{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:23:37Z","timestamp":1751495017257},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642390616"},{"type":"electronic","value":"9783642390623"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39062-3_26","type":"book-chapter","created":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T22:44:34Z","timestamp":1372200274000},"page":"409-426","source":"Crossref","is-referenced-by-count":11,"title":["Towards the Personalization of CAPTCHA Mechanisms Based on Individual Differences in Cognitive Processing"],"prefix":"10.1007","author":[{"given":"Marios","family":"Belk","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Germanakos","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Holzinger","sequence":"additional","affiliation":[]},{"given":"George","family":"Samaras","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L. Ahn von","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computers Apart Automatically. Communications of the ACM\u00a047, 56\u201360 (2004)","journal-title":"Communications of the ACM"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"key":"26_CR3","first-page":"399","volume-title":"IEEE Symposium on Security and Privacy","author":"E. Bursztein","year":"2010","unstructured":"Bursztein, E., Bethard, S., Fabry, C., Mitchell, J.C., Jurafsky, D.: How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation. In: IEEE Symposium on Security and Privacy, pp. 399\u2013413. IEEE Computer Society, Washington, DC (2010)"},{"issue":"5895","key":"26_CR4","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L. Ahn von","year":"2008","unstructured":"von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: reCAPTCHA: Human-Based Character Recognition via Web Security Measures. Science\u00a0321(5895), 1465\u20131468 (2008)","journal-title":"Science"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Pogue, D.: Time to Kill OffCaptchas - How the Bot-proofing of the Internet is Bringing Humans Down. Scientific American (2012)","DOI":"10.1038\/scientificamerican0312-23"},{"key":"26_CR6","first-page":"543","volume-title":"15th ACM International Conference on Computer and Communications Security","author":"J. Yan","year":"2008","unstructured":"Yan, J., El Ahmad, A.S.: A Low-cost Attack on a Microsoft CAPTCHA. In: 15th ACM International Conference on Computer and Communications Security, pp. 543\u2013554. ACM Press, New York (2008)"},{"key":"26_CR7","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-21424-0_5","volume-title":"Future Challenges in Security and Privacy for Academia and Industry","author":"P. Baecher","year":"2011","unstructured":"Baecher, P., B\u00fcscher, N., Fischlin, M., Milde, B.: Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. In: Camenisch, J., Fischer-H\u00fcbner, S., Murayama, Y., Portmann, A., Rieder, C. (eds.) SEC 2011. IFIP AICT, vol.\u00a0354, pp. 56\u201367. Springer, Heidelberg (2011)"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/1408664.1408671","volume-title":"ACM International Symposium on Usable Security and Privacy","author":"J. Yan","year":"2008","unstructured":"Yan, J., El Ahmad, A.S.: Usability of CAPTCHAs or Usability Issues in CAPTCHA Design. In: ACM International Symposium on Usable Security and Privacy, pp. 44\u201352. ACM Press, New York (2008)"},{"key":"26_CR9","first-page":"2623","volume-title":"ACM International Conference on Human Factors in Computing Systems","author":"C. Fidas","year":"2011","unstructured":"Fidas, C., Voyiatzis, A., Avouris, N.: On the Necessity of User-friendly CAPTCHA. In: ACM International Conference on Human Factors in Computing Systems, pp. 2623\u20132626. ACM Press, New York (2011)"},{"key":"26_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9","volume-title":"The Adaptive Web: Methods and Strategies of Web Personalization","author":"P. Brusilovsky","year":"2007","unstructured":"Brusilovsky, P., Kobsa, A., Nejdl, W.: The Adaptive Web: Methods and Strategies of Web Personalization. Springer, Heidelberg (2007)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Germanakos, P., Tsianos, N., Lekkas, Z., Mourlas, C., Belk, M., Samaras, G.: Towards an Adaptive and Personalized Web Interaction using Human Factors. In: Angelides, M., Mylonas, P., Wallace, M. (eds.) Advances in Semantic Media Adaptation and Personalization, pp. 247\u2013282. Taylor & Francis (2009)","DOI":"10.1201\/9781420076653-c12"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1111\/j.1467-8535.2004.00371.x","volume":"35","author":"E. Triantafillou","year":"2004","unstructured":"Triantafillou, E., Pomportsis, A., Demetriadis, S., Georgiadou, E.: The Value of Adaptivity based on Cognitive Style: an Empirical Study. Educational Technology\u00a035, 95\u2013106 (2004)","journal-title":"Educational Technology"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Graf, S.: Kinshuk: Advanced Adaptivity in Learning Management Systems by Considering Learning Styles. In: International Workshop on Social and Personal Computing for Web-Supported Learning Communities, pp. 235\u2013238 (2009)","DOI":"10.1109\/WI-IAT.2009.271"},{"key":"26_CR14","unstructured":"Riding, R.: Cognitive Style Analysis - Research Administration. Learning and Training Technology (2001)"},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3102\/00346543047001001","volume":"47","author":"H.A. Witkin","year":"1977","unstructured":"Witkin, H.A., Moore, C.A., Goodenough, D.R., Cox, P.W.: Field-dependent and field-independent Cognitive Styles and their Educational Implications. Review of Educational Research\u00a047, 1\u201364 (1977)","journal-title":"Review of Educational Research"},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.intell.2012.10.010","volume":"41","author":"A. Demetriou","year":"2013","unstructured":"Demetriou, A., Spanoudis, G., Shayer, S., Mouyi, A., Kazi, S., Platsidou, M.: Cycles in Speed-Working Memory-G Relations: Towards a Developmental-Differential Theory of the Mind. Intelligence\u00a041, 34\u201350 (2013)","journal-title":"Intelligence"},{"key":"26_CR17","volume-title":"Human Intelligence","author":"E.B. Hunt","year":"2011","unstructured":"Hunt, E.B.: Human Intelligence. Cambridge University Press, New York (2011)"},{"issue":"4","key":"26_CR18","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s10648-011-9178-3","volume":"23","author":"A. Demetriou","year":"2011","unstructured":"Demetriou, A., Spanoudis, G., Mouyi, A.: Educating the Developing Mind: Towards an Overarching Paradigm. Educational Psychology Review\u00a023(4), 601\u2013663 (2011)","journal-title":"Educational Psychology Review"},{"key":"26_CR19","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1037\/0033-2909.109.2.163","volume":"109","author":"C.M. MacLeod","year":"1991","unstructured":"MacLeod, C.M.: Half a Century of Research on the Stroop Effect: An Integrative review. Psychological Bulletin\u00a0109, 163\u2013203 (1991)","journal-title":"Psychological Bulletin"},{"key":"26_CR20","volume-title":"Images of Mind","author":"M.I. Posner","year":"1997","unstructured":"Posner, M.I., Raicle, M.E.: Images of Mind. Scientific American Library, New York (1997)"},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1037\/h0054651","volume":"18","author":"J.R. Stroop","year":"1935","unstructured":"Stroop, J.R.: Studies of Interference in Serial Verbal Reactions. Experimental Psychology\u00a018, 643\u2013662 (1935)","journal-title":"Experimental Psychology"},{"key":"26_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1146\/annurev-psych-120710-100422","volume":"63","author":"A. Baddeley","year":"2012","unstructured":"Baddeley, A.: Working Memory: Theories, Models, and Controversies. Annual Review of Psychology\u00a063, 1\u201329 (2012)","journal-title":"Annual Review of Psychology"},{"issue":"5044","key":"26_CR23","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1126\/science.1736359","volume":"255","author":"A. Baddeley","year":"1992","unstructured":"Baddeley, A.: Working Memory. Science\u00a0255(5044), 556\u2013559 (1992)","journal-title":"Science"},{"key":"26_CR24","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/S0160-2896(01)00096-4","volume":"30","author":"A.R.A. Conway","year":"2002","unstructured":"Conway, A.R.A., Cowan, N., Bunting, M.F., Therriault, D.J., Minkoff, S.R.: A Latent Variable Analysis of Working Memory Capacity, Short-term Memory Capacity, Processing Speed, and General Fluid Intelligence. Intelligence\u00a030, 163\u2013183 (2002)","journal-title":"Intelligence"},{"key":"26_CR25","unstructured":"Shipstead, Z., Broadway, J.: Individual Differences in Working Memory Capacity and the Stroop Effect: Do High Spans Block the Words? Learning and Individual Differences (in press)"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Demetriou, A., Christou, C., Spanoudis, G., Platsidou, M.: The Development of Mental Processing: Efficiency, Working Memory and Thinking. Monographs of the Society for Research in Child Development\u00a067(1) (2002)","DOI":"10.1111\/1540-5834.671177"},{"key":"26_CR27","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.jml.2010.02.001","volume":"62","author":"N. Unsworth","year":"2010","unstructured":"Unsworth, N., Spillers, G.: Working Memory Capacity: Attention Control, Secondary Memory, or Both? A Direct Test of the Dual-component Model. Memory and Language\u00a062, 392\u2013406 (2010)","journal-title":"Memory and Language"},{"issue":"1","key":"26_CR28","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1177\/0963721409359277","volume":"19","author":"N. Cowan","year":"2010","unstructured":"Cowan, N.: The Magical Mystery Four: How is Working Memory Capacity Limited, and Why? Current Directions in Psychological Science\u00a019(1), 51\u201357 (2010)","journal-title":"Current Directions in Psychological Science"},{"key":"26_CR29","volume-title":"The Overflowing Brain: Information Overload and the Limits of Working Memory","author":"T. Klingberg","year":"2009","unstructured":"Klingberg, T.: The Overflowing Brain: Information Overload and the Limits of Working Memory. Oxford University Press, New York (2009)"},{"key":"26_CR30","first-page":"125","volume-title":"18th ACM International Conference on Computer and Communications Security","author":"E. Bursztein","year":"2011","unstructured":"Bursztein, E., Martin, M., Mitchell, J.: Text-based CAPTCHA Strengths and Weaknesses. In: 18th ACM International Conference on Computer and Communications Security, pp. 125\u2013138. ACM Press, New York (2011)"},{"key":"26_CR31","volume-title":"Quasi-experimentation: Design and Analysis Issues for Field Settings","author":"T. Cook","year":"1979","unstructured":"Cook, T., Campbell, D.: Quasi-experimentation: Design and Analysis Issues for Field Settings. Houghton Mifflin Company, Boston (1979)"},{"key":"26_CR32","first-page":"3","volume-title":"Handbook of Research Methods in Social and Personality Psychology","author":"M. Brewer","year":"2000","unstructured":"Brewer, M.: Research Design and Issues of Validity. In: Reis, H., Judd, C. (eds.) Handbook of Research Methods in Social and Personality Psychology, pp. 3\u201316. Cambridge University Press, Cambridge (2000)"},{"key":"26_CR33","first-page":"1487","volume-title":"ACM International Conference on Human Factors in Computing Systems","author":"M. Belk","year":"2012","unstructured":"Belk, M., Fidas, C., Germanakos, P., Samaras, G.: Do Cognitive Styles of Users Affect Preference and Performance Related to CAPTCHA Challenges? In: ACM International Conference on Human Factors in Computing Systems, pp. 1487\u20131492. ACM Press, New York (2012)"},{"key":"26_CR34","unstructured":"Holzinger, A., Lugmayr, A., Bogner, M.S.: Security and Usability Workshop. In: IEEE International Conference on Availability, Reliability and Security. IEEE Computing Society, Washington, DC (2009)"},{"key":"26_CR35","unstructured":"Belk, M., Germanakos, P., Fidas, C., Spanoudis, G., Samaras, G.: Studying the Effect of Human Cognition on Text- and Image-recognition CAPTCHA Mechanisms. In: International Conference on Human-Computer Interaction - HCI International. LNCS, Springer, Heidelberg (in press, 2013)"}],"container-title":["Lecture Notes in Computer Science","Human Factors in Computing and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39062-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T19:12:16Z","timestamp":1557861136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39062-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642390616","9783642390623"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39062-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}