메뉴 건너뛰기




Volumn 18, Issue 2, 2009, Pages 165-176

Improving multiple-password recall: An empirical study

Author keywords

Authentication; Information security; Memorability; Memory theory; Passwords

Indexed keywords


EID: 67650156801     PISSN: 0960085X     EISSN: 14769344     Source Type: Journal    
DOI: 10.1057/ejis.2009.9     Document Type: Article
Times cited : (75)

References (49)
  • 1
    • 34547137028 scopus 로고    scopus 로고
    • Bonferroni and Sidak corrections for multiple comparisons
    • SALKIND NJ, Ed, pp, Sage, Thousand Oaks, CA
    • ABDI H (2007) Bonferroni and Sidak corrections for multiple comparisons. In Encyclopedia of Measurement and Statistics (SALKIND NJ, Ed), pp 103-107, Sage, Thousand Oaks, CA.
    • (2007) Encyclopedia of Measurement and Statistics , pp. 103-107
    • ABDI, H.1
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • ADAMS Aand SASSE MA (1999) Users are not the enemy. Communications of the ACM 42(12), 41-46.
    • ADAMS Aand SASSE MA (1999) Users are not the enemy. Communications of the ACM 42(12), 41-46.
  • 3
    • 77956946453 scopus 로고
    • Human memory: A proposed system and its control processes
    • SPENCE KW and SPENCE JT, Eds, pp, Academic Press, New York
    • ATKINSON RC and SHIFFRIN RM (1968) Human memory: a proposed system and its control processes. In The Psychology of Learning and Motivation (SPENCE KW and SPENCE JT, Eds), pp 89-195, Academic Press, New York.
    • (1968) The Psychology of Learning and Motivation , pp. 89-195
    • ATKINSON, R.C.1    SHIFFRIN, R.M.2
  • 5
    • 0012115918 scopus 로고
    • An analysis of research methodologies
    • MCFARLAND FW, Ed, pp, HBS Press, Boston
    • BENBASAT I (1984) An analysis of research methodologies. In The Information Systems Research Challenge (MCFARLAND FW, Ed), pp 47-85, HBS Press, Boston.
    • (1984) The Information Systems Research Challenge , pp. 47-85
    • BENBASAT, I.1
  • 6
    • 67650189565 scopus 로고    scopus 로고
    • BISHOP M (1990) A proactive password checker. Technical Report PCS- TR90-152. [WWW document] http://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa. gov/19920018383-1992018383.pdf.
    • BISHOP M (1990) A proactive password checker. Technical Report PCS- TR90-152. [WWW document] http://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa. gov/19920018383-1992018383.pdf.
  • 8
    • 67650124268 scopus 로고    scopus 로고
    • The good and not so good of enforcing password composition rules
    • CAMPBELL J, KLEEMAN Dand MA W (2007) The good and not so good of enforcing password composition rules. Information Systems Security 16(1), 2-8.
    • (2007) Information Systems Security , vol.16 , Issue.1 , pp. 2-8
    • CAMPBELL, J.1    KLEEMAN2    Dand MA, W.3
  • 10
    • 18544374846 scopus 로고    scopus 로고
    • Evaluation of the human impact of password authentication practices on information security
    • CARSTENS DS, MCCAULEY-BELL PR, MALONE LC and DEMARA RF (2004) Evaluation of the human impact of password authentication practices on information security. Information Science Journal 7(1), 67-85.
    • (2004) Information Science Journal , vol.7 , Issue.1 , pp. 67-85
    • CARSTENS, D.S.1    MCCAULEY-BELL, P.R.2    MALONE, L.C.3    DEMARA, R.F.4
  • 15
    • 12344322521 scopus 로고    scopus 로고
    • The demise of short-term memory revisited: Empirical and computational investigations of recency effects
    • DAVELAAR EJ, GOSHEN-GOTTSTEIN Y, ASHKENAZI A, HAARMANN HJ and USHER M (2005) The demise of short-term memory revisited: empirical and computational investigations of recency effects. Psychological Review 112(1), 3-42.
    • (2005) Psychological Review , vol.112 , Issue.1 , pp. 3-42
    • DAVELAAR, E.J.1    GOSHEN-GOTTSTEIN, Y.2    ASHKENAZI, A.3    HAARMANN, H.J.4    USHER, M.5
  • 16
    • 67650189548 scopus 로고    scopus 로고
    • DELOITTE (2007) The 2007 technology, media, and telecommunications security survey. [WWW document] http://www.deloitte.com/dtt/ cda/doc/content/dtt-tmt-securitysurvey2007.pdf. DENNIS Aand VALACICH J (2001) Conducting research in information systems. Communications of the AIS 7(5), 1-41.
    • DELOITTE (2007) The 2007 technology, media, and telecommunications security survey. [WWW document] http://www.deloitte.com/dtt/ cda/doc/content/dtt-tmt-securitysurvey2007.pdf. DENNIS Aand VALACICH J (2001) Conducting research in information systems. Communications of the AIS 7(5), 1-41.
  • 18
    • 34250729756 scopus 로고    scopus 로고
    • GAW Sand FELTEN EW (2006) Password management strategies for online accounts. In Proceedings of the 2nd Symposium on Usable Privacy and Security, pp 44-55, ACM Press, New York, USA.
    • GAW Sand FELTEN EW (2006) Password management strategies for online accounts. In Proceedings of the 2nd Symposium on Usable Privacy and Security, pp 44-55, ACM Press, New York, USA.
  • 19
    • 0036053761 scopus 로고    scopus 로고
    • GEHRINGER EF (2002) Choosing passwords: security and human factors. In Proceedings of 2002 International Symposium on Technology and Society,(HERKERT JR, Ed) pp 369-373, IEEE Computer Society, Washington, DC.
    • GEHRINGER EF (2002) Choosing passwords: security and human factors. In Proceedings of 2002 International Symposium on Technology and Society,(HERKERT JR, Ed) pp 369-373, IEEE Computer Society, Washington, DC.
  • 20
    • 67650143950 scopus 로고    scopus 로고
    • Remembering multiple passwords by way of minimal- feedback hints: Replication and further analysis
    • KJELDSKOV J, SKOV MB and STAGE J, Eds pp, Aalborg University, Aalborg, Denmark
    • HERTZUM M (2004) Remembering multiple passwords by way of minimal- feedback hints: replication and further analysis. in Proceedings of the Fourth Danish Human-Computer Interaction Research Symposium, (KJELDSKOV J, SKOV MB and STAGE J, Eds) pp 21-24, Aalborg University, Aalborg, Denmark.
    • (2004) Proceedings of the Fourth Danish Human-Computer Interaction Research Symposium , pp. 21-24
    • HERTZUM, M.1
  • 21
    • 33646671233 scopus 로고    scopus 로고
    • Minimal-feedback hints for remembering passwords
    • HERTZUM M (2006) Minimal-feedback hints for remembering passwords. Interactions 13(3), 38-40.
    • (2006) Interactions , vol.13 , Issue.3 , pp. 38-40
    • HERTZUM, M.1
  • 22
    • 67650153291 scopus 로고    scopus 로고
    • INFORMATIONWEEK (2007) 2007 InformationWeek/Accenture Global information security survey. [WWW document] http://www.informationweek.com/ whitepaper/Security/Privacy/2007-informationweek/accenture-global-information- wp1213826038953?articleID=21800009.
    • INFORMATIONWEEK (2007) 2007 InformationWeek/Accenture Global information security survey. [WWW document] http://www.informationweek.com/ whitepaper/Security/Privacy/2007-informationweek/accenture-global-information- wp1213826038953?articleID=21800009.
  • 24
    • 67650126221 scopus 로고    scopus 로고
    • LU Band TWIDALE MB (2003) Managing multiple passwords and multiple logins: MiFA minimal-feedback hints for remote authentication. In Proceedings of the IFIP INTERACT Conference,(RAUTERBERG M, MENOZZI, Mand WESSON J, Eds) pp 821-824, IOS Press, Zurich.
    • LU Band TWIDALE MB (2003) Managing multiple passwords and multiple logins: MiFA minimal-feedback hints for remote authentication. In Proceedings of the IFIP INTERACT Conference,(RAUTERBERG M, MENOZZI, Mand WESSON J, Eds) pp 821-824, IOS Press, Zurich.
  • 25
    • 51549085237 scopus 로고    scopus 로고
    • MASSAD Nand BEACHBOARD J (2008) A taxonomy of service failures in electronic retailing. In Proceedings of the 41st Hawaii International Conference on System Sciences, IEEE Computer Society, Washington, DC.
    • MASSAD Nand BEACHBOARD J (2008) A taxonomy of service failures in electronic retailing. In Proceedings of the 41st Hawaii International Conference on System Sciences, IEEE Computer Society, Washington, DC.
  • 26
    • 0002181702 scopus 로고
    • Dilemmatics: The study of research choices and dilemmas
    • MCGRATH JE, MARTIN Jand KULKA RA, Eds, pp, Sage, Beverly Hills, CA
    • MCGRATH JE (1982) Dilemmatics: the study of research choices and dilemmas. In Judgment Calls in Research (MCGRATH JE, MARTIN Jand KULKA RA, Eds), pp 69-102, Sage, Beverly Hills, CA.
    • (1982) Judgment Calls in Research , pp. 69-102
    • MCGRATH, J.E.1
  • 27
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • MILLER GA (1956) The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review 63, 81-97.
    • (1956) Psychological Review , vol.63 , pp. 81-97
    • MILLER, G.A.1
  • 28
    • 85011548130 scopus 로고    scopus 로고
    • MULLIGAN Jand ELBIRT AJ (2005) Desktop security and usability trade-offs: an evaluation of password management systems. Information Systems Security 14(2), 10-19.
    • MULLIGAN Jand ELBIRT AJ (2005) Desktop security and usability trade-offs: an evaluation of password management systems. Information Systems Security 14(2), 10-19.
  • 29
    • 67650130450 scopus 로고    scopus 로고
    • 10 most common passwords, WWW document, 2817,2113976,00.asp, 8 May
    • PC MAGAZINE (2007) 10 most common passwords. [WWW document] http://www.pcmag.com/article2/0,2817,2113976,00.asp, 8 May.
    • (2007) PC MAGAZINE
  • 34
    • 0038578769 scopus 로고    scopus 로고
    • Spacing and repetition effects in human memory: Application of the sAM model
    • RAAIJMAKERS J (2003) Spacing and repetition effects in human memory: application of the sAM model. Cognitive Science: A Multidisciplinary Journal 27(3), 431-452.
    • (2003) Cognitive Science: A Multidisciplinary Journal , vol.27 , Issue.3 , pp. 431-452
    • RAAIJMAKERS, J.1
  • 35
    • 39349101677 scopus 로고    scopus 로고
    • Password security: What users know and what they actually do
    • WWW document] http://psychology.wichita.edu/surl/usabilitynews/81/Passwords.asp
    • RILEY S (2006) Password security: what users know and what they actually do. Usability News 8(1). [WWW document] http://psychology.wichita.edu/surl/usabilitynews/81/Passwords.asp.
    • (2006) Usability News , vol.8 , Issue.1
    • RILEY, S.1
  • 36
    • 67650116851 scopus 로고    scopus 로고
    • RSA (2005) RSA security survey reveals multiple passwords creating security risks and end user frustration. [WWW document] http://www.rsa.com/ press-release.aspx?id = 6095.
    • RSA (2005) RSA security survey reveals multiple passwords creating security risks and end user frustration. [WWW document] http://www.rsa.com/ press-release.aspx?id = 6095.
  • 37
    • 67650174073 scopus 로고    scopus 로고
    • RSA (2006a) RSA security research shows of business passwords overwhelming end users and hindering iT security efforts. [WWW.document] http://www.rsa.com/press-release.aspx?id = 7296.
    • RSA (2006a) RSA security research shows volume of business passwords overwhelming end users and hindering iT security efforts. [WWW.document] http://www.rsa.com/press-release.aspx?id = 7296.
  • 38
    • 67650126226 scopus 로고    scopus 로고
    • RSA (2006b) Enterprise single sign-on solutions reduce IT helpdesk calls but raise concern amongst security experts, reveals RSA security. [WWW document] http://www.rsa.com/press-release.aspx?id = 6903.
    • RSA (2006b) Enterprise single sign-on solutions reduce IT helpdesk calls but raise concern amongst security experts, reveals RSA security. [WWW document] http://www.rsa.com/press-release.aspx?id = 6903.
  • 39
    • 33751577351 scopus 로고
    • Analysis of rehearsal processes in free recall
    • RUNDUS DJ (1971) Analysis of rehearsal processes in free recall. Journal of Experimental Psychology 89(1), 63-77.
    • (1971) Journal of Experimental Psychology , vol.89 , Issue.1 , pp. 63-77
    • RUNDUS, D.J.1
  • 40
    • 0026047868 scopus 로고
    • Can we have a distinctive theory of memory?
    • SCHMIDT SR (1991) Can we have a distinctive theory of memory? Memory & Cognition 19(6), 523-542.
    • (1991) Memory & Cognition , vol.19 , Issue.6 , pp. 523-542
    • SCHMIDT, S.R.1
  • 41
    • 37049246450 scopus 로고
    • How big is a chunk?
    • SIMON HA (1974), How big is a chunk? Science 183(4124), 482-488.
    • (1974) Science , vol.183 , Issue.4124 , pp. 482-488
    • SIMON, H.A.1
  • 44
    • 25144498396 scopus 로고    scopus 로고
    • TALMI D, GRADY C, GOSHEN-GOTTSTEIN Yand MOSCOVITCH M (2005) Neuroimaging the serial position curve: a test of single-store versus dual-store models. Psychological Science 16(9), 716-723.
    • TALMI D, GRADY C, GOSHEN-GOTTSTEIN Yand MOSCOVITCH M (2005) Neuroimaging the serial position curve: a test of single-store versus dual-store models. Psychological Science 16(9), 716-723.
  • 46
    • 2642569127 scopus 로고    scopus 로고
    • Introducing the check-off password systems (COPS): An advancement in user authentication methods and information security
    • WARKENTIN M, DAVIS Kand BEKKERING E (2004) Introducing the check-off password systems (COPS): an advancement in user authentication methods and information security. Journal of Organizational and End User Computing 16(3), 41-58.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 41-58
    • WARKENTIN, M.1    DAVIS2    Kand BEKKERING, E.3
  • 49
    • 67650174072 scopus 로고    scopus 로고
    • ZVIRAN Mand ERLICH Z (2006) Identification and authentication: technology and implementation issues. Communications of the Association for Information Systems 17(1), 90-105.
    • ZVIRAN Mand ERLICH Z (2006) Identification and authentication: technology and implementation issues. Communications of the Association for Information Systems 17(1), 90-105.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.