메뉴 건너뛰기




Volumn 15, Issue 4, 1998, Pages 161-185

Password security: An empirical study

Author keywords

Access control; Information system security; Passwords; User authentication

Indexed keywords


EID: 0033277446     PISSN: 07421222     EISSN: None     Source Type: Journal    
DOI: 10.1080/07421222.1999.11518226     Document Type: Article
Times cited : (195)

References (65)
  • 1
    • 1642457891 scopus 로고    scopus 로고
    • How to keep a secret
    • April
    • Adams, S. How to keep a secret. Forbes, 157, 7 (April 1996), 108-109.
    • (1996) Forbes , vol.157 , Issue.7 , pp. 108-109
    • Adams, S.1
  • 2
    • 0023328831 scopus 로고
    • Verifying the authentication of an information system user
    • Ahituv, N.; Lapid, Y.; and Neumann, S. Verifying the authentication of an information system user. Computers and Security, 6, 2 (1987), 152-157.
    • (1987) Computers and Security , vol.6 , Issue.2 , pp. 152-157
    • Ahituv, N.1    Lapid, Y.2    Neumann, S.3
  • 4
    • 0002122064 scopus 로고
    • SMIS member, a membership analysis
    • March
    • Ball, L., and Harris, R. SMIS member, a membership analysis. MIS Quarterly, 6, 1 (March 1982), 19-38.
    • (1982) MIS Quarterly , vol.6 , Issue.1 , pp. 19-38
    • Ball, L.1    Harris, R.2
  • 5
    • 0021470294 scopus 로고
    • User-friendly password methods for computer-mediated information systems
    • Barton, B.F., and Barton, M.S., User-friendly password methods for computer-mediated information systems. Computers and Security, 3, 3 (1988), 186-195.
    • (1988) Computers and Security , vol.3 , Issue.3 , pp. 186-195
    • Barton, B.F.1    Barton, M.S.2
  • 6
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • Bishop, M., and Klein, D.V. Improving system security via proactive password checking. Computers and Security, 14, 3 (1995), 233-249.
    • (1995) Computers and Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 7
    • 0141946906 scopus 로고    scopus 로고
    • Security on the Internet: Authenticating the user
    • December
    • Botting, J. Security on the Internet: authenticating the user. Telecommunications, 31, 12 (December 1997), 77-79.
    • (1997) Telecommunications , vol.31 , Issue.12 , pp. 77-79
    • Botting, J.1
  • 8
    • 1642457888 scopus 로고    scopus 로고
    • But will they pay attention this time?
    • January
    • Bradner, S. But will they pay attention this time? Network World, 14, 4 (January 1997), 32-34.
    • (1997) Network World , vol.14 , Issue.4 , pp. 32-34
    • Bradner, S.1
  • 9
    • 55249089317 scopus 로고
    • Key issues in information systems management
    • March
    • Brancheau, J.C., and Wetherbe, J.C. Key issues in information systems management. MIS Quarterly, 12, 1 (March 1987), 23-36.
    • (1987) MIS Quarterly , vol.12 , Issue.1 , pp. 23-36
    • Brancheau, J.C.1    Wetherbe, J.C.2
  • 10
    • 9744281201 scopus 로고    scopus 로고
    • Key issues in information systems management: 1994-95 SIM/Delphi results
    • June
    • Brancheau, J.C., and Wetherbe, J.C. Key issues in information systems management: 1994-95 SIM/Delphi results. MIS Quarterly, 20, 2 (June 1996), 225-242.
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 225-242
    • Brancheau, J.C.1    Wetherbe, J.C.2
  • 11
    • 1642457863 scopus 로고    scopus 로고
    • Who knows who you are?
    • June
    • Broderick, J. Who knows who you are? Infoworld, 19, 24 (June 1997), 108-112.
    • (1997) Infoworld , vol.19 , Issue.24 , pp. 108-112
    • Broderick, J.1
  • 14
    • 1642498879 scopus 로고    scopus 로고
    • Ensure your datafiles are secure even if the Pentagon's are not
    • May
    • Corbitt, T. Ensure your datafiles are secure even if the Pentagon's are not. Management Services, 41, 5 (May 1997), 24-26.
    • (1997) Management Services , vol.41 , Issue.5 , pp. 24-26
    • Corbitt, T.1
  • 15
    • 0001960725 scopus 로고
    • Test validation
    • R.L. Thorndike (ed.), Washington, DC: American Council on Education
    • Cronbach, L. Test validation. In R.L. Thorndike (ed.), Educational Measurement, 2d ed. Washington, DC: American Council on Education, 1971, pp. 443-507.
    • (1971) Educational Measurement, 2d Ed. , pp. 443-507
    • Cronbach, L.1
  • 17
    • 1642457860 scopus 로고
    • Easy Unix security
    • April
    • Dichter, C. Easy Unix security. Unix Review, 11, 4 (April 1993), 42-51.
    • (1993) Unix Review , vol.11 , Issue.4 , pp. 42-51
    • Dichter, C.1
  • 18
    • 1642539707 scopus 로고    scopus 로고
    • Major hacks raise hackles, spur defenders
    • April
    • DiDio, L. Major hacks raise hackles, spur defenders. ComputerWorld, 32, 13 (April 1998), 49-50.
    • (1998) ComputerWorld , vol.32 , Issue.13 , pp. 49-50
    • DiDio, L.1
  • 19
    • 1642580202 scopus 로고    scopus 로고
    • Cyberattack prompts DoD to boost security
    • March
    • DiDio, L. Cyberattack prompts DoD to boost security. ComputerWorld, 32, 9 (March 1998), 14.
    • (1998) ComputerWorld , vol.32 , Issue.9 , pp. 14
    • DiDio, L.1
  • 20
    • 1642580206 scopus 로고
    • Washington, DC: National Computer Security Center, CSC-STD-002-85
    • DoD. Department of Defense Password Management Guideline. Washington, DC: National Computer Security Center, CSC-STD-002-85, 1985.
    • (1985) Department of Defense Password Management Guideline
  • 25
    • 0002776525 scopus 로고    scopus 로고
    • New York: New York University Press
    • Grossman, W. Net Wars. New York: New York University Press, 1997.
    • (1997) Net Wars
    • Grossman, W.1
  • 26
    • 0023330603 scopus 로고
    • The hacker's comfort
    • Herschberg, I. The hacker's comfort. Comity, 6, 2 (1987), 133-138.
    • (1987) Comity , vol.6 , Issue.2 , pp. 133-138
    • Herschberg, I.1
  • 27
    • 1642539705 scopus 로고
    • Demise of passwords
    • Highland, J.H. Demise of passwords. Computers and Security, 9, 4 (1990), 196-200.
    • (1990) Computers and Security , vol.9 , Issue.4 , pp. 196-200
    • Highland, J.H.1
  • 28
    • 1642498867 scopus 로고
    • How to prevent the use of weak passwords
    • March
    • Highland, J.H. How to prevent the use of weak passwords. EDPACS, 18, 9 (March 1991), 7-12.
    • (1991) EDPACS , vol.18 , Issue.9 , pp. 7-12
    • Highland, J.H.1
  • 29
    • 1642457854 scopus 로고    scopus 로고
    • Changing passwords
    • Highland J.H. Changing passwords. Computers and Security, 16, 3 (1997), 183-184.
    • (1997) Computers and Security , vol.16 , Issue.3 , pp. 183-184
    • Highland, J.H.1
  • 30
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • Summer
    • Hoffer, J., and Straub, D.W. The 9 to 5 underground: are you policing computer crimes? Sloan Management Review, 30, 4 (Summer 1989), 35-44.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-44
    • Hoffer, J.1    Straub, D.W.2
  • 32
    • 0001591907 scopus 로고
    • The pretest in survey research: Issues and preliminary findings
    • Hunt Sparkman, R.D., Jr., and Wilcox J.B. The pretest in survey research: issues and preliminary findings. Journal of Marketing Research, 19, 2 (1982), 269-273.
    • (1982) Journal of Marketing Research , vol.19 , Issue.2 , pp. 269-273
    • Hunt Sparkman Jr., R.D.1    Wilcox, J.B.2
  • 34
    • 0024771499 scopus 로고
    • A survey of password mechanisms: Weaknesses and potential improvements, part 1
    • Jobusch, D.L., and Oldhoeft, A.E. A survey of password mechanisms: weaknesses and potential improvements, part 1. Computers and Security, 8, 7 (1989), 587-601.
    • (1989) Computers and Security , vol.8 , Issue.7 , pp. 587-601
    • Jobusch, D.L.1    Oldhoeft, A.E.2
  • 35
    • 0024777503 scopus 로고
    • A survey of password mechanisms: Weaknesses and potential improvements, part 2
    • Jobusch, D.L., and Oldhoeft, A.E. A survey of password mechanisms: weaknesses and potential improvements, part 2. Computers and Security, 8, 8 (1989), 675-689.
    • (1989) Computers and Security , vol.8 , Issue.8 , pp. 675-689
    • Jobusch, D.L.1    Oldhoeft, A.E.2
  • 36
    • 1642457852 scopus 로고    scopus 로고
    • Paying attention to passwords
    • June
    • Kearns, D. Paying attention to passwords. Network World, 13, 23 (June 1996), 28-29.
    • (1996) Network World , vol.13 , Issue.23 , pp. 28-29
    • Kearns, D.1
  • 37
    • 1542626401 scopus 로고
    • Computer fraud threat increasing, study says
    • May
    • LaPlante, A. Computer fraud threat increasing, study says. Infoworld, 18 (May 1987), 47.
    • (1987) Infoworld , vol.18 , pp. 47
    • LaPlante, A.1
  • 38
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • June
    • Loch, K.R.; Carr, H.H.; and Warkentin, M.E. Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly, 16, 2 (June, 1992), 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.R.1    Carr, H.H.2    Warkentin, M.E.3
  • 39
    • 0023995273 scopus 로고
    • Understanding the use of passwords
    • Menkus, B. Understanding the use of passwords. Computers and Security, 7, 2 (1988), 132-136.
    • (1988) Computers and Security , vol.7 , Issue.2 , pp. 132-136
    • Menkus, B.1
  • 40
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • March
    • Miller, G.A. The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review, 63, 3 (March 1956), 81-97.
    • (1956) Psychological Review , vol.63 , Issue.3 , pp. 81-97
    • Miller, G.A.1
  • 41
    • 1642457848 scopus 로고    scopus 로고
    • Beefing up NT's security out of the box
    • June
    • Morrey, B. Beefing up NT's security out of the box. Inforworld, 19, 24 (June 1997), 122-124.
    • (1997) Inforworld , vol.19 , Issue.24 , pp. 122-124
    • Morrey, B.1
  • 42
    • 0018543411 scopus 로고
    • Password security: A case history
    • November
    • Morris, R., and Thompson, K. Password security: a case history. Communications of the ACM, 22, 11 (November 1979), 594-597.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 43
    • 24044502721 scopus 로고
    • Information systems issues for the 1990s
    • December
    • Neiderman, F.; Brancheau, J.C.; and Wetherbe, J.C. Information systems issues for the 1990s. MIS Quarterly, 15, 4 (December 1991), 475-502.
    • (1991) MIS Quarterly , vol.15 , Issue.4 , pp. 475-502
    • Neiderman, F.1    Brancheau, J.C.2    Wetherbe, J.C.3
  • 44
    • 1642580190 scopus 로고    scopus 로고
    • PGP's Business Security Suite spotlights corporate users
    • October
    • Nelson, M. PGP's Business Security Suite spotlights corporate users. ComputerWorld, 31, 21 (October 1997), 88.
    • (1997) ComputerWorld , vol.31 , Issue.21 , pp. 88
    • Nelson, M.1
  • 45
    • 0023435721 scopus 로고
    • Computer security: The long road ahead
    • Paans, R., and Herschberg, I.S. Computer security: the long road ahead. Computers and Security, 6, 5 (1987), 403-416.
    • (1987) Computers and Security , vol.6 , Issue.5 , pp. 403-416
    • Paans, R.1    Herschberg, I.S.2
  • 48
    • 0019895650 scopus 로고
    • A password extension for human factors
    • Porter, S.N. A password extension for human factors. Computers and Security, 1, 1 (1982), 54-56.
    • (1982) Computers and Security , vol.1 , Issue.1 , pp. 54-56
    • Porter, S.N.1
  • 49
    • 0024683697 scopus 로고
    • Password cracking: A game of wits
    • June
    • Seeley D. Password cracking: a game of wits. Communications of the ACM, 32, 6 (June 1989), 700-703.
    • (1989) Communications of the ACM , vol.32 , Issue.6 , pp. 700-703
    • Seeley, D.1
  • 51
    • 0242444735 scopus 로고
    • The Internet worm: Crisis and aftermath
    • June
    • Spafford, E. The Internet worm: crisis and aftermath. Communications of the ACM, 32, 6 (June 1989), 203-227.
    • (1989) Communications of the ACM , vol.32 , Issue.6 , pp. 203-227
    • Spafford, E.1
  • 52
    • 0023436806 scopus 로고
    • Identifying computer users with authentication devices (tokens)
    • Spender, J.C. Identifying computer users with authentication devices (tokens). Computers and Security, 6, 6 (1987), 385-395.
    • (1987) Computers and Security , vol.6 , Issue.6 , pp. 385-395
    • Spender, J.C.1
  • 54
    • 0024011325 scopus 로고
    • Stalking the willy hacker
    • May
    • Stoll, C. Stalking the willy hacker. Communications of the ACM, 31, 5 (May 1988), 484-497.
    • (1988) Communications of the ACM , vol.31 , Issue.5 , pp. 484-497
    • Stoll, C.1
  • 55
    • 0013417738 scopus 로고
    • Computer abuse and computer security: Update on an empirical study
    • Spring
    • Straub, D.W. Computer abuse and computer security: update on an empirical study. Security, Audit and Control Review, 4, 2 (Spring 1986), 21-31.
    • (1986) Security, Audit and Control Review , vol.4 , Issue.2 , pp. 21-31
    • Straub, D.W.1
  • 56
    • 55249123249 scopus 로고
    • Validating instruments in MIS research
    • June
    • Straub, D.W. Validating instruments in MIS research. MIS Quarterly, 13, 2 (June 1989), 146-169.
    • (1989) MIS Quarterly , vol.13 , Issue.2 , pp. 146-169
    • Straub, D.W.1
  • 57
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • March
    • Straub, D.W., and Nance, W.D. Discovering and disciplining computer abuse in organizations: a field study. MIS Quarterly, 14, 1 (March 1990), 45-60.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 59
    • 1642457840 scopus 로고    scopus 로고
    • The schoolboy spy
    • London March 29, section 5
    • Ungoed-Thomas, J. The schoolboy spy. Sunday Times (London) (March 29, 1998), section 5, 1-2.
    • (1998) Sunday Times , pp. 1-2
    • Ungoed-Thomas, J.1
  • 60
    • 0020589695 scopus 로고
    • Effective information system security with password controls
    • Wood, C.C. Effective information system security with password controls. Computers and Security, 2, 1 (1983), 5-10.
    • (1983) Computers and Security , vol.2 , Issue.1 , pp. 5-10
    • Wood, C.C.1
  • 61
    • 0000612396 scopus 로고    scopus 로고
    • Authenticating passwords over an insecure channel
    • Wu, T.C., and Sung, H.S. Authenticating passwords over an insecure channel. Computers and Security, 15, 5 (1996), 431-439.
    • (1996) Computers and Security , vol.15 , Issue.5 , pp. 431-439
    • Wu, T.C.1    Sung, H.S.2
  • 62
    • 11244303691 scopus 로고    scopus 로고
    • Taking command of Windows NT
    • November
    • Yager, T. Taking command of Windows NT. Unix Review, 15, 12 (November 1997), pp.33-42.
    • (1997) Unix Review , vol.15 , Issue.12 , pp. 33-42
    • Yager, T.1
  • 63
    • 0025545602 scopus 로고
    • Cognitive passwords: The key for easy access control
    • Zviran, M., and Haga, W.J. Cognitive passwords: the key for easy access control. Computers and Security, 9, 8 (1990), 723-736.
    • (1990) Computers and Security , vol.9 , Issue.8 , pp. 723-736
    • Zviran, M.1    Haga, W.J.2
  • 64
    • 0003369812 scopus 로고
    • Evaluating password techniques for multilevel authentication mechanisms
    • Zviran, M., and Haga, W.J. Evaluating password techniques for multilevel authentication mechanisms. Computer Journal, 36, 3 (1993), 227-237.
    • (1993) Computer Journal , vol.36 , Issue.3 , pp. 227-237
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.