Passwords: Do User Preferences and Website Protocols Differ From Theory?

作者: Barra Roberta Ann , McLeod Alexander , Savage Arline , Simkin Mark G.

DOI: 10.1080/15536548.2010.10855899

关键词:

摘要: AbstractDespite the availability of superior authentication tools, password security continues to be an important access control in modern, computer-based systems. Are strong passwords used these systems? Under what conditions are users willing adopt stronger passwords? To answer questions, authors examined websites 154 organizations and additionally, analyzed 240 responses from a separate survey users. In terms length duration, our first question was “No, not used.” The second regarding willingness appears depend upon how often must change them.

参考文章(15)
Mike Howard, How often should you change your password ;login:: the magazine of USENIX & SAGE. ,vol. 31, pp. 48- 51 ,(2006)
James E. Weber, Dennis Guster, Paul Safonov, Mark B. Schmidt, Weak Password Security: An Empirical Study Information Security Journal: A Global Perspective. ,vol. 17, pp. 45- 54 ,(2008) , 10.1080/10658980701824432
Peter Dixon, The processing of organizational and component step information in written directions Journal of Memory and Language. ,vol. 26, pp. 24- 35 ,(1987) , 10.1016/0749-596X(87)90060-X
Roberta Ann Barra, Kenneth Griggs, Internal controls: lessons to be learned from fire International Journal of Services and Standards. ,vol. 3, pp. 375- 389 ,(2007) , 10.1504/IJSS.2007.015222
Steven Furnell, An assessment of website password practices Computers & Security. ,vol. 26, pp. 445- 451 ,(2007) , 10.1016/J.COSE.2007.09.001
Blake Ives, Kenneth R. Walsh, Helmut Schneider, The domino effect of password reuse Communications of the ACM. ,vol. 47, pp. 75- 78 ,(2004) , 10.1145/975817.975820
F. T. Grampp, R. H. Morris, TheUNIXSystem: UNIXOperating System Security AT&T Bell Laboratories Technical Journal. ,vol. 63, pp. 1649- 1672 ,(1984) , 10.1002/J.1538-7305.1984.TB00058.X
Joseph A. Cazier, B. Dawn Medlin, Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times Information Systems Security. ,vol. 15, pp. 45- 55 ,(2006) , 10.1080/10658980601051318
Shirley Gaw, Edward W. Felten, Password management strategies for online accounts symposium on usable privacy and security. pp. 44- 55 ,(2006) , 10.1145/1143120.1143127
A.A. Ozok, S. Holden, A strategy for increasing user acceptance of authentication systems: insights from an empirical study of user preferences and performance International Journal of Business and Systems Research. ,vol. 2, pp. 343- 364 ,(2008) , 10.1504/IJBSR.2008.020763