User-friendly password methods for computer-mediated information systems
Computers and Security
Computer abuse and security: Update on an empirical pilot study
ACM SIGSAC Review
Computers and Security
Verifying the authentication of an information system user
Computers and Security
Identifying computer users with authentication devices (tokens)
Computers and Security
Computer security: the long road ahead
Computers and Security
Communications of the ACM
Understanding the use of passwords
Computers and Security
Communications of the ACM
Password cracking: a game of wits
Communications of the ACM
Computer and communications security: strategies for the 1990s
Computer and communications security: strategies for the 1990s
A survey of password mechanisms: weaknesses and potential improvement, part 1
Computers and Security
PC/Computing
A survey of password mechanisms: weaknesses and potential improvements. part 2
Computers and Security
Computers and Security
Cognitive passwords: the key to easy access control
Computers and Security
Managing information as a corporate resource
Managing information as a corporate resource
Computer crime: a crimefighter's handbook
Computer crime: a crimefighter's handbook
Security in computing
Net.wars
Password security: a case history
Communications of the ACM
Foundations of Information Systems
Foundations of Information Systems
Fighting Computer Crime
The usability of passphrases for authentication: An empirical field study
International Journal of Human-Computer Studies
Factors affecting the implementation success of Internet-based information systems
Computers in Human Behavior
Journal of Management Information Systems
International Journal of Electronic Commerce
Attitudes and practices of students towards password security
Journal of Computing Sciences in Colleges
The Good and Not So Good of Enforcing Password Composition Rules
Information Systems Security
Proceedings of the 2008 ACM workshop on Secure web services
Expert Systems with Applications: An International Journal
Uncertainty in the weakest-link security game
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Building a better password: the role of cognitive load in information security training
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
The relationship among formal EDI controls, knowledge of EDI controls, and EDI performance
Information Technology and Management
Interacting with Computers
The true cost of unusable password policies: password use in the wild
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Encountering stronger password requirements: user attitudes and behaviors
Proceedings of the Sixth Symposium on Usable Privacy and Security
Of passwords and people: measuring the effect of password-composition policies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using and managing multiple passwords: A week to a view
Interacting with Computers
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Journal of Management Information Systems
Rational security: Modelling everyday password use
International Journal of Human-Computer Studies
In defense of the realm: understanding the threats to information security
International Journal of Information Management: The Journal for Information Professionals
An integrative study of information systems security effectiveness
International Journal of Information Management: The Journal for Information Professionals
Correct horse battery staple: exploring the usability of system-assigned passphrases
Proceedings of the Eighth Symposium on Usable Privacy and Security
Information systems user security: A structured model of the knowing-doing gap
Computers in Human Behavior
Theorizing Information Security Success: Towards Secure E-Government
International Journal of Electronic Government Research
Measuring password guessability for an entire university
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Useful password hashing: how to waste computing cycles with style
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |
Organizations are more dependent than ever on the reliable operation of their information systems, which have become a key to their success and effectiveness. While the growing dependence on information systems creates an urgent need to collect information and make it accessible, the proliferation of computer technology has also spawned opportunities for ill-intentioned individuals to violate the information systems' integrity and validity.One of the most common control mechanisms for authenticating users of computerized information systems is the use of passwords. However, despite the widespread use of passwords, little attention has been given to the characteristics of their actual use. This paper addresses the gap in evaluating the characteristics of real-life passwords and presents the results of an empirical study on password usage. It investigates the core characteristics of user-generated passwords and associations among those characteristics.