메뉴 건너뛰기




Volumn 65, Issue 8, 2007, Pages 744-757

Improving password security and memorability to protect personal and organizational information

Author keywords

Authentication; Information security; Passwords

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY OF DATA; USER INTERFACES;

EID: 34249733184     PISSN: 10715819     EISSN: 10959300     Source Type: Journal    
DOI: 10.1016/j.ijhcs.2007.03.007     Document Type: Article
Times cited : (148)

References (37)
  • 1
    • 34249659475 scopus 로고    scopus 로고
    • Privacy issues and human-computer interaction
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly, Sebastopol, CA
    • Ackerman M.S., and Mainwaring S.D. Privacy issues and human-computer interaction. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly, Sebastopol, CA 381-399
    • (2005) Security and Usability , pp. 381-399
    • Ackerman, M.S.1    Mainwaring, S.D.2
  • 3
    • 34249657866 scopus 로고    scopus 로고
    • Preface
    • Bidgoli H. (Ed), Wiley, Hoboken, NJ
    • Bidgoli H. Preface. In: Bidgoli H. (Ed). The Internet Encyclopedia vol. 1 (2004), Wiley, Hoboken, NJ XXIII-XXV
    • (2004) The Internet Encyclopedia , vol.1
    • Bidgoli, H.1
  • 4
    • 34249654046 scopus 로고    scopus 로고
    • Bidgoli, H. (Ed.), 2006. Handbook of Information Security. Wiley, Hoboken, NJ.
  • 5
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • Bishop M., and Klein D.V. Improving system security via proactive password checking. Computers and Security 14 (1995) 233-249
    • (1995) Computers and Security , vol.14 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 7
    • 0017660928 scopus 로고
    • Memory for the pragmatic implications of sentences
    • Brewer W. Memory for the pragmatic implications of sentences. Memory and Cognition 5 (1977) 673-678
    • (1977) Memory and Cognition , vol.5 , pp. 673-678
    • Brewer, W.1
  • 12
    • 11144294785 scopus 로고    scopus 로고
    • Processing strategies and the generation effect: implications for making a better reader
    • de Winstanley P.A., and Bjork E.L. Processing strategies and the generation effect: implications for making a better reader. Memory & Cognition 32 (2004) 945-955
    • (2004) Memory & Cognition , vol.32 , pp. 945-955
    • de Winstanley, P.A.1    Bjork, E.L.2
  • 13
    • 0036053761 scopus 로고    scopus 로고
    • Choosing passwords: security and human factors
    • Gehringer E.F. Choosing passwords: security and human factors. Proceedings of IEEE 2002 (2002) 369-373
    • (2002) Proceedings of IEEE , vol.2002 , pp. 369-373
    • Gehringer, E.F.1
  • 15
    • 34249658392 scopus 로고    scopus 로고
    • Hilton, R., 2006. Password change policies. Retrieved from 〈http://blog.air0day.com/2006/04/27/password-change-policies/〉 . Downloaded on May 23, 2006.
  • 17
    • 84955753471 scopus 로고
    • Effects of elaboration of processing at encoding and retrieval: trace distinctiveness and recovery of initial context
    • Cermak L.S., and Craik F.I.M. (Eds), Lawrence Erlbaum Associates, Hillsdale, NJ
    • Jacoby L.L., and Craik F.I.M. Effects of elaboration of processing at encoding and retrieval: trace distinctiveness and recovery of initial context. In: Cermak L.S., and Craik F.I.M. (Eds). Levels of Processing in Human Memory (1979), Lawrence Erlbaum Associates, Hillsdale, NJ 1-21
    • (1979) Levels of Processing in Human Memory , pp. 1-21
    • Jacoby, L.L.1    Craik, F.I.M.2
  • 18
    • 0040231044 scopus 로고
    • Foiling the cracker: a survey of, and improvements to, password security
    • Klein D. Foiling the cracker: a survey of, and improvements to, password security. Proceedings of the Second USENIX Security Workshop (1990) 5-14
    • (1990) Proceedings of the Second USENIX Security Workshop , pp. 5-14
    • Klein, D.1
  • 19
    • 34249680201 scopus 로고    scopus 로고
    • Leyden, J., 2003. Office workers give away passwords for a cheap pen. The Register. Available on-line at 〈http://www.theregister.co.uk/2003/04/18/office_workers_give_away_p asswords/〉. Downloaded May 21, 2006.
  • 21
    • 0001777285 scopus 로고
    • Levels of processing, context, and facilitation of pronunciation
    • Parkin A.J. Levels of processing, context, and facilitation of pronunciation. Acta Psychologia 55 (1984) 19-29
    • (1984) Acta Psychologia , vol.55 , pp. 19-29
    • Parkin, A.J.1
  • 23
    • 34249682647 scopus 로고    scopus 로고
    • Posey, B.M., 2003. Recover lost passwords with these tricks and tools. Available online at 〈http://articles.techrepublic.com.com/5100-6329-5078287.html〉. Retrieved on December 10, 2006.
  • 25
    • 34249681841 scopus 로고    scopus 로고
    • Rainbow Technologies, 2003. Password survey results (June 2003). Retrieved November 14, 2005, from 〈http://mktg.rainbow.com/mk/get/pwsurvey03〉.
  • 26
    • 0142136617 scopus 로고    scopus 로고
    • Dual coding versus relational processing in memory for concrete and abstract words
    • Richardson J.T.E. Dual coding versus relational processing in memory for concrete and abstract words. European Journal of Cognitive Psychology 15 (2003) 481-509
    • (2003) European Journal of Cognitive Psychology , vol.15 , pp. 481-509
    • Richardson, J.T.E.1
  • 27
    • 0024768109 scopus 로고
    • Passwords in use in a university timesharing environment
    • Riddle B.L., Miron M.S., and Semo J.A. Passwords in use in a university timesharing environment. Computers and Security 8 (1989) 569-579
    • (1989) Computers and Security , vol.8 , pp. 569-579
    • Riddle, B.L.1    Miron, M.S.2    Semo, J.A.3
  • 28
    • 84993728927 scopus 로고    scopus 로고
    • The power of testing memory: basic research and implications for educational practice
    • Roediger Jr. H.L., and Karpicke J. The power of testing memory: basic research and implications for educational practice. Perspectives on Psychological Science 1 (2006) 181-210
    • (2006) Perspectives on Psychological Science , vol.1 , pp. 181-210
    • Roediger Jr., H.L.1    Karpicke, J.2
  • 29
    • 34249707839 scopus 로고    scopus 로고
    • RSA Security, 2005. RSA security survey reveals multiple passwords creating security risks and end user frustration. Available on-line at 〈WWW.rsasecurity.com〉. Downloaded on May 7, 2006.
  • 30
    • 34249718910 scopus 로고    scopus 로고
    • SafeNet, 2005. 2004 annual password survey results. Available on-line at 〈www.safenet-inc.com〉. Downloaded on May 21, 2006.
  • 31
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link'-a human/computer interaction approach to usable and effective security
    • Sasse M.A., Brostoff S., and Weirich D. Transforming the 'weakest link'-a human/computer interaction approach to usable and effective security. BT Technology Journal 19 (2001) 122-131
    • (2001) BT Technology Journal , vol.19 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 32
    • 0035149763 scopus 로고    scopus 로고
    • Usability and security: an appraisal of usability issues in information security methods
    • Schultz E.E., Proctor R.W., Lien M.-C., and Salvendy G. Usability and security: an appraisal of usability issues in information security methods. Computers & Security 20 (2001) 620-634
    • (2001) Computers & Security , vol.20 , pp. 620-634
    • Schultz, E.E.1    Proctor, R.W.2    Lien, M.-C.3    Salvendy, G.4
  • 33
    • 34249690691 scopus 로고    scopus 로고
    • Web security and privacy
    • Proctor R.W., and Vu K.-P.L. (Eds), Lawrence Erlbaum Associates, Mahwah, NJ
    • Schultz E.E. Web security and privacy. In: Proctor R.W., and Vu K.-P.L. (Eds). Handbook of Human Factors in Web Design (2005), Lawrence Erlbaum Associates, Mahwah, NJ 613-625
    • (2005) Handbook of Human Factors in Web Design , pp. 613-625
    • Schultz, E.E.1
  • 35
    • 34249698104 scopus 로고    scopus 로고
    • Tari, F., Ozok, A.A., Holden, S.H., 2006. Password management, mnemonics, and mother's maiden names: a comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the Second Symposium on Usable Privacy and Security SOUPS '06. ACM Press, New York.
  • 36
    • 34249720525 scopus 로고    scopus 로고
    • Solutions to many of our security problems already exist, so why are we still so vulnerable?
    • Viega J. Solutions to many of our security problems already exist, so why are we still so vulnerable?. Queue (2005) 41-50
    • (2005) Queue , pp. 41-50
    • Viega, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.