The Effect of an Emotional Factor on User Experience with Smartphone Unlocking Process |
Lee, Sunhwa
(HCI Lab, Yonsei University)
Shin, Youngsoo (HCI Lab, Yonsei University) Im, Chaerin (HCI Lab, Yonsei University) Beak, Hannah (HCI Lab, Yonsei University) Lee, Sungho (Management of Technology, Yonsei University) Kim, Jinwoo (HCI Lab, Yonsei University) |
1 | Brostoff, S., & Sasse, M. A. (2000). Are Passfaces more usable than passwords? A field trial investigation. In People and Computers XIV-Usability or Else! (pp. 405-424). Springer London. |
2 | Buchanan, G., Farrant, S., Jones, M., Thimbleby, H., Marsden, G., & Pazzani, M. (2001, April). Improving mobile internet usability. In Proceedings of the 10th international conference on World Wide Web (pp. 673-680). ACM. |
3 | Chiasson, S., van Oorschot, P. C., & Biddle, R. (2006, August). A Usability Study and Critique of Two Password Managers. In Usenix Security (Vol. 6). |
4 | Cranor, L. F., & Garfinkel, S. (2004). Guest Editors' Introduction: Secure or Usable?. Security & Privacy, IEEE, 2(5), 16-18. |
5 | Elliot, A. J., & Devine, P. G. (1994). On the motivational nature of cognitive dissonance: Dissonance as psychological discomfort. Journal of personality and social psychology, 67(3), 382. DOI |
6 | Festinger, L, (1957). A Theory of Cognitive Dissonance. Evanston, IL: Row, Peterson. |
7 | Hafiz, M. D., Abdullah, A. H., Ithnin, N., & Mammi, H. K. (2008, May). Towards identifying usability and security features of graphical password in knowledge based authentication technique. In Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on (pp. 396-403). IEEE. |
8 | Kelly, A. E., & Achter, J. A. (1995). Self-concealment and attitudes toward counseling in university students. Journal of Counseling Psychology, 42(1), 40. DOI |
9 | Kim, K., Proctor, R. W., & Salvendy, G. (2012). The relation between usability and product success in cell phones. Behaviour & Information Technology, 31(10), 969-982. DOI |
10 | Larson, D. G., & Chastain, R. L. (1990). Self-concealment: Conceptualization, measurement, and health implications. Journal of Social and Clinical psychology, 9(4), 439-455. DOI |
11 | Nine out of ten finders of lost smart-phones do 'This' (2012). IT Dong-A, Retrieved December 9, 2013, http://it.donga.com/8991/ |
12 | Afifi, W. A., & Guerrero, L. K. (2000). Motivations underlying topic avoidance in close relationships. In Petronio, S. S. (Eds.), Balancing the secrets of private disclosures (pp. 165-179). Mahwah, NJ, US: Lawrence Erlbaum Associates Publishers. |
13 | Bederson, B. B., Clamage, A., Czerwinski, M. P., &Robertson, G. G. (2003, April). A fisheye calendar interface for PDAs: Providing overviews for small displays. In CHI'03 extended abstracts on Human factors in computing systems(pp. 618-619). ACM. |
14 | Norton, R., Feldman, C., & Tafoya, D. (1974). Risk parameters across types of secrets. Journal of Counseling Psychology, 21(5), 450. DOI |
15 | Research on the information security in Korea (2013). Korea Internet & Security Agency, Retrieved December 9. 2013, http://isis.kisa.or.kr/ |
16 | Ritz, T., & Dahme, B. (1996). Repression, self-concealment and rationality/emotional defensiveness: The correspondence between three questionnaire measures of defensive coping. Personality and Individual Differences, 20(1), 95-102. DOI |
17 | Smart-phone users in Korea unlock their smart-phone once in every six minutes (2013). Joongang Ilbo, Retrieved December 9, 2013, http://article.joins.com/news/article/article.asp?total_id=13497286&ctg=1601 |
18 | Thirty six per cent of the smart-phone users do not set up their own password (2013). Yonhap News, Retrieved December 9, 2013, http://www.yonhapnews.co.kr/international/2013/02/28/0608000000AKR20130228004100091.HTML |
19 | Yan, J. J., Blackwell, A. F., Anderson, R. J., & Grant, A. (2004). Password Memorability and Security: Empirical Results. IEEE Security & privacy, 2(5), 25-31. DOI ScienceOn |
20 | Zhang, T., Rau, P. L. P., & Salvendy, G. (2010). Exploring critical usability factors for handsets. Behaviour & Information Technology, 29(1), 45-55. DOI |
21 | Ziefle, M., Bay, S., & Schwade, A. (2006). On keys' meanings and modes: The impact of different key solutions on children's efficiency using a mobile phone. Behaviour & Information Technology, 25(5), 413-431. DOI |