ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
54
views
23
references
Top references
cited by
13
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,375
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Using and managing multiple passwords: A week to a view
Author(s):
Beate Grawemeyer
,
Hilary Johnson
Publication date
Created:
May 2011
Publication date
(Print):
May 2011
Journal:
Interacting with Computers
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Further versions
open (via free article)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genome Engineering using CRISPR
Most cited references
23
Record
: found
Abstract
: not found
Article
: not found
Levels of processing versus transfer appropriate processing
C. Morris
,
John Bransford
,
Jeffery J. Franks
(1977)
0
comments
Cited
305
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Security Policies and Security Models
J. Goguen
,
J. Meseguer
(1982)
0
comments
Cited
119
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Users are not the enemy
Anne Adams
,
Martina Sasse
(1999)
0
comments
Cited
114
times
– based on
0
reviews
Review now
Bookmark
All references
Author and article information
Journal
Title:
Interacting with Computers
Abbreviated Title:
Interacting with Computers
Publisher:
Elsevier BV
ISSN (Print):
09535438
Publication date Created:
May 2011
Publication date (Print):
May 2011
Volume
: 23
Issue
: 3
Pages
: 256-267
Article
DOI:
10.1016/j.intcom.2011.03.007
SO-VID:
3150f820-10d8-43d0-9710-cd19783390a3
Copyright ©
© 2011
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
4,375
An efficient client–client password-based authentication scheme with provable security
Authors:
Mohammad Farash
,
Mahmoud Ahmadian Attari
Usability, security and trust in password managers: A quest for user-centric properties and features
Authors:
Sunil Chaudhary
,
Tiina Schafeitel-Tähtinen
,
Marko Helenius
…
Analysis and enhancement of a password authentication and update scheme based on elliptic curve cryptography
Authors:
Wang
See all similar
Cited by
13
A Cognitive-Behavioral Framework of User Password Management Lifecycle
Authors:
Yee-Yin Choong
Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors
Authors:
Shelia Kennison
,
Eric Chan-Tin
Cyber Security Games: A New Line of Risk
Authors:
John M. Blythe
,
Lynne Coventry
See all cited by
Most referenced authors
158
H. TAKAHASHI
K Furukawa
H. YOSHIMURA
See all reference authors