An exploratory study of cyber hygiene behaviors and knowledge

AA Cain, ME Edwards, JD Still - Journal of information security and …, 2018 - Elsevier
End users' cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we
need a deeper understanding of the user differences that are associated with either good or …

" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab

B Ur, F Noma, J Bees, SM Segreti, R Shay… - Eleventh symposium on …, 2015 - usenix.org
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …

Encouraging users to improve password security and memorability

M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …

Understanding password choices: How frequently entered passwords are re-used across websites

R Wash, E Rader, R Berman, Z Wellmer - Twelfth Symposium on Usable …, 2016 - usenix.org
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …

An {Administrator's} Guide to Internet Password Research

D Florêncio, C Herley, PC Van Oorschot - 28th large installation system …, 2014 - usenix.org
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …

A general cyber hygiene approach for financial analytical environment

WM Ead, MM Abbassy - Financial Data Analytics: Theory and Application, 2022 - Springer
Ideally, users must have a good level of cyber hygiene. Many people have bad cyber
hygiene. They openly exchange passwords and share private information on social …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …

Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors

SM Kennison, E Chan-Tin - Frontiers in Psychology, 2020 - frontiersin.org
Individuals' use of insecure cybersecurity behaviors, including the use of weak passwords, is
a leading contributor to cybersecurity breaches. While training individuals on best practices …

Human-centered authentication guidelines

JD Still, A Cain, D Schuster - Information & Computer Security, 2017 - emerald.com
Purpose Despite the widespread use of authentication schemes and the rapid emergence of
novel authentication schemes, a general set of domain-specific guidelines has not yet been …

Speak their language: Designing effective messages to improve employees' information security decision making

AC Johnston, M Warkentin, AR Dennis… - Decision …, 2019 - Wiley Online Library
Employee disinterest in information security remains one of the greatest impediments to
effective information security management programs. How can organizations enhance the …