These are the sources and citations used to research Practice Makes Perfect. This bibliography was generated on Cite This For Me on
In-text: (Adams and Sasse, 1999)
Your Bibliography: Adams, A. and Sasse, M., 1999. Users are not the enemy. Communications of the ACM, 42(12), pp.40--46.
In-text: (Adams, Sasse and Lunt, 1997)
Your Bibliography: Adams, A., Sasse, M. and Lunt, P., 1997. Making passwords secure and usable. pp.1--19.
In-text: (Atkinson and Shiffrin, 1968)
Your Bibliography: Atkinson, R. and Shiffrin, R., 1968. Human memory: A proposed system and its control processes. The psychology of learning and motivation, 2, pp.89--195.
In-text: (B\"ohmer et al., 2011)
Your Bibliography: B\"ohmer, M., Hecht, B., Sch\"oning, J., Kr\"uger, A. and Bauer, G., 2011. Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage. pp.47--56.
In-text: (Baddeley, 1976)
Your Bibliography: Baddeley, A., 1976. The psychology of memory. Basic Books.
In-text: (Bao, Pierce, Whittaker and Zhai, 2011)
Your Bibliography: Bao, P., Pierce, J., Whittaker, S. and Zhai, S., 2011. Smart phone use by non-mobile business users. pp.445--454.
In-text: (Beck, 2014)
Your Bibliography: Beck, M., 2014. Gigya Survey: 77% Of Consumers Say They Have Used Social Logins. [online] Marketing Land. Available at: <http://marketingland.com/gigya-survey-77-consumers-say-used-social-logins-101213> [Accessed 2 January 2016].
In-text: (Brashers-Krug, Shadmehr and Bizzi, 1996)
Your Bibliography: Brashers-Krug, T., Shadmehr, R. and Bizzi, E., 1996. Consolidation in human motor memory. Nature, 382(6588), pp.252--255.
In-text: (Craik and Tulving, 1975)
Your Bibliography: Craik, F. and Tulving, E., 1975. Depth of processing and the retention of words in episodic memory. Journal of experimental Psychology: general, 104(3), p.268.
In-text: (Sign in with Twitter | Twitter Developers, 2016)
Your Bibliography: Dev.twitter.com. 2016. Sign in with Twitter | Twitter Developers. [online] Available at: <https://dev.twitter.com/web/sign-in> [Accessed 2 January 2016].
In-text: (Sign In with LinkedIn | Documentation, 2016)
Your Bibliography: Developer.linkedin.com. 2016. Sign In with LinkedIn | Documentation. [online] Available at: <https://developer.linkedin.com/docs/signin-with-linkedin> [Accessed 2 January 2016].
In-text: (Yahoo OpenID - YDN, 2016)
Your Bibliography: Developer.yahoo.com. 2016. Yahoo OpenID - YDN. [online] Available at: <https://developer.yahoo.com/openid/> [Accessed 2 January 2016].
In-text: (Facebook Login for Apps - Developer Documentation - Facebook for Developers, 2016)
Your Bibliography: Facebook Developers. 2016. Facebook Login for Apps - Developer Documentation - Facebook for Developers. [online] Available at: <https://developers.facebook.com/docs/facebook-login> [Accessed 2 January 2016].
In-text: (Fendrich, Healy and Bourne, 1991)
Your Bibliography: Fendrich, D., Healy, A. and Bourne, L., 1991. Long-term repetition effects for motoric and perceptual procedures. Journal of Experimental Psychology: Learning, Memory, and Cognition, 17(1), p.137.
In-text: (Flor\^encio, Herley and Coskun, 2007)
Your Bibliography: Flor\^encio, D., Herley, C. and Coskun, B., 2007. Do strong web passwords accomplish anything?. HotSec, 7, p.6.
In-text: (Florencio and Herley, 2007)
Your Bibliography: Florencio, D. and Herley, C., 2007. A large-scale study of web password habits. pp.657--666.
In-text: (Ghita, 2016)
Your Bibliography: Ghita, S., 2016. Mobile Detect - lightweight PHP class for detecting mobile devices (including tablets). [online] Mobiledetect.net. Available at: <http://mobiledetect.net> [Accessed 9 January 2016].
In-text: (Glenberg, 1977)
Your Bibliography: Glenberg, A., 1977. Influences of retrieval processes on the spacing effect in free recall. Journal of Experimental Psychology: Human Learning and Memory, 3(3), p.282.
In-text: (Google Identity Platform | Google Developers, 2016)
Your Bibliography: Google Developers. 2016. Google Identity Platform | Google Developers. [online] Available at: <https://developers.google.com/identity/> [Accessed 2 January 2016].
In-text: (Haist, Shimamura and Squire, 1992)
Your Bibliography: Haist, F., Shimamura, A. and Squire, L., 1992. On the relationship between recall and recognition memory. Journal of Experimental Psychology: Learning, Memory, and Cognition, 18(4), p.691.
In-text: (Halderman, Waters and Felten, 2005)
Your Bibliography: Halderman, J., Waters, B. and Felten, E., 2005. A convenient method for securely managing passwords. pp.471--479.
In-text: (Hayashi and Hong, 2011)
Your Bibliography: Hayashi, E. and Hong, J., 2011. A Diary Study of Password Usage in Daily Life. In: CHI '11. [online] ACM, pp.2627--2630. Available at: <http://doi.acm.org/10.1145/1978942.1979326>.
In-text: (Kuo, Romanosky and Cranor, 2006)
Your Bibliography: Kuo, C., Romanosky, S. and Cranor, L., 2006. Human selection of mnemonic phrase-based passwords. pp.67--78.
In-text: (Miller, 1956)
Your Bibliography: Miller, G., 1956. The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological review, 63(2), p.81.
In-text: (Dyslexia Style Guide, n.d.)
Your Bibliography: n.d. Dyslexia Style Guide. 1st ed. [ebook] Available at: <http://www.bdadyslexia.org.uk/common/ckeditor/filemanager/userfiles/About_Us/policies/Dyslexia_Style_Guide.pdf> [Accessed 9 January 2016].
FAHMIDA Y. RASHID
In-text: (RASHID, 2016)
Your Bibliography: RASHID, F., 2016. Signing Into Websites With Google, Facebook is Good for Security. [online] PCMAG. Available at: <http://www.pcmag.com/article2/0,2817,2484486,00.asp> [Accessed 2 January 2016].
In-text: (Schaub, Deyhle and Weber, 2012)
Your Bibliography: Schaub, F., Deyhle, R. and Weber, M., 2012. Password entry usability and shoulder surfing susceptibility on different smartphone platforms. p.13.
In-text: (Sears et al., 1993)
Your Bibliography: Sears, A., Revis, D., Swatski, J., Crittenden, R. and Shneiderman, B., 1993. Investigating touchscreen typing: the effect of keyboard size on typing speed. Behaviour \& Information Technology, 12(1), pp.17--22.
In-text: (Manage saved passwords - Chrome Help, 2016)
Your Bibliography: Support.google.com. 2016. Manage saved passwords - Chrome Help. [online] Available at: <https://support.google.com/chrome/answer/95606?hl=en> [Accessed 2 January 2016].
In-text: (Tulving and Pearlstone, 1966)
Your Bibliography: Tulving, E. and Pearlstone, Z., 1966. Availability versus accessibility of information in memory for words. Journal of Verbal Learning and Verbal Behavior, 5(4), pp.381--391.
In-text: (Tulving, 1962)
Your Bibliography: Tulving, E., 1962. The effect of alphabetical subjective organization on memorizing unrelated words. Canadian Journal of Psychology/Revue canadienne de psychologie, 16(3), p.185.
In-text: (von Zezschwitz, De Luca and Hussmann, 2014)
Your Bibliography: von Zezschwitz, E., De Luca, A. and Hussmann, H., 2014. Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performance. pp.461--470.
In-text: (Yan, Blackwell, Anderson and Grant, 2000)
Your Bibliography: Yan, J., Blackwell, A., Anderson, R. and Grant, A., 2000. The memorability and security of passwords: some empirical results. Technical Report-University Of Cambridge Computer Laboratory, p.1.
In-text: (Zviran and Haga, 1993)
Your Bibliography: Zviran, M. and Haga, W., 1993. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal, 36(3), pp.227--237.
10,587 students joined last month!