@article{turing,
 author = {Turing, A. M.},
 title = {Computing machinery and intelligence},
 journal = {Computers \& thought},
 year = {1995},
 isbn = {0-262-56092-5},
 pages = {11--35},
 publisher = {MIT Press},
 address = {Cambridge, MA, USA},
 }

@inproceedings{spamProblems,
 author = {Hayati,, Pedram and Potdar,, Vidyasagar},
 title = {Evaluation of spam detection and prevention frameworks for email and image spam: a state of art},
 booktitle = {iiWAS '08: Proceedings of the 10th International Conference on Information Integration and Web-based Applications \& Services},
 year = {2008},
 isbn = {978-1-60558-349-5},
 pages = {520--527},
 location = {Linz, Austria},
 doi = {http://doi.acm.org/10.1145/1497308.1497402},
 publisher = {ACM},
 address = {New York, NY, USA},
 }



@article{turingfifty,
 author = {Pinar Saygin,, Ayse and Cicekli,, Ilyas and Akman,, Varol},
 title = {Turing Test: 50 Years Later},
 journal = {Minds Mach.},
 volume = {10},
 number = {4},
 year = {2000},
 issn = {0924-6495},
 pages = {463--518},
 doi = {http://dx.doi.org/10.1023/A:1011288000451},
 publisher = {Kluwer Academic Publishers},
 address = {Hingham, MA, USA},
 }


@article{nonnative,
 author = {Beatrice Bich-Dao Nguyen},
 title = {Accent Discrimination and the Test of Spoken English: A Call for an Objective Assessment of the Comprehensibility of Nonnative Speakers},
 journal = {California Law Review},
 volume = {81},
 number = {5},
 year = {1993},
 pages = {1325-1361},
 publisher = {California Law Review, Inc.},
 address = {Hingham, MA, USA},
 }



@inproceedings{posh,
 author = {Daher,, Waseem and Canetti,, Ran},
 title = {POSH: a generalized captcha with security applications},
 booktitle = {AISec '08: Proceedings of the 1st ACM workshop on Workshop on AISec},
 year = {2008},
 isbn = {978-1-60558-291-7},
 pages = {1--10},
 location = {Alexandria, Virginia, USA},
 doi = {http://doi.acm.org/10.1145/1456377.1456379},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@inproceedings{labelimagegame,
 author = {von Ahn,, Luis and Dabbish,, Laura},
 title = {Labeling images with a computer game},
 booktitle = {CHI '04: Proceedings of the SIGCHI conference on Human factors in computing systems},
 year = {2004},
 isbn = {1-58113-702-8},
 pages = {319--326},
 location = {Vienna, Austria},
 doi = {http://doi.acm.org/10.1145/985692.985733},
 publisher = {ACM},
 address = {New York, NY, USA},
 }
 
 @article{languageAccents,
 author = {Munro, Murray  J.  and Derwing, Tracey  M. },
 citeulike-article-id = {1855489},
 doi = {http://dx.doi.org/10.1111/0023-8333.49.s1.8},
 journal = {Language Learning},
 keywords = {intelligibility, pedagogy, pronunciation},
 number = {s1},
 pages = {285--310},
 posted-at = {2007-11-02 09:28:21},
 priority = {2},
 title = {Foreign Accent, Comprehensibility, and Intelligibility in the Speech of Second Language Learners},
 url = {http://dx.doi.org/10.1111/0023-8333.49.s1.8},
 volume = {49},
 year = {1999}
}

 
@article{tellinghumans,
 author = {von Ahn,, Luis and Blum,, Manuel and Langford,, John},
 title = {Telling humans and computers apart automatically},
 journal = {Commun. ACM},
 volume = {47},
 number = {2},
 year = {2004},
 issn = {0001-0782},
 pages = {56--60},
 doi = {http://doi.acm.org/10.1145/966389.966390},
 publisher = {ACM},
 address = {New York, NY, USA},
 }
 
@inproceedings{usabilitycaptcha,
 author = {Yan,, Jeff and El Ahmad,, Ahmad Salah},
 title = {Usability of CAPTCHAs or usability issues in CAPTCHA design},
 booktitle = {SOUPS '08: Proceedings of the 4th symposium on Usable privacy and security},
 year = {2008},
 isbn = {978-1-60558-276-4},
 pages = {44--52},
 location = {Pittsburgh, Pennsylvania},
 doi = {http://doi.acm.org/10.1145/1408664.1408671},
 publisher = {ACM},
 address = {New York, NY, USA},
 }
 
@article{nasatlx,
author = {Cao, Alex and Chintamani, Keshav K. and Pandya, Abhilash K. and Ellis, R. Darin},
title={{NASA TLX: Software for assessing subjective mental workload}},
journal = {Behavior Research Methods},
volume = {41},
number = {1},
pages = {113-117},
doi = {10.3758/BRM.41.1.113},
year = {2009},
URL = {http://brm.psychonomic-journals.org/content/41/1/113.abstract},
eprint = {http://brm.psychonomic-journals.org/content/41/1/113.full.pdf+html}
}

@inproceedings{youtubetagging,
 author = {Geisler,, Gary and Burns,, Sam},
 title = {Tagging video: conventions and strategies of the YouTube community},
 booktitle = {JCDL '07: Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries},
 year = {2007},
 isbn = {978-1-59593-644-8},
 pages = {480--480},
 location = {Vancouver, BC, Canada},
 doi = {http://doi.acm.org/10.1145/1255175.1255279},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@inproceedings{asirra,
 author = {Golle,, Philippe},
 title = {Machine learning attacks against the Asirra CAPTCHA},
 booktitle = {CCS '08: Proceedings of the 15th ACM conference on Computer and communications security},
 year = {2008},
 isbn = {978-1-59593-810-7},
 pages = {535--542},
 location = {Alexandria, Virginia, USA},
 doi = {http://doi.acm.org/10.1145/1455770.1455838},
 publisher = {ACM},
 address = {New York, NY, USA},
 }
 
@book{zipfslaw,
	author = {Zipf, George  },
	citeulike-article-id = {2185904},
	keywords = {frequency, thesis, zipfslaw},
	posted-at = {2008-01-01 18:55:19},
	priority = {2},
	title = {Human Behavior and the Principle of Least Effort},
	url = {http://www.amazon.com/Human-Behavior-Principle-Least-Effort/dp/B000HY7FYI/ref=sr\_1\_1?ie=UTF8\&\#38;s=books\&\#38;qid=1199213097\&\#38;sr=8-1},
	year = {1949}
}

@inproceedings{sqlinjection,
 author = {Bravenboer,, Martin and Dolstra,, Eelco and Visser,, Eelco},
 title = {Preventing injection attacks with syntax embeddings},
 booktitle = {GPCE '07: Proceedings of the 6th international conference on Generative programming and component engineering},
 year = {2007},
 isbn = {978-1-59593-855-8},
 pages = {3--12},
 location = {Salzburg, Austria},
 doi = {http://doi.acm.org/10.1145/1289971.1289975},
 publisher = {ACM},
 address = {New York, NY, USA},
 }
 
@inproceedings{fun,
 author = {MacFarlane,, Stuart and Sim,, Gavin and Horton,, Matthew},
 title = {Assessing usability and fun in educational software},
 booktitle = {IDC '05: Proceedings of the 2005 conference on Interaction design and children},
 year = {2005},
 isbn = {1-59593-096-5},
 pages = {103--109},
 location = {Boulder, Colorado},
 doi = {http://doi.acm.org/10.1145/1109540.1109554},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@book{weaksecurity,
 author = {Ghosh,, Anup K.},
 title = {E-Commerce Security: Weak Links, Practical Solutions},
 year = {1997},
 isbn = {0471192236},
 publisher = {John Wiley \& Sons, Inc.},
 address = {New York, NY, USA},
 }
@article{ir,
 author = {Huibers,, T. W. C. and Lalmas,, M. and van Rijsbergen,, C. J.},
 title = {Information retrieval and situation theory},
 journal = {SIGIR Forum},
 volume = {30},
 number = {1},
 year = {1996},
 issn = {0163-5840},
 pages = {11--25},
 doi = {http://doi.acm.org/10.1145/381984.381986},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@article{hawthorn,
	abstract = {The \&quot;Hawthorne effect\&quot; has been an enduring legacy of the celebrated studies of workplace behavior conducted in the 1920s and 1930s at Western Electric's Hawthorne Plant. This article examines the empirical evidence for the existence of Hawthorne effects using the original data from the Hawthorne Relay Assembly Tes Room. Allowing for a variety of other factors, the author assesses whether experimental changes, variously defined, had a common effect that could be regarded as a pure result of the experimentation. The main conclusion is that these data show slender or no evidence of a Hawthorne effect.},
	author = {Jones, Stephen  R. G. },
	citeulike-article-id = {1476398},
	journal = {The American Journal of Sociology},
	number = {3},
	pages = {451--468},
	posted-at = {2007-07-24 10:19:47},
	priority = {2},
	title = {Was There a Hawthorne Effect?},
	url = {http://www.jstor.org/stable/2781455},
	volume = {98},
	year = {1992}
}

@inproceedings{labelgame,
 author = {von Ahn,, Luis and Dabbish,, Laura},
 title = {Labeling images with a computer game},
 booktitle = {CHI '04: Proceedings of the SIGCHI conference on Human factors in computing systems},
 year = {2004},
 isbn = {1-58113-702-8},
 pages = {319--326},
 location = {Vienna, Austria},
 doi = {http://doi.acm.org/10.1145/985692.985733},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@book{crypto,
 author = {Schneier,, Bruce},
 title = {Applied Cryptography: Protocols, Algorithms, and Source Code in C},
 year = {1993},
 isbn = {0471597562},
 publisher = {John Wiley \& Sons, Inc.},
 address = {New York, NY, USA},
 }
 
 
@inproceedings{vision,
 author = {NHS Information Centre},
 title = {People Registered as Blind and Partially Sighted 2008 England},
 year = {2008},
 isbn = {1-58113-702-8},
 pages = {1--18},
 location = {UK, England},
 doi = {http://www.ic.nhs.uk/webfiles/publications/Social%20Care/Blind%202008/Blind%20Commentary%202008_final%20v5.pdf},
 publisher = {NHS},
 address = {UK, England},
 }
