메뉴 건너뛰기




Volumn 1, Issue , 2009, Pages 459-463

Password authentication from a human factors perspective: Results of a survey among end-users

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; ERGONOMICS; INFORMATION USE; NETWORK SECURITY; SURVEYS;

EID: 77951550003     PISSN: 10711813     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1518/107118109x12524441081983     Document Type: Conference Paper
Times cited : (52)

References (29)
  • 2
    • 77951567474 scopus 로고    scopus 로고
    • RSA Security Research Shows Volume of Business Passwords Overwhelming End Users and Hindering IT Security Efforts
    • Retrieved May 26, 2009, from
    • Bedford, M. A. (2006). RSA Security Research Shows Volume of Business Passwords Overwhelming End Users and Hindering IT Security Efforts. RSA Press Releases Retrieved May 26, 2009, from http://www.rsa.com/press-release.aspx?id= 7296
    • (2006) RSA Press Releases
    • Bedford, M.A.1
  • 4
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security, 11(3), 431.
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 5
    • 3242808612 scopus 로고    scopus 로고
    • Computer Security Institute San Francisco, CA: Computer Security Institute
    • Computer Security Institute (2007). 2007 CSI Computer Crime and Security Survey. San Francisco, CA: Computer Security Institute.
    • (2007) 2007 CSI Computer Crime and Security Survey
  • 6
    • 43049152961 scopus 로고    scopus 로고
    • Theory and measurement of working memory capacity limits
    • B. H. Ross (Ed.), Amsterdam: Elsevier B.V.
    • Cowan, N., Morey, C. C., Chen, Z., , Gilchrist, A. L., & Saults, J. S. (2008). Theory and measurement of working memory capacity limits. In B. H. Ross (Ed.), The Psychology of Learning and Motivation (Vol. 49, pp. 49-104). Amsterdam: Elsevier B.V.
    • (2008) The Psychology of Learning and Motivation , vol.49 , pp. 49-104
    • Cowan, N.1    Morey, C.C.2    Chen, Z.3    Gilchrist, A.L.4    Saults, J.S.5
  • 8
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.D.1
  • 11
    • 0003532271 scopus 로고
    • UNIX Password Security - Ten Years Later
    • Feldmeier, D. C., & Karn, P. R. (1989). UNIX Password Security - Ten Years Later. Computer Science, 435, 44-63.
    • (1989) Computer Science , vol.435 , pp. 44-63
    • Feldmeier, D.C.1    Karn, P.R.2
  • 12
    • 19944387279 scopus 로고    scopus 로고
    • Why users cannot use security
    • Furnell, S. (2005). Why users cannot use security. Computers & Security, 24, 274-279.
    • (2005) Computers & Security , vol.24 , pp. 274-279
    • Furnell, S.1
  • 14
    • 0014781338 scopus 로고
    • How we remember what we see
    • Haber, R. N. (1970). How we remember what we see. Scientific American, 222(5), 104-112.
    • (1970) Scientific American , vol.222 , Issue.5 , pp. 104-112
    • Haber, R.N.1
  • 15
    • 77951518080 scopus 로고    scopus 로고
    • The use of focus groups to examine human factors in computer and information security
    • L. I. Sznelwar, F. L. Mascia & U. B. Montedo (Eds.), Santa Monica, CA: IEA Press
    • Hoonakker, P. L. T., Carayon, P., Deb, J., El Desoki, R., & Veeramani, R. (2008). The use of focus groups to examine human factors in computer and information security. In L. I. Sznelwar, F. L. Mascia & U. B. Montedo (Eds.), Human Factors in Organizational Design and Management - IX (pp. 377-382). Santa Monica, CA: IEA Press.
    • (2008) Human Factors in Organizational Design and Management , vol.9 , pp. 377-382
    • Hoonakker, P.L.T.1    Carayon, P.2    Deb, J.3    El Desoki, R.4    Veeramani, R.5
  • 16
    • 7744225382 scopus 로고    scopus 로고
    • Top 10 Security Mistakes
    • Retrieved Nov 13, 2008, from
    • Horowitz, A. (2001). Top 10 Security Mistakes. Computerworld Retrieved Nov 13, 2008, from http://www.computerworld.com/securitytopics/security/story/0, 10801,61986,00.html
    • (2001) Computerworld
    • Horowitz, A.1
  • 18
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • Paper presented at the
    • Klein, D. V. (1990). Foiling the cracker: a survey of, and improvements to, password security. Paper presented at the 2nd USENIX Workshop Security.
    • (1990) 2nd USENIX Workshop Security
    • Klein, D.V.1
  • 22
    • 0018543411 scopus 로고
    • PASSWORD SECURITY: A CASE HISTORY
    • DOI 10.1145/359168.359172
    • Morris, R., & Thompson, K. (1979). Password Security: A Case History. Communications of the ACM, 22(11), 594-597. (Pubitemid 10431335)
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 23
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • O'Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12), 2021-2040.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • O'Gorman, L.1
  • 24
    • 84855308630 scopus 로고    scopus 로고
    • Ponemon Institute LLC Elk Rapids, MI: Ponemon Institute LLC
    • Ponemon Institute LLC (2006). 2006 Annual Study: Cost of a Data Breach. Elk Rapids, MI: Ponemon Institute LLC.
    • (2006) 2006 Annual Study: Cost of a Data Breach
  • 25
    • 35348885452 scopus 로고    scopus 로고
    • Evaluating Authentication Mechanisms
    • L. Cranor & S. Garfinkel (Eds.)
    • Renaud, K. V. (2005). Evaluating Authentication Mechanisms. In L. Cranor & S. Garfinkel (Eds.), Security and Usability.
    • (2005) Security and Usability
    • Renaud, K.V.1
  • 26
    • 56849108466 scopus 로고    scopus 로고
    • MySpace Passwords Aren't so Dumb
    • Retrieved Nov 12, 2008, from
    • Schneier, B. (2006). MySpace Passwords Aren't So Dumb. Wired Retrieved Nov 12, 2008, from http://www.wired.com/politics/security/commentary/ securitymatters/2006/12/72300
    • (2006) Wired
    • Schneier, B.1
  • 27
    • 49949146625 scopus 로고
    • Recognition memory for words, sentences, and pictures
    • Shepard, R. N. (1967). Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior, 6(1), 156-163.
    • (1967) Journal of Verbal Learning and Verbal Behavior , vol.6 , Issue.1 , pp. 156-163
    • Shepard, R.N.1
  • 28
    • 57849096551 scopus 로고    scopus 로고
    • User perceptions of security, convenience and usability for ebanking authentication tokens
    • Weir, C. S., Douglas, G., Carruthers, M., & Jack, M. (2009). User perceptions of security, convenience and usability for ebanking authentication tokens. Computers & Security, 28(1-2), 47-62.
    • (2009) Computers & Security , vol.28 , Issue.1-2 , pp. 47-62
    • Weir, C.S.1    Douglas, G.2    Carruthers, M.3    Jack, M.4
  • 29


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.