-
1
-
-
1642457891
-
How to keep a secret
-
April
-
Adams, S. How to keep a secret. Forbes, 157, 7 (April 1996), 108-109.
-
(1996)
Forbes
, vol.157
, Issue.7
, pp. 108-109
-
-
Adams, S.1
-
2
-
-
0023328831
-
Verifying the authentication of an information system user
-
Ahituv, N.; Lapid, Y.; and Neumann, S. Verifying the authentication of an information system user. Computers and Security, 6, 2 (1987), 152-157.
-
(1987)
Computers and Security
, vol.6
, Issue.2
, pp. 152-157
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
4
-
-
0002122064
-
SMIS member, a membership analysis
-
March
-
Ball, L., and Harris, R. SMIS member, a membership analysis. MIS Quarterly, 6, 1 (March 1982), 19-38.
-
(1982)
MIS Quarterly
, vol.6
, Issue.1
, pp. 19-38
-
-
Ball, L.1
Harris, R.2
-
5
-
-
0021470294
-
User-friendly password methods for computer-mediated information systems
-
Barton, B.F., and Barton, M.S., User-friendly password methods for computer-mediated information systems. Computers and Security, 3, 3 (1988), 186-195.
-
(1988)
Computers and Security
, vol.3
, Issue.3
, pp. 186-195
-
-
Barton, B.F.1
Barton, M.S.2
-
6
-
-
0029238493
-
Improving system security via proactive password checking
-
Bishop, M., and Klein, D.V. Improving system security via proactive password checking. Computers and Security, 14, 3 (1995), 233-249.
-
(1995)
Computers and Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
7
-
-
0141946906
-
Security on the Internet: Authenticating the user
-
December
-
Botting, J. Security on the Internet: authenticating the user. Telecommunications, 31, 12 (December 1997), 77-79.
-
(1997)
Telecommunications
, vol.31
, Issue.12
, pp. 77-79
-
-
Botting, J.1
-
8
-
-
1642457888
-
But will they pay attention this time?
-
January
-
Bradner, S. But will they pay attention this time? Network World, 14, 4 (January 1997), 32-34.
-
(1997)
Network World
, vol.14
, Issue.4
, pp. 32-34
-
-
Bradner, S.1
-
9
-
-
55249089317
-
Key issues in information systems management
-
March
-
Brancheau, J.C., and Wetherbe, J.C. Key issues in information systems management. MIS Quarterly, 12, 1 (March 1987), 23-36.
-
(1987)
MIS Quarterly
, vol.12
, Issue.1
, pp. 23-36
-
-
Brancheau, J.C.1
Wetherbe, J.C.2
-
10
-
-
9744281201
-
Key issues in information systems management: 1994-95 SIM/Delphi results
-
June
-
Brancheau, J.C., and Wetherbe, J.C. Key issues in information systems management: 1994-95 SIM/Delphi results. MIS Quarterly, 20, 2 (June 1996), 225-242.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 225-242
-
-
Brancheau, J.C.1
Wetherbe, J.C.2
-
11
-
-
1642457863
-
Who knows who you are?
-
June
-
Broderick, J. Who knows who you are? Infoworld, 19, 24 (June 1997), 108-112.
-
(1997)
Infoworld
, vol.19
, Issue.24
, pp. 108-112
-
-
Broderick, J.1
-
12
-
-
0003834662
-
-
Dubuque, IA: Irwin
-
Cooper, D.R., and Emory, C.W., Business Research Methods, 5th ed. Dubuque, IA: Irwin, 1995.
-
(1995)
Business Research Methods, 5th Ed.
-
-
Cooper, D.R.1
Emory, C.W.2
-
14
-
-
1642498879
-
Ensure your datafiles are secure even if the Pentagon's are not
-
May
-
Corbitt, T. Ensure your datafiles are secure even if the Pentagon's are not. Management Services, 41, 5 (May 1997), 24-26.
-
(1997)
Management Services
, vol.41
, Issue.5
, pp. 24-26
-
-
Corbitt, T.1
-
15
-
-
0001960725
-
Test validation
-
R.L. Thorndike (ed.), Washington, DC: American Council on Education
-
Cronbach, L. Test validation. In R.L. Thorndike (ed.), Educational Measurement, 2d ed. Washington, DC: American Council on Education, 1971, pp. 443-507.
-
(1971)
Educational Measurement, 2d Ed.
, pp. 443-507
-
-
Cronbach, L.1
-
17
-
-
1642457860
-
Easy Unix security
-
April
-
Dichter, C. Easy Unix security. Unix Review, 11, 4 (April 1993), 42-51.
-
(1993)
Unix Review
, vol.11
, Issue.4
, pp. 42-51
-
-
Dichter, C.1
-
18
-
-
1642539707
-
Major hacks raise hackles, spur defenders
-
April
-
DiDio, L. Major hacks raise hackles, spur defenders. ComputerWorld, 32, 13 (April 1998), 49-50.
-
(1998)
ComputerWorld
, vol.32
, Issue.13
, pp. 49-50
-
-
DiDio, L.1
-
19
-
-
1642580202
-
Cyberattack prompts DoD to boost security
-
March
-
DiDio, L. Cyberattack prompts DoD to boost security. ComputerWorld, 32, 9 (March 1998), 14.
-
(1998)
ComputerWorld
, vol.32
, Issue.9
, pp. 14
-
-
DiDio, L.1
-
20
-
-
1642580206
-
-
Washington, DC: National Computer Security Center, CSC-STD-002-85
-
DoD. Department of Defense Password Management Guideline. Washington, DC: National Computer Security Center, CSC-STD-002-85, 1985.
-
(1985)
Department of Defense Password Management Guideline
-
-
-
24
-
-
0007777222
-
-
Reading, MA: Addison-Wesley
-
Graziano, A.M., and Raulin, M.L. Research Methods, 3d ed. Reading, MA: Addison-Wesley, 1997.
-
(1997)
Research Methods, 3d Ed.
-
-
Graziano, A.M.1
Raulin, M.L.2
-
25
-
-
0002776525
-
-
New York: New York University Press
-
Grossman, W. Net Wars. New York: New York University Press, 1997.
-
(1997)
Net Wars
-
-
Grossman, W.1
-
26
-
-
0023330603
-
The hacker's comfort
-
Herschberg, I. The hacker's comfort. Comity, 6, 2 (1987), 133-138.
-
(1987)
Comity
, vol.6
, Issue.2
, pp. 133-138
-
-
Herschberg, I.1
-
27
-
-
1642539705
-
Demise of passwords
-
Highland, J.H. Demise of passwords. Computers and Security, 9, 4 (1990), 196-200.
-
(1990)
Computers and Security
, vol.9
, Issue.4
, pp. 196-200
-
-
Highland, J.H.1
-
28
-
-
1642498867
-
How to prevent the use of weak passwords
-
March
-
Highland, J.H. How to prevent the use of weak passwords. EDPACS, 18, 9 (March 1991), 7-12.
-
(1991)
EDPACS
, vol.18
, Issue.9
, pp. 7-12
-
-
Highland, J.H.1
-
29
-
-
1642457854
-
Changing passwords
-
Highland J.H. Changing passwords. Computers and Security, 16, 3 (1997), 183-184.
-
(1997)
Computers and Security
, vol.16
, Issue.3
, pp. 183-184
-
-
Highland, J.H.1
-
30
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
Summer
-
Hoffer, J., and Straub, D.W. The 9 to 5 underground: are you policing computer crimes? Sloan Management Review, 30, 4 (Summer 1989), 35-44.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-44
-
-
Hoffer, J.1
Straub, D.W.2
-
32
-
-
0001591907
-
The pretest in survey research: Issues and preliminary findings
-
Hunt Sparkman, R.D., Jr., and Wilcox J.B. The pretest in survey research: issues and preliminary findings. Journal of Marketing Research, 19, 2 (1982), 269-273.
-
(1982)
Journal of Marketing Research
, vol.19
, Issue.2
, pp. 269-273
-
-
Hunt Sparkman Jr., R.D.1
Wilcox, J.B.2
-
34
-
-
0024771499
-
A survey of password mechanisms: Weaknesses and potential improvements, part 1
-
Jobusch, D.L., and Oldhoeft, A.E. A survey of password mechanisms: weaknesses and potential improvements, part 1. Computers and Security, 8, 7 (1989), 587-601.
-
(1989)
Computers and Security
, vol.8
, Issue.7
, pp. 587-601
-
-
Jobusch, D.L.1
Oldhoeft, A.E.2
-
35
-
-
0024777503
-
A survey of password mechanisms: Weaknesses and potential improvements, part 2
-
Jobusch, D.L., and Oldhoeft, A.E. A survey of password mechanisms: weaknesses and potential improvements, part 2. Computers and Security, 8, 8 (1989), 675-689.
-
(1989)
Computers and Security
, vol.8
, Issue.8
, pp. 675-689
-
-
Jobusch, D.L.1
Oldhoeft, A.E.2
-
36
-
-
1642457852
-
Paying attention to passwords
-
June
-
Kearns, D. Paying attention to passwords. Network World, 13, 23 (June 1996), 28-29.
-
(1996)
Network World
, vol.13
, Issue.23
, pp. 28-29
-
-
Kearns, D.1
-
37
-
-
1542626401
-
Computer fraud threat increasing, study says
-
May
-
LaPlante, A. Computer fraud threat increasing, study says. Infoworld, 18 (May 1987), 47.
-
(1987)
Infoworld
, vol.18
, pp. 47
-
-
LaPlante, A.1
-
38
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
June
-
Loch, K.R.; Carr, H.H.; and Warkentin, M.E. Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly, 16, 2 (June, 1992), 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.R.1
Carr, H.H.2
Warkentin, M.E.3
-
39
-
-
0023995273
-
Understanding the use of passwords
-
Menkus, B. Understanding the use of passwords. Computers and Security, 7, 2 (1988), 132-136.
-
(1988)
Computers and Security
, vol.7
, Issue.2
, pp. 132-136
-
-
Menkus, B.1
-
40
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
March
-
Miller, G.A. The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review, 63, 3 (March 1956), 81-97.
-
(1956)
Psychological Review
, vol.63
, Issue.3
, pp. 81-97
-
-
Miller, G.A.1
-
41
-
-
1642457848
-
Beefing up NT's security out of the box
-
June
-
Morrey, B. Beefing up NT's security out of the box. Inforworld, 19, 24 (June 1997), 122-124.
-
(1997)
Inforworld
, vol.19
, Issue.24
, pp. 122-124
-
-
Morrey, B.1
-
42
-
-
0018543411
-
Password security: A case history
-
November
-
Morris, R., and Thompson, K. Password security: a case history. Communications of the ACM, 22, 11 (November 1979), 594-597.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
43
-
-
24044502721
-
Information systems issues for the 1990s
-
December
-
Neiderman, F.; Brancheau, J.C.; and Wetherbe, J.C. Information systems issues for the 1990s. MIS Quarterly, 15, 4 (December 1991), 475-502.
-
(1991)
MIS Quarterly
, vol.15
, Issue.4
, pp. 475-502
-
-
Neiderman, F.1
Brancheau, J.C.2
Wetherbe, J.C.3
-
44
-
-
1642580190
-
PGP's Business Security Suite spotlights corporate users
-
October
-
Nelson, M. PGP's Business Security Suite spotlights corporate users. ComputerWorld, 31, 21 (October 1997), 88.
-
(1997)
ComputerWorld
, vol.31
, Issue.21
, pp. 88
-
-
Nelson, M.1
-
45
-
-
0023435721
-
Computer security: The long road ahead
-
Paans, R., and Herschberg, I.S. Computer security: the long road ahead. Computers and Security, 6, 5 (1987), 403-416.
-
(1987)
Computers and Security
, vol.6
, Issue.5
, pp. 403-416
-
-
Paans, R.1
Herschberg, I.S.2
-
48
-
-
0019895650
-
A password extension for human factors
-
Porter, S.N. A password extension for human factors. Computers and Security, 1, 1 (1982), 54-56.
-
(1982)
Computers and Security
, vol.1
, Issue.1
, pp. 54-56
-
-
Porter, S.N.1
-
49
-
-
0024683697
-
Password cracking: A game of wits
-
June
-
Seeley D. Password cracking: a game of wits. Communications of the ACM, 32, 6 (June 1989), 700-703.
-
(1989)
Communications of the ACM
, vol.32
, Issue.6
, pp. 700-703
-
-
Seeley, D.1
-
51
-
-
0242444735
-
The Internet worm: Crisis and aftermath
-
June
-
Spafford, E. The Internet worm: crisis and aftermath. Communications of the ACM, 32, 6 (June 1989), 203-227.
-
(1989)
Communications of the ACM
, vol.32
, Issue.6
, pp. 203-227
-
-
Spafford, E.1
-
52
-
-
0023436806
-
Identifying computer users with authentication devices (tokens)
-
Spender, J.C. Identifying computer users with authentication devices (tokens). Computers and Security, 6, 6 (1987), 385-395.
-
(1987)
Computers and Security
, vol.6
, Issue.6
, pp. 385-395
-
-
Spender, J.C.1
-
54
-
-
0024011325
-
Stalking the willy hacker
-
May
-
Stoll, C. Stalking the willy hacker. Communications of the ACM, 31, 5 (May 1988), 484-497.
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
, pp. 484-497
-
-
Stoll, C.1
-
55
-
-
0013417738
-
Computer abuse and computer security: Update on an empirical study
-
Spring
-
Straub, D.W. Computer abuse and computer security: update on an empirical study. Security, Audit and Control Review, 4, 2 (Spring 1986), 21-31.
-
(1986)
Security, Audit and Control Review
, vol.4
, Issue.2
, pp. 21-31
-
-
Straub, D.W.1
-
56
-
-
55249123249
-
Validating instruments in MIS research
-
June
-
Straub, D.W. Validating instruments in MIS research. MIS Quarterly, 13, 2 (June 1989), 146-169.
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 146-169
-
-
Straub, D.W.1
-
57
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
March
-
Straub, D.W., and Nance, W.D. Discovering and disciplining computer abuse in organizations: a field study. MIS Quarterly, 14, 1 (March 1990), 45-60.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
59
-
-
1642457840
-
The schoolboy spy
-
London March 29, section 5
-
Ungoed-Thomas, J. The schoolboy spy. Sunday Times (London) (March 29, 1998), section 5, 1-2.
-
(1998)
Sunday Times
, pp. 1-2
-
-
Ungoed-Thomas, J.1
-
60
-
-
0020589695
-
Effective information system security with password controls
-
Wood, C.C. Effective information system security with password controls. Computers and Security, 2, 1 (1983), 5-10.
-
(1983)
Computers and Security
, vol.2
, Issue.1
, pp. 5-10
-
-
Wood, C.C.1
-
61
-
-
0000612396
-
Authenticating passwords over an insecure channel
-
Wu, T.C., and Sung, H.S. Authenticating passwords over an insecure channel. Computers and Security, 15, 5 (1996), 431-439.
-
(1996)
Computers and Security
, vol.15
, Issue.5
, pp. 431-439
-
-
Wu, T.C.1
Sung, H.S.2
-
62
-
-
11244303691
-
Taking command of Windows NT
-
November
-
Yager, T. Taking command of Windows NT. Unix Review, 15, 12 (November 1997), pp.33-42.
-
(1997)
Unix Review
, vol.15
, Issue.12
, pp. 33-42
-
-
Yager, T.1
-
63
-
-
0025545602
-
Cognitive passwords: The key for easy access control
-
Zviran, M., and Haga, W.J. Cognitive passwords: the key for easy access control. Computers and Security, 9, 8 (1990), 723-736.
-
(1990)
Computers and Security
, vol.9
, Issue.8
, pp. 723-736
-
-
Zviran, M.1
Haga, W.J.2
-
64
-
-
0003369812
-
Evaluating password techniques for multilevel authentication mechanisms
-
Zviran, M., and Haga, W.J. Evaluating password techniques for multilevel authentication mechanisms. Computer Journal, 36, 3 (1993), 227-237.
-
(1993)
Computer Journal
, vol.36
, Issue.3
, pp. 227-237
-
-
Zviran, M.1
Haga, W.J.2
|