Dyslexia and Password Usage: Accessibility in Authentication Design (Englisch)
- Neue Suche nach: Renaud, Karen
- Neue Suche nach: Johnson, Graham
- Neue Suche nach: Ophoff, Jacques
- Neue Suche nach: Renaud, Karen
- Neue Suche nach: Johnson, Graham
- Neue Suche nach: Ophoff, Jacques
In:
Human aspects of information security and assurance
; 259-268
;
2020
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Dyslexia and Password Usage: Accessibility in Authentication Design
-
Beteiligte:
-
Kongress:HAISA ; 14. ; 2020 ; Mytilene; Online
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham, Switzerland
-
Erscheinungsdatum:2020
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.8
- Weitere Informationen zu Dewey Decimal Classification
- Neue Suche nach: 54.38 / 54.32
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?Shanley, Leah / Johnstone, Michael N. / Crowley, Michael / Szewczyk, Patryk et al. | 2020
- 16
-
Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South AfricaVeiga, Adéle Da / Ophoff, Jacques et al. | 2020
- 30
-
A Review of Information Security Aspects of the Emerging Covid-19 Contact Tracing Mobile Phone ApplicationsMagklaras, Georgios / Lopez-Bojorquez, Lucia N. et al. | 2020
- 47
-
Towards a Cross-Cultural Education Framework for Online Safety AwarenessHerkanaidu, R. / Furnell, S. M. / Papadaki, M. et al. | 2020
- 58
-
Towards an Heuristic Approach to Cybersecurity and Online Safety PedagogyMarsden, Simon et al. | 2020
- 71
-
ContextBased MicroTraining: A Framework for Information Security TrainingKdvrestad, Joakim / Nohlberg, Marcus et al. | 2020
- 85
-
Employees’ Interest in Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical TestAlotaibi, Mohammed Khaled N. et al. | 2020
- 97
-
Does Ubuntu Influence Social Engineering Susceptibility?Mokobane, Ntsewa B. / Botha, Reinhardt A. et al. | 2020
- 109
-
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection TheoryUnchit, P. / Das, S. / Kim, A. / Camp, L. J. et al. | 2020
- 123
-
KidsDoodlePass: An Exploratory Study of an Authentication Mechanism for Young ChildrenAlkhamis, Esra / Petrie, Helen / Renaud, Karen et al. | 2020
- 133
-
Information Security Behavioural Threshold Analysis in Practice: An Implementation FrameworkSnyman, D. P. / Kruger, H. A. et al. | 2020
- 144
-
Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination TheoryGangire, Yotamu / Veiga, Adéle Da / Herselman, Marlien et al. | 2020
- 161
-
Addressing SME Characteristics for Designing Information Security Maturity ModelsOzkan, Bilge Yigit / Spruit, Marco et al. | 2020
- 175
-
Cyber Security Education and Training Delivering Industry Relevant Education and Skills via Degree ApprenticeshipsVasileiou, Ismini et al. | 2020
- 186
-
Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet AddictionSchoultz, Dean John von / Thomson, Kerry-Lynn / Niekerk, Johan Van et al. | 2020
- 211
-
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android DevicesMomenzadeh, B. / Gopavaram, S. / Das, S. / Camp, L. J. et al. | 2020
- 224
-
Exploring Information Security and Domestic EqualityNohlberg, Marcus / Kävrestad, Joakim et al. | 2020
- 233
-
Responding to KRACK: Wi-Fi Security Awareness in Private HouseholdsFreudenreich, Jan / Weidman, Jake / Grossklags, Jens et al. | 2020
- 247
-
Exploring the Meaning of "Usable Security"Lennartsson, Markus / Kävrestad, Joakim / Nohlberg, Marcus et al. | 2020
- 259
-
Dyslexia and Password Usage: Accessibility in Authentication DesignRenaud, Karen / Johnson, Graham / Ophoff, Jacques et al. | 2020
- 269
-
Securing User eXperience: A Review for the End-Users’ Software RobustnessZagouras, Panagiotis / Kalloniatis, Christos et al. | 2020
- 289
-
SMEs' Confidentiality Concerns for Security Information SharingShojaifar, Alireza / Fricker, Samuel A. et al. | 2020
- 300
-
Validation of an Information Privacy Perception Instrument at a Zimbabwean UniversityMaguraushe, Kudakwashe / Veiga, Adéle Da / Martins, Nico et al. | 2020
- 315
-
Are We Really Informed on the Rights GDPR Guarantees?Sideri, Maria / Gritzalis, Stefanos et al. | 2020
- 329
-
“Most Companies Share Whatever They Can to Make Money!” Comparing User's Perceptions with the Data Practices of IoT DevicesAl-Ameen, Mahdi Nasrullah / Chauhan, Apoorva / Ahsan, M. A. Manazir / Kocabas, Huzeyfe et al. | 2020
- 341
-
Analysis of the ‘Open Source Internet Research Tool’: A Usage Perspective from UK Law EnforcementWilliams, Joseph / Stephens, Paul et al. | 2020
- 353
-
Critical Analysis of Information Security Culture DefinitionsRuhwanya, Zainab / Ophoff, Jacques et al. | 2020