[图书][B] A survey study of password setting and reuse

Q Li - 2020 - search.proquest.com
Password security is strongly tied to a user's password setting and reuse. The purpose of
this thesis research is to explore the current status of users' password usage, and to explore …

[PDF][PDF] " It's Hidden in My Computer": Exploring Account Management Tools and Behaviors (CMU-CyLab-13-007)

E Hayashi, J Hong - 2013 - kilthub.cmu.edu
ABSTRACT A great deal of past work has investigated passwords in terms of the number of
passwords users have, the way people generate passwords, the security of these …

Why we hate IT: two surveys on pre‐generated and expiring passwords in an academic setting

M Farcasin, E Chan‐tin - Security and Communication …, 2015 - Wiley Online Library
We performed two surveys to understand how members of a university managed their
passwords. At password creation, the university offered people four pre‐generated random …

[PDF][PDF] Password security

D Charoen - International Journal of Security (IJS), 2014 - Citeseer
This study investigates users' behavior in password utilization. Good password practices are
critical to the security of any information system. End users often use weak passwords that …

[PDF][PDF] Cybersecurity: personal information and password setup

Y Ma, NW Twyman - 2018 - researchgate.net
This study is designed to explore what are the most common and most suggested way to
create passwords with better security, especially for the group of people who set their …

[PDF][PDF] Exploring the'weakest link': A study of personal password security

G Notoatmodjo - 2007 - cs.auckland.ac.nz
The security of most password authentication mechanisms hinges on the secrecy of only a
single word–if an adversary obtains knowledge of a victim's password, the adversary will be …

Behavioral attributes in password reuse: Analysis of password practices in work and personal spaces

Aiswarya, J Raveendran, V Banahatti - … of the 13th Indian Conference on …, 2022 - dl.acm.org
Passwords created by users are hard to do away with, albeit the presence of other
authentication methods. With unsafe password practices still being a concern, we use a …

Password protection: End user security behavior

K Kato, V Klyuev - 2014 - dspace.wunu.edu.ua
Password authentication is one of essential services in our life for protecting data. In other
words, we may loose a lot of money, sensitive data, etc., if passwords leak out. Thus, we …

Determinants of password security: some educational aspects

L Drevin, H Kruger, T Steyn - … and Security Education and Training: 8th …, 2013 - Springer
Abstract Development and integration of technology give organisations the opportunity to be
globally competitive. However, the potential misuse of Information Technology (IT) is a …

A comparison of password feedback mechanisms and their impact on password entropy

M Ciampa - Information Management & Computer Security, 2013 - emerald.com
Purpose–Text-based passwords created by users are typically weak. A common mitigation
is to provide meaningful feedback to users regarding the relative strength of their newly …