``The Four Most-Used Passwords Are Love, Sex, Secret, and God'': Password Security and Training in Different User Groups (English)
- New search for: Lorenz, B.
- New search for: Kikkas, K.
- New search for: Klooster, A.
- New search for: Lorenz, B.
- New search for: Kikkas, K.
- New search for: Klooster, A.
- New search for: Marinos, Louis
- New search for: Askoxylakis, Ioannis
In:
Human aspects of information security, privacy and trust; HAS 2013
8030
;
276-283
;
2013
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:``The Four Most-Used Passwords Are Love, Sex, Secret, and God'': Password Security and Training in Different User Groups
-
Contributors:Lorenz, B. ( author ) / Kikkas, K. ( author ) / Klooster, A. ( author ) / Marinos, Louis / Askoxylakis, Ioannis
-
Conference:International conference; 1st, Human aspects of information security, privacy and trust; HAS 2013 ; 2013 ; Las Vegas, NV
-
Published in:Human aspects of information security, privacy and trust; HAS 2013 , 8030 ; 276-283LECTURE NOTES IN COMPUTER SCIENCE , 8030 ; 276-283
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2013-01-01
-
Size:8 pages
-
Remarks:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Evaluating the Usability of System-Generated and User-Generated Passwords of Approximately Equal SecurityBhuyan, S. / Greenstein, J.S. / Juang, K.A. et al. | 2013
- 13
-
Multicriteria Optimization to Select Images as Passwords in Recognition Based Graphical Authentication SystemsChowdhury, S. / Poet, R. / Mackenzie, L. et al. | 2013
- 23
-
Investigating an Intrusion Prevention System for Brain-Computer InterfacesCosta, S.D. / Stevens, D.R. / Hansen, J.A. et al. | 2013
- 29
-
Inconspicuous Personal Computer Protection with Touch-MouseHuang, M.-C. / Xu, W. / Liu, J.J. / Su, Y. / He, L. / Sarrafzadeh, M. et al. | 2013
- 39
-
Gamified CAPTCHAKani, J. / Nishigaki, M. et al. | 2013
- 49
-
Recognition of Human Identity by Detection of User ActivityScardino, G. / Infantino, I. / Vella, F. et al. | 2013
- 59
-
Learning a Policy for Gesture-Based Active Multi-touch AuthenticationPeralta, R.T. / Rebguns, A. / Fasel, I.R. / Barnard, K. et al. | 2013
- 71
-
Studying the Effect of Human Cognition on Text and Image Recognition CAPTCHA MechanismsBelk, M. / Germanakos, P. / Fidas, C. / Spanoudis, G. / Samaras, G. et al. | 2013
- 80
-
Relationships between Password Choices, Perceptions of Risk and Security ExpertiseCreese, S. / Hodges, D. / Jamison-Powell, S. / Whitty, M. et al. | 2013
- 90
-
Influence of Trust Assurances in Mobile Commerce Applications on the Formation of Online TrustHesseler, M. / Hartmann, G. / Karsch, S. et al. | 2013
- 100
-
A Comparison of American and German Folk Models of Home Computer SecurityKauer, M. / Gunther, S. / Storck, D. / Volkamer, M. et al. | 2013
- 110
-
Health Is Silver, Beauty Is Golden?: How the Usage Context Influences the Acceptance of an Invasive TechnologyKluge, J. / Ziefle, M. et al. | 2013
- 119
-
A Study Using TAM on the Recognition of Individuals' Privacy and the Acceptance of Risk-The Case of Japanese Internet Users-Komatsu, A. et al. | 2013
- 127
-
Personality's Influence on Facebook's Privacy Settings: A Case of College Students in TaiwanKuo, T. / Tang, H.-L. et al. | 2013
- 135
-
An Influence of Self-evaluated Gender Role on the Privacy Management Behavior in Online Social NetworksLee, K. / Song, I.-Y. et al. | 2013
- 145
-
A Taxonomy of Cyber Awareness Questions for the User-Centered Design of Cyber Situation AwarenessPaul, C.L. / Whitley, K. et al. | 2013
- 155
-
Click Me If You Can!: When Do Users Follow a Call to Action in an Online Message?Pfeiffer, T. / Theuerling, H. / Kauer, M. et al. | 2013
- 167
-
Increasing Trust Perceptions in the Internet of ThingsSchulz, T. / Tjostheim, I. et al. | 2013
- 176
-
Perception of Risky Security Behaviour by Users: Survey of Current ApproachesShepherd, L.A. / Archibald, J. / Ferguson, R.I. et al. | 2013
- 186
-
Understanding People's Preferences for Disclosing Contextual Information to Smartphone AppsShih, F. / Boortz, J. et al. | 2013
- 197
-
Constructing Positive Influences for User Security Decisions to Counter Corporate or State Sponsored Computer Espionage ThreatsStyles, M. et al. | 2013
- 209
-
Strategic Stakeholder Interaction Analysis of Cloud-Based Mobile Applications Use of Privacy-Sensitive End UsersAnastasopoulou, K. / Tryfonas, T. / Kokolakis, S. et al. | 2013
- 217
-
Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service ProvidersFurnell, S. / Bar, N. et al. | 2013
- 226
-
Ethical Issues Surrounding the Asymmetric Nature of Workplace MonitoringBustard, J.D. et al. | 2013
- 236
-
A Reasonable Expectation of Privacy? Secrecy and National Security in a DemocracyHogan, K.M. et al. | 2013
- 246
-
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' IntentHuth, M. / Kuo, J.H.-P. / Sasse, A. / Kirlappos, I. et al. | 2013
- 256
-
Modeling Security Policy and the Effect for End-UsersJones, K.D. / Salako, K. et al. | 2013
- 266
-
Legal Protection for Personal Information PrivacyLiu, Y. et al. | 2013
- 276
-
``The Four Most-Used Passwords Are Love, Sex, Secret, and God'': Password Security and Training in Different User GroupsLorenz, B. / Kikkas, K. / Klooster, A. et al. | 2013
- 284
-
The Privacy Paradox between Users' Attitudes, Stringent Legal Framework and (the Lack of) Adequate Implementation ToolsMonteleone, S. et al. | 2013
- 297
-
Addressing User Privacy and Experience in Distributed Long Lifetime SystemsCadzow, S.W. et al. | 2013
- 306
-
Secure and Energy-Efficient Life-Logging in Wireless Pervasive EnvironmentsFragkiadakis, A. / Askoxylakis, I. / Tragos, E. et al. | 2013
- 316
-
Supporting Human Decision-Making Online Using Information-Trustworthiness MetricsNurse, J.R.C. / Creese, S. / Goldsmith, M. / Rahman, S.S. et al. | 2013
- 326
-
On the Secure and Safe Data SynchronizationOcenasek, P. / Karmazin, J. et al. | 2013
- 332
-
The Practice of Global Internet FilteringOcenasek, P. et al. | 2013
- 338
-
A Privacy-Level Model of User-Centric Cyber-Physical SystemsPetroulakis, N.E. / Askoxylakis, I.G. / Traganitis, A. / Spanoudakis, G. et al. | 2013
- 348
-
High-Level Design for a Secure Mobile Device Management SystemRhee, K. / Eun, S.-K. / Joo, M.-R. / Jeong, J. / Won, D. et al. | 2013
- 357
-
Factors Influencing Adoption of Encryption to Secure Data in the CloudStavinoha, K.E. et al. | 2013
- 366
-
Cloudopsy: An Autopsy of Data Flows in the CloudZavou, A. / Pappas, V. / Kemerlis, V.P. / Polychronakis, M. / Portokalidis, G. / Keromytis, A.D. et al. | 2013