[HTML][HTML] Phishing attacks: A recent comprehensive study and a new anatomy

Z Alkhalil, C Hewage, L Nawaf, I Khan - Frontiers in Computer Science, 2021 - frontiersin.org
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …

[HTML][HTML] Encouraging users to improve password security and memorability

M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …

[PDF][PDF] The Password Thicket: Technical and Market Failures in Human Authentication on the Web.

J Bonneau, S Preibusch - WEIS, 2010 - jbonneau.com
We report the results of the first large-scale empirical analysis of password implementations
deployed on the Internet. Our study included 150 websites which offer free user accounts for …

[PDF][PDF] Phishing, SMiShing & Vishing: an assessment of threats against mobile devices

EO Yeboah-Boateng, PM Amanor - Journal of Emerging Trends in …, 2014 - e-tarjome.com
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against
mobile devices. It examines the implications of end-user behavior towards mitigating the …

Improving text passwords through persuasion

A Forget, S Chiasson, PC Van Oorschot… - Proceedings of the 4th …, 2008 - dl.acm.org
Password restriction policies and advice on creating secure passwords have limited effects
on password strength. Influencing users to create more secure passwords remains an open …

Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics …

JL Jenkins, M Grimes, JG Proudfoot… - Information Technology …, 2014 - Taylor & Francis
Password reuse–using the same password for multiple accounts–is a prevalent
phenomenon that can make even the most secure systems vulnerable. When passwords are …

User practice in password security: An empirical study of real-life passwords in the wild

C Shen, T Yu, H Xu, G Yang, X Guan - Computers & Security, 2016 - Elsevier
Due to increasing security awareness of password from the public and little attention on the
characteristics of real-life passwords, it is thus natural to understand the current state of …

A spoonful of sugar? The impact of guidance and feedback on password-creation behavior

R Shay, L Bauer, N Christin, LF Cranor… - Proceedings of the 33rd …, 2015 - dl.acm.org
Users often struggle to create passwords under strict requirements. To make this process
easier, some providers present real-time feedback during password creation, indicating …

Measuring Website Password Creation Policies At Scale

S Alroomi, F Li - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Researchers have extensively explored how password creation policies influence the
security and usability of user-chosen passwords, producing evidence-based policy …

The emperor's new password creation policies: An evaluation of leading web services and the effect of role in resisting against online guessing

D Wang, P Wang - Computer Security--ESORICS 2015: 20th European …, 2015 - Springer
While much has changed in Internet security over the past decades, textual passwords
remain as the dominant method to secure user web accounts and they are proliferating in …