Cognitive passwords: the key to easy access control
Computers and Security
The diary study: a workplace-oriented research tool to guide laboratory efforts
CHI '93 Proceedings of the INTERACT '93 and CHI '93 Conference on Human Factors in Computing Systems
Communications of the ACM
A diary study of information capture in working life
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Password security: a case history
Communications of the ACM
The domino effect of password reuse
Communications of the ACM - Human-computer etiquette
A diary study of task switching and interruptions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Password Memorability and Security: Empirical Results
IEEE Security and Privacy
When participants do the capturing: the role of media in diary studies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Using diaries in group based information behavior research: a methodological study
IIiX Proceedings of the 1st international conference on Information interaction in context
Password security: an empirical study
Journal of Management Information Systems
The usability of passphrases for authentication: An empirical field study
International Journal of Human-Computer Studies
A large-scale study of web password habits
Proceedings of the 16th international conference on World Wide Web
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Privacy policy enforcement in enterprises with identity management solutions
Journal of Computer Security - Privacy, Security and Trust (PST) Technologies: Evolution and Challenges
Interacting with Computers
The true cost of unusable password policies: password use in the wild
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Encountering stronger password requirements: user attitudes and behaviors
Proceedings of the Sixth Symposium on Usable Privacy and Security
Research Methods in Human-Computer Interaction
Research Methods in Human-Computer Interaction
Rational security: Modelling everyday password use
International Journal of Human-Computer Studies
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Counting clicks and beeps: Exploring numerosity based haptic and audio PIN entry
Interacting with Computers
Investigating authentication methods used by individuals with down syndrome
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
Cyber security games: a new line of risk
ICEC'12 Proceedings of the 11th international conference on Entertainment Computing
ACM Transactions on Accessible Computing (TACCESS)
Faces and Pictures: Understanding age differences in two types of graphical authentications
International Journal of Human-Computer Studies
Hi-index | 0.00 |
Security policies are required that protect information from unauthorised access, and also respect challenges users face in creating, and particularly managing, increasing numbers of passwords. This paper investigates real password use in the context of daily life. It presents the results of an empirical study where participants completed a password diary over 7days, followed by debrief interviews to gain further knowledge and understanding of user behaviour. The results reported relate to how many passwords are in use, the types of passwords participants created, the relationships between different passwords and to sensitive services, how participants retrieved their passwords and finally, the different strategies adopted by users in their management of passwords. The paper concludes by providing a high level set of password guidelines, along with suggestions for mechanisms to support creating, encoding, retrieving and executing multiple passwords.