Hybrid password meters for more secure passwords–a comprehensive study of password meters including nudges and password information

V Zimmermann, K Marky, K Renaud - Behaviour & Information …, 2023 - Taylor & Francis
… users to veer towards more secure passwords in this study. They have proven potential to
… and the responsibility resulting from suggesting a certain tool will have to be acknowledged. …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password The password is the most commonly used … In this study, the user was free to
create a personal password. It had to … In line with the research agenda proposed by Herley and …

Why users (don't) use password managers at a large educational institution

P Mayer, CW Munyendo, ML Mazurek… - 31st USENIX Security …, 2022 - usenix.org
… their passwords without a PM, and 24 appreciating that they do not … issues with websites
have been found to persist [23… to attackers for several PMs also continue to persist as of 2020 [29…

Information systems security research agenda: Exploring the gap between research and practice

G Dhillon, K Smith, I Dissanayaka - The Journal of Strategic Information …, 2021 - Elsevier
… In subsequent years other IS security scholars while acknowledging … V16 password
authentication key scheme secure agent … A lot of IS security threats persist because there were …

Can individuals' neutralization techniques be overcome? A field experiment on password policy

M Siponen, P Puhakainen, A Vance - Computers & Security, 2020 - Elsevier
… to password security policy is a persistent problem for organizations. This problem is especially
worrisome because passwordsacknowledge that the nonequivalent groups in this study

Do security fear appeals work when they interrupt tasks? A multi-method examination of password strength

A Vance, D Eargle, D Eggett, D Straub, K Ouimet - 2022 - vtechworks.lib.vt.edu
… Therefore, the problem of strong password creation by individuals is likely to persist for …
how the fear appeal helped them to recognize the susceptibility of their password to attacks, the …

“taking out the trash”: Why security behavior change requires intentional forgetting

J Hielscher, A Kluge, U Menges… - Proceedings of the 2021 …, 2021 - dl.acm.org
… the other most important task of password managers, the retrieval of passwords, cues are in
… IF research in the field needs to explicitly explain where it did not work. We acknowledge the …

From personal data to digital legacy: Exploring conflicts in the sharing, security and privacy of post-mortem data

J Holt, J Nicholson, JD Smeddinck - Proceedings of the Web Conference …, 2021 - dl.acm.org
… We report on two workshops carried out with users of password managers to explore their
… It is also important to acknowledge that privacy and the appropriateness of access to data is …

Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
… number of passwords or passphrases in the expectation of guessing correctly eventually [28];
Pass-the-Hash (PtH)—An attacker captures a hash of a password instead of the password

Leaky forms: A study of email and password exfiltration before form submission

A Senol, G Acar, M Humbert, FZ Borgesius - 31st USENIX Security …, 2022 - usenix.org
… Email addresses are ideal identifiers to fill this gap, since they are unique, persistent, … study
dark patterns in consent dialogs, Consent-O-Matic is a browser extension that can recognize