fullrecord |
[{"key": "dc.contributor.advisor", "value": "Woods, Naomi", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Turunen, Samu", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2015-05-28T09:25:49Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2015-05-28T09:25:49Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/46099", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Graafiset salasanat ovat lupaava vaihtoehto alfanumeeriselle autentikaatiolle.\r\n\u00c4lypuhelinten ja muiden korkea resoluutioisten kosketusn\u00e4yt\u00f6llisten laitteiden\r\nm\u00e4\u00e4r\u00e4 on kasvussa ja alfanumeeriset salasanat ovat kehitetty alun perin\r\nn\u00e4pp\u00e4imist\u00f6lle sy\u00f6tett\u00e4viksi. Tarkkuutta vaativa kirjoittaminen ei t\u00e4ll\u00f6in ole\r\nv\u00e4ltt\u00e4m\u00e4tt\u00e4 k\u00e4ytt\u00e4j\u00e4lle kaikkein mielekk\u00e4int\u00e4. Graafisia ja alfanumeerisia\r\nsalasanoja on tutkittu muistin toiminnan sek\u00e4 k\u00e4ytett\u00e4vyyden n\u00e4k\u00f6kulmasta.\r\nTutkielma on tehty kirjallisuuden pohjalta k\u00e4ytt\u00e4en apuna erilaisia tieteellisia\r\njulkaisuja sis\u00e4lt\u00e4vi\u00e4 tietokantoja, kuten IEE Explore ja ACM Digital Library -\r\ntietokantoja.\r\nTutkielman tarkoituksena oli kuvata ja tutkia tieteellisten artikkeleiden avulla\r\nalfanumeeristen ja graafisten salasanojen muistamista sek\u00e4 k\u00e4ytett\u00e4vyytt\u00e4, sek\u00e4\r\nl\u00f6yt\u00e4\u00e4 hyvi\u00e4 ja huonoja puolia salasanojen k\u00e4ytt\u00e4jille. Tutkimuksessa havaittiin,\r\nett\u00e4 graafisten salasanojen muistaminen on yleens\u00e4 helpompaa kuin\r\nalfanumeeristen salasanojen. Kuitenkin k\u00e4ytt\u00e4j\u00e4n oma sis\u00e4inen motivaatio on\r\nuseimmin esteen\u00e4 kunnolliselle salasanan k\u00e4yt\u00f6lle.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Graphical passwords are a promising substitute to alphanumeric authentication.\r\nWhile the amount of high resolution touchscreen hand held devices is rising,\r\nthe alphanumeric password was originally developed for a keyboard.\r\nAuthentication process demands great precision and it may not be the most\r\nconvenient way for the user. In this thesis, alphanumerical and graphical\r\npasswords are discussed in terms of memorability and convenience and how\r\ndoes convenience effect with memorability. Thesis is based on a literature\r\nreview conducted trough academic article databases such as IEEE Explore and\r\nACM Digital Library.\r\nAmong the principle findings of this research is that graphical authentication is\r\nmore easy to remember than alphanumeric authentication. However, the\r\nsuprising finding was how much the convenience of the authentication scheme\r\neffects the motivation of using a decent password.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Samu Turunen (samaturu) on 2015-05-28 09:25:49.202625. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2015-05-28T09:25:49Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201505282079.pdf: 338344 bytes, checksum: 919f5b67e38d5382ede4fb6f0aace3b9 (MD5)\r\nlicense.html: 4796 bytes, checksum: 150ed4305ffc9d643e62745d1bb258c3 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2015-05-28T09:25:49Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201505282079.pdf: 338344 bytes, checksum: 919f5b67e38d5382ede4fb6f0aace3b9 (MD5)\r\nlicense.html: 4796 bytes, checksum: 150ed4305ffc9d643e62745d1bb258c3 (MD5)\r\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "32", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "graafinen salasana", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "alfanumeerinen k\u00e4ytett\u00e4vyys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4j\u00e4kokemus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "muisti", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "graphical passwords", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "alphanumerical passwords information security", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "convenience", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "user experience", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "memory", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "User experience and the security of graphical passwords", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201505282079", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2015-05-28T09:25:50Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|