An exploratory study of cyber hygiene behaviors and knowledge
AA Cain, ME Edwards, JD Still - Journal of information security and …, 2018 - Elsevier
End users' cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we
need a deeper understanding of the user differences that are associated with either good or …
need a deeper understanding of the user differences that are associated with either good or …
" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …
documented features that lead to easily guessed passwords, but have not probed why users …
Encouraging users to improve password security and memorability
M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …
but rather by the limitations of human memory, and human perceptions together with their …
Understanding password choices: How frequently entered passwords are re-used across websites
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …
use. Yet, users do not always have good password security practices, leaving their accounts …
An {Administrator's} Guide to Internet Password Research
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …
securing web-facing services or setting policies. With a view to improving this situation we …
A general cyber hygiene approach for financial analytical environment
WM Ead, MM Abbassy - Financial Data Analytics: Theory and Application, 2022 - Springer
Ideally, users must have a good level of cyber hygiene. Many people have bad cyber
hygiene. They openly exchange passwords and share private information on social …
hygiene. They openly exchange passwords and share private information on social …
The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors
SM Kennison, E Chan-Tin - Frontiers in Psychology, 2020 - frontiersin.org
Individuals' use of insecure cybersecurity behaviors, including the use of weak passwords, is
a leading contributor to cybersecurity breaches. While training individuals on best practices …
a leading contributor to cybersecurity breaches. While training individuals on best practices …
Human-centered authentication guidelines
JD Still, A Cain, D Schuster - Information & Computer Security, 2017 - emerald.com
Purpose Despite the widespread use of authentication schemes and the rapid emergence of
novel authentication schemes, a general set of domain-specific guidelines has not yet been …
novel authentication schemes, a general set of domain-specific guidelines has not yet been …
Speak their language: Designing effective messages to improve employees' information security decision making
Employee disinterest in information security remains one of the greatest impediments to
effective information security management programs. How can organizations enhance the …
effective information security management programs. How can organizations enhance the …