • Workman, M., W. H. Bommer, and D. Straub. 2008. “Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test.” Computers in Human Behavior 24: 2799–2816.
  • World Internet Users Statistics. 2019. Accessed: 01/05/2019, http://www.internetworldstats.com/stats.htm.
  • Wyler, S. 1992. Colour and Language: Colour Terms in English, Vol. 364. Tübingen: Gunter Narr Verlag.
  • Yang, W., N. Li, O. Chowdhury, A. Xiong, and R. W. Proctor. 2016. “An Empirical Study of Mnemonic Sentence-Based Password Generation Strategies.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications security, CCS ‘16, ACM, New York, NY, 1216–1229.
  • Zeki, S. 1993. A Vision of the Brain. Oxford: Blackwell.
  • Zeki, S. M., and L. Marini. 1998. “Three Cortical Stages of Colour Processing in the Human Brain.” Brain 121: 1669–1685.
  • Zhang, J., X. Luo, S. Akkaladevi, and J. Ziegelmayer. 2009. “Improving Multiple Password Recall: An Empirical Study.” European Journal of Information Systems 18 (2): 165–176.