An unexpectedly large count of trees in the West African Sahara and Sahel

M Brandt, CJ Tucker, A Kariryaa, K Rasmussen, C Abel… - Nature, 2020 - nature.com
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …

How users perceive and respond to security messages: a NeuroIS research agenda and empirical study

B Brinton Anderson, A Vance, CB Kirwan… - European Journal of …, 2016 - Taylor & Francis
Users are vital to the information security of organizations. In spite of technical safeguards,
users make many critical security decisions. An example is users' responses to security …

Targeted online password guessing: An underestimated threat

D Wang, Z Zhang, P Wang, J Yan… - Proceedings of the 2016 …, 2016 - dl.acm.org
While trawling online/offline password guessing has been intensively studied, only a few
studies have examined targeted online guessing, where an attacker guesses a specific …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

{“... No} one can hack my {Mind”}: Comparing expert and {Non-Expert} security practices

I Ion, R Reeder, S Consolvo - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …

The password life cycle

E Stobert, R Biddle - ACM Transactions on Privacy and Security (TOPS), 2018 - dl.acm.org
Managing passwords is a difficult task for users, who must create, remember, and keep track
of large numbers of passwords. In this work, we investigated users' co** strategies for …

Passwords and the evolution of imperfect authentication

J Bonneau, C Herley, PC Van Oorschot… - Communications of the …, 2015 - dl.acm.org
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …

zxcvbn:{Low-Budget} password strength estimation

DL Wheeler - 25th USENIX Security Symposium (USENIX Security …, 2016 - usenix.org
zxcvbn: Low-Budget Password Strength Estimation Page 1 This paper is included in the
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …

Understanding password choices: How frequently entered passwords are re-used across websites

R Wash, E Rader, R Berman, Z Wellmer - Twelfth Symposium on Usable …, 2016 - usenix.org
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …

Nudge me right: Personalizing online security nudges to people's decision-making styles

E Peer, S Egelman, M Harbach, N Malkin… - Computers in Human …, 2020 - Elsevier
Nudges are simple and effective interventions that alter the architecture in which people
make choices in order to help them make decisions that could benefit themselves or society …