{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:16:32Z","timestamp":1743005792018,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_12","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"131-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication"],"prefix":"10.1007","author":[{"given":"Abrar","family":"Ullah","sequence":"first","affiliation":[]},{"given":"Hannan","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Trevor","family":"Barker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"issue":"3","key":"12_CR1","first-page":"259","volume":"6","author":"S Karaman","year":"2011","unstructured":"Karaman, S.: Examining the effects of flexible online exams on students\u2019 engagement in e-learning. Educ. Res. Rev. 6(3), 259\u2013264 (2011)","journal-title":"Educ. Res. Rev."},{"key":"12_CR2","unstructured":"Agency, Q.A.: Code of practice for the assurance of academic quality and standards in higher education. Assessment of Students, Second edition (2006)"},{"key":"12_CR3","unstructured":"Harmon, O.R., Lambrinos, J., Buffolino, J.: Assessment design and cheating risk in online instruction. Online J. Distance Learn. Adm. 13(3) (2010)"},{"key":"12_CR4","unstructured":"Grijalva, T.C.: Academic honesty and online courses. Department of Economics, Weber State University (2006)"},{"issue":"3","key":"12_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1018724900565","volume":"39","author":"BE Whitley","year":"1998","unstructured":"Whitley, B.E.: Factors associated with cheating among college students: a review. Res. High. Educ. 39(3), 235\u2013274 (1998)","journal-title":"Res. High. Educ."},{"issue":"3","key":"12_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1207\/S15327019EB1103_2","volume":"11","author":"DL Mccabe","year":"2001","unstructured":"Mccabe, D.L., Trevi\u00f1o, L.K., Butterfield, K.D.: Cheating in academic institutions: a decade of research. Ethics Behav. 11(3), 219\u2013232 (2001)","journal-title":"Ethics Behav."},{"issue":"2","key":"12_CR7","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1080\/10511250600866166","volume":"17","author":"MM Lanier","year":"2006","unstructured":"Lanier, M.M.: Academic integrity and distance learning\u2217. J. Crim. Justice Educ. 17(2), 244\u2013261 (2006)","journal-title":"J. Crim. Justice Educ."},{"key":"12_CR8","unstructured":"Ullah, A., Xiao, H., Lilley, M.: Profile based student authentication in online examination. In: International Conference on Information Society 2012, IEEE, London, UK (2012)"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/1869-0238-5-2","volume":"5","author":"A Ullah","year":"2014","unstructured":"Ullah, A., Xiao, H., Barker, T., Lilley, M.: Evaluating security and usability of profile based challenge questions authentication in online examinations. J. Internet Serv. Appl. 5(1), 2 (2014)","journal-title":"J. Internet Serv. Appl."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Ullah, A., Xiao, H., Barker, T., Lilley, M.: Graphical and text based challenge questions for secure and usable authentication in online examinations. In: The 9th International Conference for Internet Technology and Secured Transactions (ICITST) 2014, IEEE, London, UK (2014)","DOI":"10.1109\/ICITST.2014.7038825"},{"key":"12_CR11","unstructured":"Just, M.: Designing secure yet usable credential recovery systems with challenge questions. In: CHI 2003 Workshop on Human-Computer Interaction and Security Systems 2003, Citeseer, Florada, USA (2003)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Just, M., Aspinall, D.: Personal choice and challenge questions: a security and usability assessment. In: Proceedings of the 5th Symposium on Usable Privacy and Security 2009, ACM, CA, USA (2009)","DOI":"10.1145\/1572532.1572543"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Schechter, S., Brush, A.J.B., Egelman, S.: It\u2019s no secret. Measuring the security and reliability of authentication via \u2018secret\u2019 questions. In: 30th IEEE Symposium on Security and Privacy 2009, IEEE (2009)","DOI":"10.1109\/SP.2009.11"},{"key":"12_CR14","unstructured":"Ullah, A., Xiao, H., Lilley, M., Barker, T.: Usability of profile based student authentication and traffic light system in online examination. In: The 7th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, London, UK (2012)"},{"key":"12_CR15","unstructured":"Just, M., Aspinall, D.: Challenging challenge questions. In: Socio-Economic Strand 2009, Oxford University, UK (2009)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11496137_7","volume-title":"Applied Cryptography and Network Security","author":"V Griffith","year":"2005","unstructured":"Griffith, V., Jakobsson, M.: Messin\u2019 with texas deriving mother\u2019s maiden names using public records. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 91\u2013103. Springer, Heidelberg (2005)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: effects of tolerance and image choice. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005, ACM (2005)","DOI":"10.1145\/1073001.1073002"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Hayashi, E., Hong, J., Christin, N.: Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2011, ACM (2011)","DOI":"10.1145\/1978942.1979242"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Rabkin, A.: Personal knowledge questions for fallback authentication: security questions in the era of facebook. In: SOUPS 2008: Proceedings of the 4th Symposium on Usable Privacy and Security 2008, 23, ACM, New York, NY, USA (2008)","DOI":"10.1145\/1408664.1408667"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Babic, A., Xiong, H., Yao, D., Iftode, L.: Building robust authentication systems with activity-based personal questions. In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration 2009, ACM (2009)","DOI":"10.1145\/1655062.1655067"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:16:19Z","timestamp":1583507779000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}