Satisfaction and its Correlates in Agile Software Development | 0 | 0.34 | 2020 |
Home and Away: UI Design Patterns for Supporting End-User Security | 0 | 0.34 | 2020 |
Control and Understanding in Malware and Legitimate Software | 0 | 0.34 | 2019 |
Mixed Pictures: Mental Models of Malware | 0 | 0.34 | 2019 |
Website Identity Notification: Testing the Simplest Thing That Could Possibly Work | 0 | 0.34 | 2019 |
The influence of textual and verbal word-of-mouth on website usability and visual appeal | 0 | 0.34 | 2019 |
Learning with Trees: - A Non-linear E-Textbook Format for Deep Learning. | 0 | 0.34 | 2019 |
From Incident to Insight: Incident Responders and Software Innovation. | 0 | 0.34 | 2019 |
The Password Life Cycle. | 1 | 0.36 | 2018 |
Stress in Agile Software Development: Practices and Outcomes. | 0 | 0.34 | 2018 |
Sources of satisfaction in agile software development. | 0 | 0.34 | 2018 |
Satisfaction, Practices, and Influences in Agile Software Development. | 1 | 0.35 | 2018 |
Hide-and-Seek with Website Identity Information. | 0 | 0.34 | 2018 |
Myagile: sociological and cultural effects of agile on teams and their members. | 1 | 0.37 | 2018 |
An Exploratory Study Of Children'S Online Password Behaviours | 0 | 0.34 | 2018 |
Building Website Certificate Mental Models. | 0 | 0.34 | 2018 |
How can our publication models best serve our research? (panel). | 0 | 0.34 | 2017 |
Affective Walkthroughs and Heuristics: Evaluating Minecraft Hour of Code. | 0 | 0.34 | 2017 |
Secure comics: an interactive comic series for improving cyber security and privacy. | 0 | 0.34 | 2017 |
Does textual word-of-mouth affect look and feel? | 0 | 0.34 | 2016 |
MADE Ratio: Affective Multimodal Software for Mathematical Concepts. | 0 | 0.34 | 2016 |
Hacking with multi-touch for Java (MT4j). | 1 | 0.35 | 2016 |
Evaluating Software for Affective Education: A Case Study of the Affective Walkthrough. | 1 | 0.40 | 2016 |
Agile Practices, Collaboration and Experience - An Empirical Study About the Effect of Experience in Agile Software Development. | 0 | 0.34 | 2016 |
Incident response teams in IT operations centers: the T-TOCs model of team functionality. | 0 | 0.34 | 2016 |
Teaching Agile Collaboration Skills in the Classroom | 3 | 0.41 | 2016 |
Choose Your Own Authentication | 5 | 0.50 | 2015 |
Supporting "what-if" in touch-screen web Applications | 1 | 0.35 | 2015 |
Collaborative annotations for large touchscreen web Applications | 1 | 0.35 | 2015 |
Understanding Digital Cardwall Usage | 2 | 0.38 | 2015 |
ACH Walkthrough: A Distributed Multi-Device Tool for Collaborative Security Analysis | 3 | 0.44 | 2014 |
Beyond Usable Security. | 0 | 0.34 | 2014 |
A Password Manager that Doesn't Remember Passwords | 4 | 0.47 | 2014 |
The Password Life Cycle: User Behaviour in Managing Passwords. | 41 | 1.26 | 2014 |
Complex activities in an operations center: a case study and model for engineering interaction | 2 | 0.44 | 2013 |
Visual end-user security | 0 | 0.34 | 2012 |
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism | 47 | 1.23 | 2012 |
Exploring usability effects of increasing security in click-based graphical passwords | 14 | 0.79 | 2010 |
Input precision for gaze-based graphical passwords | 3 | 0.46 | 2010 |
Guessing click-based graphical passwords by eye tracking | 5 | 0.43 | 2010 |
Lessons from brain age on persuasion for computer security | 3 | 0.39 | 2009 |
Understanding game design for affective learning | 15 | 0.98 | 2008 |
Web software visualization using extensible 3D (X3D) graphics | 2 | 0.44 | 2008 |
Improving text passwords through persuasion | 43 | 2.70 | 2008 |
A Qualitative Study of Culture and Persuasion in a Smoking Cessation Game | 12 | 0.82 | 2008 |
Stories, Sketches, and Lists: Developers and Interaction Designers Interacting Through Artefacts | 21 | 1.05 | 2008 |
Lessons from Brain Age on password memorability | 9 | 0.56 | 2008 |
Influencing users towards better passwords: persuasive cued click-points | 57 | 2.52 | 2008 |
Persuasion for Stronger Passwords: Motivation and Pilot Study | 20 | 1.04 | 2008 |
Graphical password authentication using cued click points | 91 | 3.57 | 2007 |