Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Usage
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Analyzing the usage of character groups and keyboard patterns in password creation
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (3): 347–358.
Published: 20 January 2020
... to assume that users that use encryption are more security aware than the average user. Based on that assumption, this paper also surveys the difference in usage of character sets and keyboard patterns between ordinary users and user that actively encrypts their data. This is done by means of a survey where...
Journal Articles
Understanding consumer intention with respect to purchase and use of pirated software
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2011) 19 (3): 195–210.
Published: 19 July 2011
... of users value the importance of the software differently and put them into different usage as well. Leventhal (1976) extended procedural fairness and distributive fairness from Adams (1965) 's equity model. Douglas et al. (2007) included distributive fairness together with procedural...
