Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
24 lines (12 sloc) 2.01 KB

References used in http://habitry.link/passwords

Alkaldi, N. and Renaud, K. (2016) Why Do People Adopt, or Reject, Smartphone Password Managers? In: EuroUSEC 2016: The 1st European Workshop on Usable Security, Darmstadt, Germany, 18 July 2016, ISBN 1891562452.

Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90–101.

Cybersecurity Ventures (2017). Cybercrime Report 2017 Edition. Retrieved from https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/.

Deci E.L., Ryan R.M. (2014) Autonomy and need satisfaction in close relationships: Relationships motivation theory. In: Weinstein N. (eds) Human Motivation and Interpersonal Relationships. Springer, Dordrecht.

Finkelstein, S. R., & Fishbach, A. (2011). Tell me what I did wrong: Experts seek and respond to negative feedback. Journal of Consumer Research, 39, 22–38.

Gigerenzer, Gerd. Risk savvy: How to make good decisions. Penguin, 2015.

Kardas, M., & O’Brien, E. (2018). Easier Seen Than Done: Merely Watching Others Perform Can Foster an Illusion of Skill Acquisition. Psychological Science, Online first publication.

Kok, G., Peters, G. J. Y., Kessels, L. T., Ten Hoor, G. A., & Ruiter, R. A. (2017). Ignoring theory and misinterpreting evidence: The false belief in fear appeals. Health Psychology Review, Online First Publication.

Menard, P., Bott, G. J., & Crossler, R. E. (2017). User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34, 1203–1230.

Olmstead, K., Smith, Aaron. (2017a). Americans’ experiences with data security. Retrieved from http://www.pewinternet.org/2017/01/26/americans-and-cybersecurity/.

Olmstead, K., Smith, Aaron. (2017b). What the public knows about cybersecurity. Retrieved from http://www.pewinternet.org/2017/03/22/what-the-public-knows-about-cybersecurity/.

You can’t perform that action at this time.