Making Passwords Secure and Usable
@inproceedings{Adams1997MakingPS, title={Making Passwords Secure and Usable}, author={Anne Adams and M. Angela Sasse and Peter Lunt}, booktitle={BCS HCI}, year={1997} }
To date, system research has focused on designing security mechanisms to protect systems access although their usability has rarely been investigated. This paper reports a study in which users’ perceptions of password mechanisms were investigated through questionnaires and interviews. Analysis of the questionnaires shows that many users report problems, linked to the number of passwords and frequency of password use. In-depth analysis of the interview data revealed that the degree to which…
189 Citations
Quantifying the quality of web authentication mechanisms: a usability perspective
- Computer Science
- 2004
This paper will review the research into different types of authentication mechanisms, including simple passwords, and propose a mechanism for quantifying the quality of different authentication mechanisms to support an informed choice for web site administrators.
Password Security: Best Practices and Management Strategies
- Computer Science
- 2020
This report will go in depth on the best practices and strategies that derive from password security.
Influencing user password choice through peer pressure
- Computer Science
- 2011
This work evaluated the evaluation of a novel concept for a proactive password checking mechanism that analyzes and presents to users, information about their peer’s password strength, based on recent research indicating that social navigation can be used to guide users to safer, more secure practices regarding computer security and privacy.
User Acceptance of Multiple Password Systems: A Proposed Study
- Computer ScienceAMCIS
- 2010
The role that password characteristics, such as number of passwords and password complexity, coupled with frequency of use, play in users’ perceptions and overall willingness to faithfully adopt an alternative authentication system is investigated.
Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines
- Computer Science2014 47th Hawaii International Conference on System Sciences
- 2014
This study suggests effective ways that trainers or employers can improve compliance with password guidelines and suggests training programs should aim to enhance IS security coping appraisal.
Password Policies vs. Usability: When Do Users Go “Bananas”?
- Computer Science2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
- 2020
This paper addresses users' reactions to such a scenario by means of an online survey where users are being asked to create a password following an increasing number of restrictions and confirms that the increase in rule complexity has detrimental effects on usability and can lead to workarounds potentially compromising password security.
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens
- Computer ScienceArXiv
- 2016
It is found that the idea of carrying physical devices increases perceived personal responsibility for secure authentication, making the risks and inconvenience associated with loss and theft salient for participants.
Secure Alternatives to Password-based Authentication Mechanisms submitted
- Computer Science
- 2006
This study presents requirements the alternative authentication mechanisms should meet and reviews and analyzes graphical passwords and keystroke dynamics from a usability and security point of view.
Matrix Passwords: A Proposed Methodology of Password Authentication
- Computer ScienceAMCIS
- 2012
This work proposes a new method of password authentication—Matrix Passwords, which slightly modifying the manner in which traditional passwords are created may significantly reduce the risk of reusing passwords and facilitate the ease of creating passwords that are easy to remember, yet hard to crack.
A Study on the Factors Affecting the Information Systems Security Effectiveness of Password
- Computer Science
- 2008
According to the results of this study, while threat is not related to the risk, information assets and vulnerability arerelated to the user's awareness of risk.
References
SHOWING 1-10 OF 25 REFERENCES
How crackers crack passwords or what passwords to avoid
- Computer Science
- 1988
This report tells how ''crackers'' (computer wizards who use their talents for illegal and destructive purposes) obtain access to computer systems and gives specific advice on how to prevent them from doing it.
User-friendly password methods for computer-mediated information systems
- Computer ScienceComput. Secur.
- 1984
Deficiencies of the traditional approach to information security and the requirements for a new methodology
- Computer ScienceComput. Secur.
- 1995
Computer communication security - principles, standard protocols and techniques
- Computer Science
- 1994
This chapter discusses the standardization process, which led to the establishment of ASN.I.
Qualitative and Quantitative research
- Education, Sociology
- 1997
Qualitative research focuses on the quality of things – what is their nature? What are they like? How can they be described? It often involves the views or internal worlds of participants, and may…
Basics of qualitative research: Grounded theory procedures and techniques
- Education
- 1994
Reading a book as this basics of qualitative research grounded theory procedures and techniques and other references can enrich your life quality.
Basics of qualitative research: Grounded theory procedures and techniques.
- Psychology
- 1992
Introduction Getting Started Theoretical Sensitivity The Uses of Literature Open Coding Techniques for Enhancing Theoretical Sensitivity Axial Coding Selective Coding Process The Conditional Matrix…
Implicit and explicit memory for new associations in normal and amnesic subjects.
- PsychologyJournal of experimental psychology. Learning, memory, and cognition
- 1985
This effect was observed with college students and amnesic patients, suggesting that word completion performance is mediated by implicit memory for new associations that is independent of explicit recollection.
Engineering Psychology and Human Performance
- Psychology
- 1984
1. Introduction to Engineering Psychology and Human Performance 2. Signal Detection, Information Theory and Absolute Judgment 3. Attention in Perception and Display Space 4. Spatial Displays 5.…