{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:27:47Z","timestamp":1729650467997,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/soli.2015.7367617","type":"proceedings-article","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T16:37:47Z","timestamp":1451925467000},"page":"186-191","source":"Crossref","is-referenced-by-count":1,"title":["Investigating the usability of using Doodles Scan System (DSS): The case of Misurata"],"prefix":"10.1109","author":[{"given":"Salem Meftah","family":"Jebriel","sequence":"first","affiliation":[]},{"given":"Haitham","family":"Alali","sequence":"additional","affiliation":[]},{"given":"Mustafa Ali","family":"Abuzaraida","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Building Internet Firewalls","year":"1995","author":"chapman","key":"ref10"},{"key":"ref11","first-page":"1","article-title":"A Comparison of Questionnaires for Assessing Website Usability","author":"tullis","year":"2004","journal-title":"Usability Professional Association Conference"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1080\/10447319509526110","article-title":"IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use","volume":"7","author":"james","year":"1995","journal-title":"Int J Hum -Comput Interact"},{"key":"ref13","article-title":"Study on Service Quality and Customer Satisfaction on the Mobile Phone Provider: A Case of Postgraduate Students in Al-Fateh University of Libya","author":"khbresh","year":"2012","journal-title":"Universiti Utara Malaysia"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/154193120605002407"},{"key":"ref15","article-title":"Dimensions of Usability","author":"quesenbery","year":"2003","journal-title":"Content and Complexity Information Design in Technical Communication"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2008.04.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSIT.2014.6805997"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/07421222.2003.11045748","article-title":"The DeLone and McLean model of information systems success: a ten-year update","volume":"19","author":"delone","year":"2003","journal-title":"Journal of Management Information Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2163.358092"},{"key":"ref4","article-title":"Graphical Password: Security and Usability Issues","author":"abdullah","year":"2007","journal-title":"PARS'07"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2011.5893865"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.69"},{"key":"ref5","article-title":"A Survey on Recognition Based Graphical User Authentication Algorithms","volume":"6","author":"towhidi","year":"2009","journal-title":"International Journal of Information and Computer Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2008.34"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/01449290601173770"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-249-7_11"},{"key":"ref9","first-page":"906","article-title":"Implementing CHC to Counter Shoulder Surfing Attack in PassPoint - Style Graphical Passwords","volume":"2","author":"joshuva","year":"2011","journal-title":"International Journal of Advanced Networking and Applications"},{"article-title":"Modeling human-machine systems: on modes, error, and patterns of interaction","year":"1996","author":"degani","key":"ref20"},{"article-title":"A REVIEW ONSCHEMES FOR USER AUTHENTICATION","year":"2015","author":"ghorsad","key":"ref22"},{"key":"ref21","article-title":"Reasoning about human error by modeling cognition and interaction","author":"blandford","year":"2006","journal-title":"PROC RESILIENCE ENGINEERING SYMPOSIUM vol Nov 8&#x2013;10"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"423","DOI":"10.28945\/1218","article-title":"Towards E-Learning in Higher Education in Libya","volume":"7","author":"rhema","year":"2010","journal-title":"Issues in Informing Science and Information Technology"}],"event":{"name":"2015 IEEE International Conference on Service Operations And Logistics, And Informatics (SOLI)","start":{"date-parts":[[2015,11,15]]},"location":"Yassmine Hammamet, Tunisia","end":{"date-parts":[[2015,11,17]]}},"container-title":["2015 IEEE International Conference on Service Operations And Logistics, And Informatics (SOLI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360270\/7367396\/07367617.pdf?arnumber=7367617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T01:12:50Z","timestamp":1567473170000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7367617\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/soli.2015.7367617","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}