Password authentication from a human factors perspective: Results of a survey among end-users

P Hoonakker, N Bornoe… - Proceedings of the …, 2009 - journals.sagepub.com
Considering that many organizations today are extremely dependent on information
technology, computer and information security (CIS) has become a critical concern from a …

Password security: an empirical study

M Zviran, WJ Haga - Journal of management information systems, 1999 - Taylor & Francis
Organizations are more dependent than ever on the reliable operation of their information
systems, which have become a key to their success and effectiveness. While the growing …

Essential lessons still not learned? Examining the password practices of end-users and service providers

S Furnell, N Bär - Human Aspects of Information Security, Privacy, and …, 2013 - Springer
Password authentication remains the dominant form of user authentication for online
systems. As such, from a user perspective, it is an approach that they are very much …

Evaluation of the human impact of password authentication practices on information security

DS Carstens, PR McCauley-Bell, LC Malone… - Informing …, 2004 - repository.fit.edu
The research objective was to develop a model for evaluating the human impact that
password authentication issues are having on the security of information systems. Through …

On password behaviours and attitudes in different populations

R Alomari, J Thorpe - Journal of information security and applications, 2019 - Elsevier
We explore the differences in password behaviours and attitudes of samples of university
students, IT professionals, and the general population (non-student and non-IT …

User behaviours associated with password security and management

K Bryant, J Campbell - Australasian …, 2006 - researchprofiles.canberra.edu.au
Control mechanisms established on the boundary of an information system are an important
preliminary step to minimising losses from security breaches. The primary function of such …

[PDF][PDF] Exploring the'weakest link': A study of personal password security

G Notoatmodjo - 2007 - cs.auckland.ac.nz
The security of most password authentication mechanisms hinges on the secrecy of only a
single word–if an adversary obtains knowledge of a victim's password, the adversary will be …

Password security: An empirical investigation into e-commerce passwords and their crack times

JA Cazier, BD Medlin - Information Systems Security, 2006 - Taylor & Francis
Strong passwords are essential to the security of any e-commerce site as well as to
individual users. Without them, hackers can penetrate a network and stop critical processes …

What 4,500+ people can tell you–employees' attitudes toward organizational password policy do matter

YY Choong, M Theofanos - … Aspects of Information Security, Privacy, and …, 2015 - Springer
Organizations establish policies on how employees should generate, maintain, and use
passwords to authenticate and gain access to the organization's information systems. This …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …