Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Password Security
Danuvasin Charoen
Pages - 1 - 14 | Revised - 20-01-2014 | Published - 11-02-2014
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Password Security, Password Utilization, Password Management.
ABSTRACT
This study investigates users’ behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among executive MBA students who hold managerial positions. The results of the survey indicate that users practice insecure behaviors in the utilization of passwords. The results support the literature and can be used to guide password management policy.
Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Association for Computing Machinery. Communications of the ACM, 42(12), 40 (47 pages) | |
Anderson, J. R. (1994). Learning and Memory: An Integrated Approach: John Wiley & Sons Inc | |
B.DawnMedlin, & Cazier, J. A. (2005). An Investigatieve Study: Consumers Password Choices on Journal of Information Privacy & Security, 1(4), 44. | |
Burnett, M. (2002, March 7, 2002 ). Ten Windows Password Myths Retrieved April 12, 2005,from http://www.securityfocus.com/infocus/1554 | |
Hewett, T. T. (1999). Cognitive factors in design (tutorial session): Basic phenomena in human memory and problem solving. Paper presented at the Proceeding of the Third Conference on Creativity & Cognition, Loughborough, UK. | |
Higbee, K. L. (2001). Your Memory: How It Works & How To Improve It (2 ed.). New York,NY: Marlowe & Company. | |
Ives, B., Walsh, K. R., & Schneider, H. (2004). The Domino Effect of Password Reuse.Association for Computing Machinery. Communications of the ACM, 47(4). | |
Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63, 81-97. | |
Newell, A., & Simon, H. A. (1972). Human Problem Solving. Englewood Cliffs, NJ: PrenticeHall. | |
Sans.org. (2013). Password Policy: www.sans.org. | |
Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the 'Weakest Link' -- a Human/Computer Interaction Approach to Usable and Effective Security. BT Technology Journal, 19(3), 122. | |
Schneier, B. (2000). Secrets and Lies. New York: John Wiley and Sons. | |
Warkentin, M., Davis, K., & Bekkering, E. (2004). Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security.Journal of Organizational and End User Computing, 16(3), 41 (18 pages) | |
Zviran, M., & Haga, W. J. (1999). Password security: An empirical study. Journal of Management Information Systems, 15(4), 161 (125 pages). | |
Dr. Danuvasin Charoen
NIDA Business School - Thailand
danuvasin@gmail.com
|
|
|
|
View all special issues >> | |
|
|