참고문헌
- Afifi, W. A., & Guerrero, L. K. (2000). Motivations underlying topic avoidance in close relationships. In Petronio, S. S. (Eds.), Balancing the secrets of private disclosures (pp. 165-179). Mahwah, NJ, US: Lawrence Erlbaum Associates Publishers.
- Bederson, B. B., Clamage, A., Czerwinski, M. P., &Robertson, G. G. (2003, April). A fisheye calendar interface for PDAs: Providing overviews for small displays. In CHI'03 extended abstracts on Human factors in computing systems(pp. 618-619). ACM.
- Brostoff, S., & Sasse, M. A. (2000). Are Passfaces more usable than passwords? A field trial investigation. In People and Computers XIV-Usability or Else! (pp. 405-424). Springer London.
- Buchanan, G., Farrant, S., Jones, M., Thimbleby, H., Marsden, G., & Pazzani, M. (2001, April). Improving mobile internet usability. In Proceedings of the 10th international conference on World Wide Web (pp. 673-680). ACM.
- Chiasson, S., van Oorschot, P. C., & Biddle, R. (2006, August). A Usability Study and Critique of Two Password Managers. In Usenix Security (Vol. 6).
- Cranor, L. F., & Garfinkel, S. (2004). Guest Editors' Introduction: Secure or Usable?. Security & Privacy, IEEE, 2(5), 16-18.
- Elliot, A. J., & Devine, P. G. (1994). On the motivational nature of cognitive dissonance: Dissonance as psychological discomfort. Journal of personality and social psychology, 67(3), 382. https://doi.org/10.1037/0022-3514.67.3.382
- Festinger, L, (1957). A Theory of Cognitive Dissonance. Evanston, IL: Row, Peterson.
- Hafiz, M. D., Abdullah, A. H., Ithnin, N., & Mammi, H. K. (2008, May). Towards identifying usability and security features of graphical password in knowledge based authentication technique. In Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on (pp. 396-403). IEEE.
- Kelly, A. E., & Achter, J. A. (1995). Self-concealment and attitudes toward counseling in university students. Journal of Counseling Psychology, 42(1), 40. https://doi.org/10.1037/0022-0167.42.1.40
- Kim, K., Proctor, R. W., & Salvendy, G. (2012). The relation between usability and product success in cell phones. Behaviour & Information Technology, 31(10), 969-982. https://doi.org/10.1080/0144929X.2011.596997
- Larson, D. G., & Chastain, R. L. (1990). Self-concealment: Conceptualization, measurement, and health implications. Journal of Social and Clinical psychology, 9(4), 439-455. https://doi.org/10.1521/jscp.1990.9.4.439
- Nine out of ten finders of lost smart-phones do 'This' (2012). IT Dong-A, Retrieved December 9, 2013, http://it.donga.com/8991/
- Norton, R., Feldman, C., & Tafoya, D. (1974). Risk parameters across types of secrets. Journal of Counseling Psychology, 21(5), 450. https://doi.org/10.1037/h0037100
- Research on the information security in Korea (2013). Korea Internet & Security Agency, Retrieved December 9. 2013, http://isis.kisa.or.kr/
- Ritz, T., & Dahme, B. (1996). Repression, self-concealment and rationality/emotional defensiveness: The correspondence between three questionnaire measures of defensive coping. Personality and Individual Differences, 20(1), 95-102. https://doi.org/10.1016/0191-8869(95)00142-S
- Smart-phone users in Korea unlock their smart-phone once in every six minutes (2013). Joongang Ilbo, Retrieved December 9, 2013, http://article.joins.com/news/article/article.asp?total_id=13497286&ctg=1601
- Thirty six per cent of the smart-phone users do not set up their own password (2013). Yonhap News, Retrieved December 9, 2013, http://www.yonhapnews.co.kr/international/2013/02/28/0608000000AKR20130228004100091.HTML
- Yan, J. J., Blackwell, A. F., Anderson, R. J., & Grant, A. (2004). Password Memorability and Security: Empirical Results. IEEE Security & privacy, 2(5), 25-31. https://doi.org/10.1109/MSP.2004.81
- Zhang, T., Rau, P. L. P., & Salvendy, G. (2010). Exploring critical usability factors for handsets. Behaviour & Information Technology, 29(1), 45-55. https://doi.org/10.1080/01449290802666747
- Ziefle, M., Bay, S., & Schwade, A. (2006). On keys' meanings and modes: The impact of different key solutions on children's efficiency using a mobile phone. Behaviour & Information Technology, 25(5), 413-431. https://doi.org/10.1080/01449290500197086