Alice in warningland: A large-scale field study of browser security warning effectiveness, USENIX security symposium, vol.13, 2013. ,
, Publication manual. American Psychological Association, 2009.
Research design and issues of validity. Handbook of research methods in social and personality psychology, pp.3-16, 2000. ,
How good are humans at solving captchas? a large scale evaluation, Security and Privacy (SP), 2010 IEEE Symposium on, pp.399-413, 2010. ,
On the impact of touch id on iphone passcodes, SOUPS, pp.257-276, 2015. ,
A power primer, Psychological bulletin, vol.112, issue.1, p.155, 1992. ,
Estimating the reproducibility of psychological science, Science, vol.349, issue.6251, p.4716, 2015. ,
Evidence-based methods for privacy and identity management, Privacy and Identity Management. Facing up to Next Steps, pp.105-121, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01629157
A codebook for experimental research: The nifty nine indicators v1.0, 2017. ,
An empirical investigation of security fatigue-the case of password choice after solving a captcha, The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2017). USENIX Association, 2017. ,
The new statistics: Why and how, Psychological science, vol.25, issue.1, pp.7-29, 2014. ,
, Introduction to the new statistics: Estimation, open science, and beyond. Routledge, 2016.
Cambridge dictionary of statistics, 1998. ,
, Guidelines for performing systematic literature reviews in software engineering, Evidence-Based Software Engineering (EBSE), 2007.
Discovering statistics using IBM SPSS statistics, Sage, 2013. ,
How to design and report experiments, Sage, 2003. ,
Investigation of the effect of fear and stress on password choice, proceedings of the 7th ACM Workshop on Socio-Technical Aspects in Security and Trust, 2017. ,
Effect size estimates: current use, calculations, and interpretation, Journal of Experimental Psychology: General, vol.141, issue.1, 2012. ,
Confidence intervals rather than p values: estimation rather than hypothesis testing, Br Med J (Clin Res Ed, vol.292, issue.6522, pp.746-750, 1986. ,
Power strips, prophylactics, and privacy, oh my!, Proceedings of the second symposium on Usable privacy and security, pp.133-144, 2006. ,
A dirty dozen: twelve p-value misconceptions, Seminars in hematology, vol.45, pp.135-140, 2008. ,
Analysis report-investigation of the effect of fear and stress on password choice, 2017. ,
Effect of cognitive depletion on password choice, The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016), pp.55-66, 2016. ,
Development of nasa-tlx (task load index): Results of empirical and theoretical research, Advances in psychology, vol.52, pp.139-183, 1988. ,
Why most published research findings are false, PLoS Med, vol.2, issue.8, p.124, 2005. ,
The importance of effect magnitude. Handbook of research methods in experimental psychology, pp.83-105, 2003. ,
Balancing usability and security in a video captcha, Proceedings of the 5th Symposium on Usable Privacy and Security, p.14, 2009. ,
Too much choice: End-user privacy decisions in the context of choice proliferation, Symposium on Usable Privacy and Security (SOUPS), pp.69-87, 2014. ,
Calculating and reporting effect sizes to facilitate cumulative science: a practical primer for t-tests and anovas, Frontiers in psychology, vol.4, 2013. ,
Making experiments dependable. Dependable and Historic Computing, pp.344-357, 2011. ,
Designing experiments and analyzing data: A model comparison perspective, vol.1, 2004. ,
Experimental design and statistics. Routledge, 2005. ,
Design and analysis of experiments, 2012. ,
Most published research findings are false-but a little replication goes a long way, PLoS Med, vol.4, issue.2, p.28, 2007. ,
The fallacy of placing confidence in confidence intervals, Psychonomic bulletin & review, vol.23, issue.1, pp.103-123, 2016. ,
Null hypothesis significance testing: a review of an old and continuing controversy, Psychological methods, vol.5, issue.2, p.241, 2000. ,
Evaluating users' affect states: Towards a study on privacy concerns, Privacy and Identity Management. Facing up to Next Steps, pp.248-262, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01629168
How to design computer security experiments, Fifth World Conference on Information Security Education, pp.141-148, 2007. ,
The logic of scientific discovery. Routledge, 2005. ,
Emotion elicitation using films. handbook of emotion elicitation and assessment. edited by: Coan ja, allen jjb, 2007. ,
Ten simple rules for reproducible computational research, PLoS computational biology, vol.9, issue.10, p.1003285, 2013. ,
Common pitfalls in writing about security and privacy human subjects experiments, and how to avoid them, 2013. ,
Manual for the state-trait anxiety inventory, 1970. ,
Testing for normality ,
Implementing reproducible research, 2014. ,
The panas-x: Manual for the positive and negative affect schedule-expanded form, 1999. ,
Relative effectiveness and validity of mood induction procedures: analysis, European Journal of social psychology, vol.26, pp.557-580, 1996. ,
knitr: a comprehensive tool for reproducible research in r, Implement Reprod Res, vol.1, p.20, 2014. ,