参考文献

参考文献

[1]Chircu A M,KauffmanRJ.LimitstoValueinElectronicCommerce-RelatedIT Investments.Hawaii.2000.Hawaii:HICSS.2000.

[2]龚遂.浅谈图形密码[J].科协论坛,2009(4):89-90.

[3]李耀成,张凌宇,姜廷慈.基于图形密码的手机安全性研究[J].齐齐哈尔大学学报:自然科学版,2014(5):29-33.

[4]胡卫,马常楼,廖巍.图形密码方案可用性及安全性分析[J].计算机应用与软件,2010(12):55-57.

[5]徐沛东,张玉峰.可抵御字典攻击的可验证密钥交换协议[J].微型机与应用,2001(2):56-60.

[6]王建冬.国外可用性研究进展述评.现代图书情报技术[J].2009(9):7-16.

[7]Seffah A,Metzker E.The Obstacles and Myths of Usability and Software Engineering.Communications of the Acm.2004(12):71-76.

[8]Chowdhury S,Landoni M,Gibb F.Usability and Impact of Digital Libraries:a Review.Online Information Review.2006(6):656~680.

[9]Shackel B.Usability—context,Framework,Definition,Design and Evaluation.Cambrige:Cambridge University Press,1991.

[10]Hartson H R,Castillo J C.Remote Evaluation for Post-Deployment Usability Improvement.Working Conference on Advanced Visual Interfaces,1998.

[11]International Standard Organization.Ergonomic Requirements for Office Work with Visual Display Terminals(VDTs)—Part 11:Guidance on Usability.Geneva:ISO,1998.

[12]Green D,Pearson J M.Development of A Web Site Usability Instrument Based on iso 9241-11.Journal of Computer Information Systems,2006(1):66-72.

[13]Quesenbery W.Dimensions of Usability:Defining the Conversation,Driving the Process.Upa Conference,2003.

[14][美]尼尔森.可用性工程[M].刘正捷等译.北京:机械工业出版社,2004.

[15]刘名卓.网络课程的可用性研究[D].上海:华东师范大学,2010.

[16]闵庆飞,王菊,刘振华.移动系统可用性综合研究框架[J].计算机应用研究,2012,29(2):421-426.

[17]Wixom B H,Todd P A.A Theoretical Integration of User Satisfaction and Technology Acceptance.Information Systems Research,2005,16(1):85-102.

[18]范文霈.认知向图像转向的意义与批判[J].中国电化教育,2008(8):20-23.

【注释】

[1]刘丽群,武汉大学新闻与传播学院教师,媒体研究中心研究员。
Liu Liqun,professor at School of Journalism and Communication,Wuhan University,a research fellow at Research Center of Media Development.

[2]李晨琛,武汉大学新闻与传播学院“数字媒介技术与应用”方向硕士研究生。
Li Chenchen,a graduate student at School of Journalism and Communication,Wuhan University.major in application of digital media technology.

【注释】

〔1〕数据来源:第35次《中国互联网络发展状况统计报告》,CNNIC。

〔2〕如,对于长度为六位的文字密码来说,假定密码由英文大小写和数字组成,则其密钥空间为626≈5.7*1010;根据李耀成等人(2014)的研究成果,由6个路径(路径数相当于文字密码长度)组成的九宫格图形密码的密钥空间约为1*105,前者大于后者。

〔3〕字典攻击是指入侵者把所有可能的密码列举出来生成“字典”,并用与密码有关的可验证信息与字典结合进行运算来猜测用户密码,详见徐沛东,张玉峰(2001)。