These are the sources and citations used to research Practice Makes Perfect. This bibliography was generated on Cite This For Me on

  • Journal

    Adams, A. and Sasse, M. A.

    Users are not the enemy

    1999 - ACM

    In-text: (Adams and Sasse, 1999)

    Your Bibliography: Adams, A. and Sasse, M., 1999. Users are not the enemy. Communications of the ACM, 42(12), pp.40--46.

  • Journal

    Adams, A., Sasse, M. A. and Lunt, P.

    Making passwords secure and usable

    1997 - Springer

    In-text: (Adams, Sasse and Lunt, 1997)

    Your Bibliography: Adams, A., Sasse, M. and Lunt, P., 1997. Making passwords secure and usable. pp.1--19.

  • Journal

    Atkinson, R. C. and Shiffrin, R. M.

    Human memory: A proposed system and its control processes

    1968 - The psychology of learning and motivation

    In-text: (Atkinson and Shiffrin, 1968)

    Your Bibliography: Atkinson, R. and Shiffrin, R., 1968. Human memory: A proposed system and its control processes. The psychology of learning and motivation, 2, pp.89--195.

  • Conference proceedings

    B\"ohmer, M., Hecht, B., Sch\"oning, J., Kr\"uger, A. and Bauer, G.

    Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage

    2011

    In-text: (B\"ohmer et al., 2011)

    Your Bibliography: B\"ohmer, M., Hecht, B., Sch\"oning, J., Kr\"uger, A. and Bauer, G., 2011. Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage. pp.47--56.

  • Book

    Baddeley, A. D.

    The psychology of memory

    1976 - Basic Books

    In-text: (Baddeley, 1976)

    Your Bibliography: Baddeley, A., 1976. The psychology of memory. Basic Books.

  • Conference proceedings

    Bao, P., Pierce, J., Whittaker, S. and Zhai, S.

    Smart phone use by non-mobile business users

    2011

    In-text: (Bao, Pierce, Whittaker and Zhai, 2011)

    Your Bibliography: Bao, P., Pierce, J., Whittaker, S. and Zhai, S., 2011. Smart phone use by non-mobile business users. pp.445--454.

  • Website

    Beck, M.

    Gigya Survey: 77% Of Consumers Say They Have Used Social Logins

    2014

    In-text: (Beck, 2014)

    Your Bibliography: Beck, M., 2014. Gigya Survey: 77% Of Consumers Say They Have Used Social Logins. [online] Marketing Land. Available at: <http://marketingland.com/gigya-survey-77-consumers-say-used-social-logins-101213> [Accessed 2 January 2016].

  • Journal

    Brashers-Krug, T., Shadmehr, R. and Bizzi, E.

    Consolidation in human motor memory

    1996 - Nature

    In-text: (Brashers-Krug, Shadmehr and Bizzi, 1996)

    Your Bibliography: Brashers-Krug, T., Shadmehr, R. and Bizzi, E., 1996. Consolidation in human motor memory. Nature, 382(6588), pp.252--255.

  • Journal

    Craik, F. I. and Tulving, E.

    Depth of processing and the retention of words in episodic memory.

    1975 - American Psychological Association

    In-text: (Craik and Tulving, 1975)

    Your Bibliography: Craik, F. and Tulving, E., 1975. Depth of processing and the retention of words in episodic memory. Journal of experimental Psychology: general, 104(3), p.268.

  • Website

    Sign in with Twitter | Twitter Developers

    2016

    In-text: (Sign in with Twitter | Twitter Developers, 2016)

    Your Bibliography: Dev.twitter.com. 2016. Sign in with Twitter | Twitter Developers. [online] Available at: <https://dev.twitter.com/web/sign-in> [Accessed 2 January 2016].

  • Website

    Sign In with LinkedIn | Documentation

    2016

    In-text: (Sign In with LinkedIn | Documentation, 2016)

    Your Bibliography: Developer.linkedin.com. 2016. Sign In with LinkedIn | Documentation. [online] Available at: <https://developer.linkedin.com/docs/signin-with-linkedin> [Accessed 2 January 2016].

  • Website

    Yahoo OpenID - YDN

    2016

    In-text: (Yahoo OpenID - YDN, 2016)

    Your Bibliography: Developer.yahoo.com. 2016. Yahoo OpenID - YDN. [online] Available at: <https://developer.yahoo.com/openid/> [Accessed 2 January 2016].

  • Website

    Facebook Login for Apps - Developer Documentation - Facebook for Developers

    2016

    In-text: (Facebook Login for Apps - Developer Documentation - Facebook for Developers, 2016)

    Your Bibliography: Facebook Developers. 2016. Facebook Login for Apps - Developer Documentation - Facebook for Developers. [online] Available at: <https://developers.facebook.com/docs/facebook-login> [Accessed 2 January 2016].

  • Journal

    Fendrich, D. W., Healy, A. F. and Bourne, L. E.

    Long-term repetition effects for motoric and perceptual procedures.

    1991 - American Psychological Association

    In-text: (Fendrich, Healy and Bourne, 1991)

    Your Bibliography: Fendrich, D., Healy, A. and Bourne, L., 1991. Long-term repetition effects for motoric and perceptual procedures. Journal of Experimental Psychology: Learning, Memory, and Cognition, 17(1), p.137.

  • Journal

    Flor\^encio, D., Herley, C. and Coskun, B.

    Do strong web passwords accomplish anything?

    2007 - HotSec

    In-text: (Flor\^encio, Herley and Coskun, 2007)

    Your Bibliography: Flor\^encio, D., Herley, C. and Coskun, B., 2007. Do strong web passwords accomplish anything?. HotSec, 7, p.6.

  • Conference proceedings

    Florencio, D. and Herley, C.

    A large-scale study of web password habits

    2007

    In-text: (Florencio and Herley, 2007)

    Your Bibliography: Florencio, D. and Herley, C., 2007. A large-scale study of web password habits. pp.657--666.

  • Website

    Ghita, S.

    Mobile Detect - lightweight PHP class for detecting mobile devices (including tablets)

    2016

    In-text: (Ghita, 2016)

    Your Bibliography: Ghita, S., 2016. Mobile Detect - lightweight PHP class for detecting mobile devices (including tablets). [online] Mobiledetect.net. Available at: <http://mobiledetect.net> [Accessed 9 January 2016].

  • Journal

    Glenberg, A. M.

    Influences of retrieval processes on the spacing effect in free recall.

    1977 - American Psychological Association

    In-text: (Glenberg, 1977)

    Your Bibliography: Glenberg, A., 1977. Influences of retrieval processes on the spacing effect in free recall. Journal of Experimental Psychology: Human Learning and Memory, 3(3), p.282.

  • Website

    Google Identity Platform  |  Google Developers

    2016

    In-text: (Google Identity Platform  |  Google Developers, 2016)

    Your Bibliography: Google Developers. 2016. Google Identity Platform  |  Google Developers. [online] Available at: <https://developers.google.com/identity/> [Accessed 2 January 2016].

  • Journal

    Haist, F., Shimamura, A. P. and Squire, L. R.

    On the relationship between recall and recognition memory.

    1992 - American Psychological Association

    In-text: (Haist, Shimamura and Squire, 1992)

    Your Bibliography: Haist, F., Shimamura, A. and Squire, L., 1992. On the relationship between recall and recognition memory. Journal of Experimental Psychology: Learning, Memory, and Cognition, 18(4), p.691.

  • Conference proceedings

    Halderman, J. A., Waters, B. and Felten, E. W.

    A convenient method for securely managing passwords

    2005

    In-text: (Halderman, Waters and Felten, 2005)

    Your Bibliography: Halderman, J., Waters, B. and Felten, E., 2005. A convenient method for securely managing passwords. pp.471--479.

  • Conference proceedings

    Hayashi, E. and Hong, J.

    A Diary Study of Password Usage in Daily Life

    2011 - ACM

    In-text: (Hayashi and Hong, 2011)

    Your Bibliography: Hayashi, E. and Hong, J., 2011. A Diary Study of Password Usage in Daily Life. In: CHI '11. [online] ACM, pp.2627--2630. Available at: <http://doi.acm.org/10.1145/1978942.1979326>.

  • Conference proceedings

    Kuo, C., Romanosky, S. and Cranor, L. F.

    Human selection of mnemonic phrase-based passwords

    2006

    In-text: (Kuo, Romanosky and Cranor, 2006)

    Your Bibliography: Kuo, C., Romanosky, S. and Cranor, L., 2006. Human selection of mnemonic phrase-based passwords. pp.67--78.

  • Journal

    Miller, G. A.

    The magical number seven, plus or minus two: some limits on our capacity for processing information.

    1956 - American Psychological Association

    In-text: (Miller, 1956)

    Your Bibliography: Miller, G., 1956. The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological review, 63(2), p.81.

  • E-book or PDF

    Dyslexia Style Guide

    In-text: (Dyslexia Style Guide, n.d.)

    Your Bibliography: n.d. Dyslexia Style Guide. 1st ed. [ebook] Available at: <http://www.bdadyslexia.org.uk/common/ckeditor/filemanager/userfiles/About_Us/policies/Dyslexia_Style_Guide.pdf> [Accessed 9 January 2016].

  • Website

    RASHID, F. Y.

    Signing Into Websites With Google, Facebook is Good for Security

    2016

    FAHMIDA Y. RASHID

    In-text: (RASHID, 2016)

    Your Bibliography: RASHID, F., 2016. Signing Into Websites With Google, Facebook is Good for Security. [online] PCMAG. Available at: <http://www.pcmag.com/article2/0,2817,2484486,00.asp> [Accessed 2 January 2016].

  • Conference proceedings

    Schaub, F., Deyhle, R. and Weber, M.

    Password entry usability and shoulder surfing susceptibility on different smartphone platforms

    2012

    In-text: (Schaub, Deyhle and Weber, 2012)

    Your Bibliography: Schaub, F., Deyhle, R. and Weber, M., 2012. Password entry usability and shoulder surfing susceptibility on different smartphone platforms. p.13.

  • Journal

    Sears, A., Revis, D., Swatski, J., Crittenden, R. and Shneiderman, B.

    Investigating touchscreen typing: the effect of keyboard size on typing speed

    1993 - Taylor \& Francis

    In-text: (Sears et al., 1993)

    Your Bibliography: Sears, A., Revis, D., Swatski, J., Crittenden, R. and Shneiderman, B., 1993. Investigating touchscreen typing: the effect of keyboard size on typing speed. Behaviour \& Information Technology, 12(1), pp.17--22.

  • Website

    Manage saved passwords - Chrome Help

    2016

    In-text: (Manage saved passwords - Chrome Help, 2016)

    Your Bibliography: Support.google.com. 2016. Manage saved passwords - Chrome Help. [online] Available at: <https://support.google.com/chrome/answer/95606?hl=en> [Accessed 2 January 2016].

  • Journal

    Tulving, E. and Pearlstone, Z.

    Availability versus accessibility of information in memory for words

    1966 - Elsevier

    In-text: (Tulving and Pearlstone, 1966)

    Your Bibliography: Tulving, E. and Pearlstone, Z., 1966. Availability versus accessibility of information in memory for words. Journal of Verbal Learning and Verbal Behavior, 5(4), pp.381--391.

  • Journal

    Tulving, E.

    The effect of alphabetical subjective organization on memorizing unrelated words.

    1962 - University of Toronto Press

    In-text: (Tulving, 1962)

    Your Bibliography: Tulving, E., 1962. The effect of alphabetical subjective organization on memorizing unrelated words. Canadian Journal of Psychology/Revue canadienne de psychologie, 16(3), p.185.

  • Conference proceedings

    von Zezschwitz, E., De Luca, A. and Hussmann, H.

    Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performance

    2014

    In-text: (von Zezschwitz, De Luca and Hussmann, 2014)

    Your Bibliography: von Zezschwitz, E., De Luca, A. and Hussmann, H., 2014. Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performance. pp.461--470.

  • Journal

    Yan, J., Blackwell, A., Anderson, R. and Grant, A.

    The memorability and security of passwords: some empirical results

    2000 - UNIVERSITY OF CAMBRIDGE

    In-text: (Yan, Blackwell, Anderson and Grant, 2000)

    Your Bibliography: Yan, J., Blackwell, A., Anderson, R. and Grant, A., 2000. The memorability and security of passwords: some empirical results. Technical Report-University Of Cambridge Computer Laboratory, p.1.

  • Journal

    Zviran, M. and Haga, W. J.

    A comparison of password techniques for multilevel authentication mechanisms

    1993 - Br Computer Soc

    In-text: (Zviran and Haga, 1993)

    Your Bibliography: Zviran, M. and Haga, W., 1993. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal, 36(3), pp.227--237.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join