Is my password strong enough?: A study on user perception in the developing world

TI Tanni, T Taharat, MS Parvez… - EAI Endorsed …, 2022 - publications.eai.eu
INTRODUCTION: The first line of defense in the cyber world is strong and difficult to predict
passwords. However, users often choose highly predictable passwords based on personal …

[PDF][PDF] Password security

D Charoen - International Journal of Security (IJS), 2014 - Citeseer
This study investigates users' behavior in password utilization. Good password practices are
critical to the security of any information system. End users often use weak passwords that …

[PDF][PDF] Cybersecurity: personal information and password setup

Y Ma, NW Twyman - 2018 - researchgate.net
This study is designed to explore what are the most common and most suggested way to
create passwords with better security, especially for the group of people who set their …

[PDF][PDF] Exploring the'weakest link': A study of personal password security

G Notoatmodjo - 2007 - cs.auckland.ac.nz
The security of most password authentication mechanisms hinges on the secrecy of only a
single word–if an adversary obtains knowledge of a victim's password, the adversary will be …

Do Users Correctly Identify Password Strength?

J Pittman, N Robinson - Journal of The Colloquium for Information …, 2020 - cisse.info
Much of the security for information systems rests upon passwords. Yet, the scale of
password use is producing elevated levels of cognitive burden. Existing research has …

Essential lessons still not learned? Examining the password practices of end-users and service providers

S Furnell, N Bär - Human Aspects of Information Security, Privacy, and …, 2013 - Springer
Password authentication remains the dominant form of user authentication for online
systems. As such, from a user perspective, it is an approach that they are very much …

[PDF][PDF] Password practices: A study on attitudes towards password usage among undergraduate students in klang valley, malaysia

EM Tamil, AH Othman, SAZ Abidin, MYI Idris… - … of Advancement of …, 2007 - academia.edu
Password-protected systems that require user identification (ID) and password are the most
used authentication methods in the current computing and internet environment. Therefore …

Security-aware passwords and services usage in developing countries: A case study of bangladesh

R Khan, R Hasan - Services Computing–SCC 2018: 15th International …, 2018 - Springer
Users from developing nations, such as Bangladesh, had a rather late entry into the
information highway and may not be equally aware of the different secure practices on the …

Password Security: What Are We Doing Wrong?

DK Davis, MM Chowdhury… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Passwords are used consistently in our everyday lives. Whether it's from logging in to our
smart phones, our computers, accessing our bank, etc. We need to use passwords to protect …

[PDF][PDF] A study of South African computer usersʹ password usage habits and attitude towards password security

B Friedman - 2014 - homes.cs.ru.ac.za
The challenge of having to create and remember a secure password for each user account
has become a problem for many computer users and can lead to bad password …