1,668
views
0
recommends
+1 Recommend
1 collections
    12
    shares

      UK Computing Summit 2025: Navigating change (surviving and beyond) - 29-30 April @ Sheffield Hallam University - Register here.

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Instructions for Creating Passwords: How do They Help in Password Creation

      Published
      proceedings-article
      ,
      Electronic Visualisation and the Arts (EVA 2017) (EVA)
      Electronic Visualisation and the Arts
      11 – 13 July 2017
      Password Creation Instructions, Password Policy, Password Creation Suggestions
      Bookmark

            Abstract

            Content

            Author and article information

            Contributors
            Conference
            July 2017
            July 2017
            : 1-10
            Affiliations
            [0001]Human Computer Interaction Research Group

            Department of Computer Science

            University of York, York UK YO10 5GH
            Article
            10.14236/ewic/HCI2017.55
            94c90ecf-33d9-47a2-88db-7e56412978c4
            © Althubaiti et al. Published by BCS Learning and Development. Proceedings of British HCI 2017 – Digital Make-Believe, Sunderland, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Electronic Visualisation and the Arts (EVA 2017)
            EVA
            London, UK
            11 – 13 July 2017
            Electronic Workshops in Computing (eWiC)
            Electronic Visualisation and the Arts
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2017.55
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Password Policy,Password Creation Instructions,Password Creation Suggestions

            References

            1. The top 500 sites on the web Alexa. Available at http://www.alexa.com/topsites February 1 2016

            2. 2012 Graphical passwords: Learning from the first twelve years ACM Computing Surveys (CSUR) 44 19

            3. et al 2004 Generating and remembering passwords Applied Cognitive Psychology 18 6 641 651

            4. 1984 Learning to use a word processor: By doing, by thinking, and by knowing Human factors in computer systems

            5. 2007 A large-scale study of web password habits In Proceedings of the 16th international conference on World Wide Web - WWW '07. New York, New York, USA ACM Press 657

            6. 2011 Using and managing multiple passwords: A week to a view Interacting with computers 23 3 256 267

            7. 2012 Biometric recognition: an overview Second Generation Biometrics: The Ethical, Legal and Social Context Springer 49 79

            8. 2005 Procedural and declarative information in user instructions: What we do and don't know about these information types Conference

            9. 2001 Transforming the ‘weakest link'—a human/computer interaction approach to usable and effective security BT technology journal 19 122 131

            10. 1984 Understanding Written Instructions: The Role of an Explanatory Schema Cognition and Instruction 1 4 359 396

            11. 1991 Evidence for cognitive load theory Cognition and Instruction 8 4 351 362

            12. 2010 The psychology of password management: a tradeoff between security and convenience Behaviour and Information Technology 29 3 233 244

            13. 1997 Procedural and declarative information in software manuals: Effects on information use, task performance and knowledge Rodopi

            Comments

            Comment on this article