Making Passwords Secure and Usable

  title={Making Passwords Secure and Usable},
  author={Anne Adams and M. Angela Sasse and Peter Lunt},
  booktitle={BCS HCI},
To date, system research has focused on designing security mechanisms to protect systems access although their usability has rarely been investigated. This paper reports a study in which users’ perceptions of password mechanisms were investigated through questionnaires and interviews. Analysis of the questionnaires shows that many users report problems, linked to the number of passwords and frequency of password use. In-depth analysis of the interview data revealed that the degree to which… 
Quantifying the quality of web authentication mechanisms: a usability perspective
This paper will review the research into different types of authentication mechanisms, including simple passwords, and propose a mechanism for quantifying the quality of different authentication mechanisms to support an informed choice for web site administrators.
Password Security: Best Practices and Management Strategies
This report will go in depth on the best practices and strategies that derive from password security.
Influencing user password choice through peer pressure
This work evaluated the evaluation of a novel concept for a proactive password checking mechanism that analyzes and presents to users, information about their peer’s password strength, based on recent research indicating that social navigation can be used to guide users to safer, more secure practices regarding computer security and privacy.
User Acceptance of Multiple Password Systems: A Proposed Study
The role that password characteristics, such as number of passwords and password complexity, coupled with frequency of use, play in users’ perceptions and overall willingness to faithfully adopt an alternative authentication system is investigated.
Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines
This study suggests effective ways that trainers or employers can improve compliance with password guidelines and suggests training programs should aim to enhance IS security coping appraisal.
Password Policies vs. Usability: When Do Users Go “Bananas”?
This paper addresses users' reactions to such a scenario by means of an online survey where users are being asked to create a password following an increasing number of restrictions and confirms that the increase in rule complexity has detrimental effects on usability and can lead to workarounds potentially compromising password security.
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens
It is found that the idea of carrying physical devices increases perceived personal responsibility for secure authentication, making the risks and inconvenience associated with loss and theft salient for participants.
Secure Alternatives to Password-based Authentication Mechanisms submitted
This study presents requirements the alternative authentication mechanisms should meet and reviews and analyzes graphical passwords and keystroke dynamics from a usability and security point of view.
Matrix Passwords: A Proposed Methodology of Password Authentication
This work proposes a new method of password authentication—Matrix Passwords, which slightly modifying the manner in which traditional passwords are created may significantly reduce the risk of reusing passwords and facilitate the ease of creating passwords that are easy to remember, yet hard to crack.
A Study on the Factors Affecting the Information Systems Security Effectiveness of Password
According to the results of this study, while threat is not related to the risk, information assets and vulnerability arerelated to the user's awareness of risk.


How crackers crack passwords or what passwords to avoid
This report tells how ''crackers'' (computer wizards who use their talents for illegal and destructive purposes) obtain access to computer systems and gives specific advice on how to prevent them from doing it.
Deficiencies of the traditional approach to information security and the requirements for a new methodology
Computer communication security - principles, standard protocols and techniques
This chapter discusses the standardization process, which led to the establishment of ASN.I.
Qualitative and Quantitative research
Qualitative research focuses on the quality of things – what is their nature? What are they like? How can they be described? It often involves the views or internal worlds of participants, and may
Basics of qualitative research: Grounded theory procedures and techniques
Reading a book as this basics of qualitative research grounded theory procedures and techniques and other references can enrich your life quality.
Basics of qualitative research: Grounded theory procedures and techniques.
Introduction Getting Started Theoretical Sensitivity The Uses of Literature Open Coding Techniques for Enhancing Theoretical Sensitivity Axial Coding Selective Coding Process The Conditional Matrix
Implicit and explicit memory for new associations in normal and amnesic subjects.
  • P. Graf, D. Schacter
  • Psychology
    Journal of experimental psychology. Learning, memory, and cognition
  • 1985
This effect was observed with college students and amnesic patients, suggesting that word completion performance is mediated by implicit memory for new associations that is independent of explicit recollection.
Engineering Psychology and Human Performance
1. Introduction to Engineering Psychology and Human Performance 2. Signal Detection, Information Theory and Absolute Judgment 3. Attention in Perception and Display Space 4. Spatial Displays 5.