See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
ArianezhadM., CampL. J., KelleyT., & StebilaD. (2013). Comparative eye tracking of experts and novices in web single sign-on. Proceedings of the third ACM Conference on Data and Application Security and Privacy. ACM Press.
BalashD.G., WuX., GrantM., ReyesI., & AvivA.J. (2022). Security and privacy perceptions of third-party application access for Google accounts. Proceedings of the 31st USENIX Security Symposium.
BauerL., Bravo-LilloC., FragkakiE., & MelicherW. (2013). A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality Proceedings of the 2013 ACM Workshop on Digital Identity Management. ACM Press.
BrostoffS., JennettC., MalheirosM., & SasseM.A. (2013). Federated identity to access egovernment services: are citizens ready for this? Proceedings of the 2013 ACM Workshop on Digital Identity Management. ACM Press.
ChoE., KimJ., & SundarS.S. (2020). Will You Log into Tinder using your Facebook Account? Adoption of Single Sign-On for Privacy-Sensitive Apps. ACM Conference on Human Factors in Computing Systems. ACM Press.
DaugmanJ. (2009). Iris Recognition at Airports and Border-Crossings. In S.LiZ. & JainA. (Eds.), Encyclopaedia of Biometrics. Springer. EgelmanS. My profile is my password, verify me! the privacy/convenience tradeoff of Facebook connect Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France. (2013). 8
GafniR. & NissimD. (2014). To social login or not login? Exploring factors affecting the decision. Informing Science and Information Technology, 11, 57 – 72.
JiangJ. (2018). Social login acceptance: a DIF study of differential factors. 22nd Pacific Asia Conference on Information Systems. Association for Information Systems.
MorkondaS.G., ChiassonS., & van OorschotP.C. Influences of displaying permission-related information on web single sign-on login decisions. Computers & Security, 139, 103666 (2024)
NordPass Security. (2024). Top 200 most common passwords. https://nordpass.com/most-commonpasswords-list/ [accessed 6 April 2024]
Office for National Statistics (2023). Education, England and Wales: Census 2021. Available at: https://www.ons.gov.uk/peoplepopulationandco mmunity/educationandchildcare/bulletins/educationenglandandwales/census2021#highest-levelof-qualification [accessed 6 April 2024]
OrneM.T. (1962). On the social psychology of the psychological experiment: with particular reference to the demand characteristics and their implications. American Psychologist, 17, 776–783.
PetrieH., SreekumarG., & ShahandashtiS. (2024). Understanding users’ mental models of Federated Identity Management (FIM): use of a new tangible elicitation method. Proceedings of IFIP International Symposium on Human Aspects of Information Security & Assurance (HAISA 2024). Springer.
PratamaA.R., FirmansyahF.M., & RahmaF. (2022). Security awareness of single sign-on account in the academic community: the roles of demographics, privacy concerns, and Big-Five personality. PeerJ Computer Science, 8:e918.
RuotiS., RobertsB., & SeamonsK. (2015). Authentication Melee: A Usability Analysis of Seven Web Authentication Systems. Proceedings of the 24th International Conference on World Wide Web.
SchechterS. E., DhamijaR., OzmentA., & FischerI. (2007). The Emperor's New Security Indicators Proceedings of the 2007 IEEE Symposium on Security and Privacy. IEEE.
SotirakopoulosA., HawkeyK., & BeznosovK. (2010). “I did it because I trusted you”: Challenges with the study environment biasing participant behaviors. SOUPS Usable Security Experiment Reports (USER) Workshop.
SotirakopoulosA., HawkeyK., & BeznosovK. (2011). On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings. Proceedings of the Seventh Symposium on Usable Privacy and Security.
StobertE., & BiddleR. (2018). The Password Life Cycle. ACM Transactions on Privacy and Security, 21(3), Article 13.
SunS.-T., PospisilE., MuslukhovI., DindarN., HawkeyK., & BeznosovK. (2011). OpenIDenabled browser: towards usable and secure web single sign-on. ACM Conference on Human Factors in Computing Systems. ACM Press.
SunS.-T., PospisilE., MuslukhovI., DindarN., HawkeyK., & BeznosovK. (2011). What makes users refuse web single sign-on? an empirical investigation of OpenID. Proceedings of the Seventh Symposium on Usable Privacy and Security.
SunS.-T., PospisilE., MuslukhovI., DindarN., HawkeyK., & BeznosovK. (2013). Investigating Users’ Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model. ACM Transactions on Internet Technologies, 13(1), Article 2.