Abstract
Differences in the ways that Web sites require visitors to log in may be subtle, but they can sometimes make a difference in ease of use.
Get full access to this article
View all access options for this article.
References
1.American Heritage Dictionaries.
(2000).
The American Heritage Dictionary of the English Language (4th ed. ). Boston
Houghton Mifflin
2.
Krause
B. R.
(2003).
Security & usability
Encentuate.com
, http://www.encentuate.com/perspectives/usability.htm
3.
Kuhn
S.
(1996).
Design for people at work In
Winograd
T.
(Ed.), Bringing design to software.
Boston : Addison-Wesley. Available at http://hci.stanford.edu/bds/14-kuhn.html
4.Princeton University, WordNet 2.0.
(1996).
Princeton University , 2003. Available at ftp://clarity.princeton.edu/pub/wordnet/wn1.6unix.tar.gz
5.
Sasse
M. A.
Brostoff
S.
Weirich
D.
(2001).
Transforming the “weakest link” - A human/computer interaction approach to usable and effective security
BT Technology Journal , 19
(3) , 122 –131
