L Zhang, WC McDowell - Journal of Internet Commerce, 2009 - Taylor & Francis
By using the protection motivation theory, this article tests a model of password protection intentions for online users. Hypotheses are proposed concerning the intention to engage in …
W Ma, J Campbell, D Tran… - 2010 fourth international …, 2010 - ieeexplore.ieee.org
Passwords are the first line of defense for many computerized systems. The quality of these passwords decides the security strength of these systems. Many studies advocate using …
J Zhang, X Luo, S Akkaladevi… - European Journal of …, 2009 - Taylor & Francis
As one of the most common authentication methods, passwords help secure information by granting access only to authorized parties. To be effective, passwords should be strong …
K Chanda - International Journal of Computer Network and …, 2016 - mecs-press.org
Passwords can be used to gain access to specific data, an account, a computer system or a protected space. A single user may have multiple accounts that are protected by passwords …
J Campbell, W Ma, D Kleeman - Behaviour & Information …, 2011 - Taylor & Francis
This study investigates the efficacy of using a restrictive password composition policy. The primary function of access controls is to restrict the use of information systems and other …
S Komanduri - 2016 - reports-archive.adm.cs.cmu.edu
In an effort to improve security by preventing users from picking weak passwords, system administrators set password-composition policies, sets of requirements that passwords must …
MN Al-Ameen, ST Marne, K Fatema… - Behaviour & …, 2022 - Taylor & Francis
User-chosen passwords reflecting common strategies and patterns ease memorisation but offer uncertain and often weak security, while system-assigned passwords provide higher …
J Galbally, I Coisel, I Sanchez - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
A novel multimodal method for the estimation of password strength was presented in Part I of this series of two papers. In this paper, the experimental framework used for the evaluation …
W Ma, J Campbell, D Tran, D Kleeman - International Journal of …, 2007 - academia.edu
Password authentication is the most widely used authentication mechanism, and it will still be with us for many years yet to come. It is effective, simple, and accurate, with no extra cost …