共 94 条
- [1] Al-Khalifa F.A., Kohun F.G., Skovira R.J., A discussion about culture and information security policy compliance: a Sub-culturally bound determinant – redefining the Hofstede hypothesis, Issues in Information Systems, 16, 4, pp. 202-208, (2015)
- [2] Aljahdali H., Poet R., The affect of familiarity on the usability of recognition-based graphical passwords, paper presented at the 12th IEEE International Conference on Trust, (2013)
- [3] Aljahdali H., Poet R., Challenge set designs and user guidelines for usable and secured recognition-based graphical passwords, paper presented at the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (2014)
- [4] Aljaroodi H.M., Adam M.T.P., Chiong R., Teubner T., Avatars and embodied agents in experimental information systems research: a systematic review and conceptual framework, Australasian Journal of Information Systems, 23, pp. 1-37, (2019)
- [5] Aljaroodi H.M., Chiong R., Adam M.T.P., Designing persuasive avatars in mhealth for arabic culture: a qualitative study, paper presented at the Australasian Conference on Information Systems, (2017)
- [6] Aljaroodi H.M., Chiong R., Adam M.T.P., Exploring the design of avatars for users from Arabian culture through a hybrid approach of deductive and inductive reasoning, Computers in Human Behavior, 106, (2020)
- [7] Atkinson R.C., Shiffrin R.M., Human memory. A proposed system and its control processes, The Psychology of Learning and Motivation, Vol. 2, (1968)
- [8] Barate A.K., Shinde S.S., Graphical password system using different techniques – a review, International Journal of Engineering Trends and Technology (IJETT, 9, 11, pp. 536-539, (2014)
- [9] Bhusari V., Graphical authentication based techniques, International Journal of Scientific and Research Publications, 3, 7, pp. 31-38, (2013)
- [10] Bhuyan S., Evaluating the usability of system-generated and user-generated passwords of approximately minimum equal security, (2011)