메뉴 건너뛰기




Volumn 29, Issue 3, 2010, Pages 233-244

The psychology of password management: A tradeoff between security and convenience

Author keywords

Internet security; Motivation; Password management; Password security; User management

Indexed keywords

INTERNET SECURITY; MANAGEMENT PRACTICES; ON-LINE BANKING; PASSWORD MANAGEMENT; PASSWORD SECURITY; PASSWORD SELECTION; TECHNOLOGICAL ADVANCES; TIME FRAME; USER MANAGEMENT;

EID: 77951996290     PISSN: 0144929X     EISSN: 13623001     Source Type: Journal    
DOI: 10.1080/01449290903121386     Document Type: Article
Times cited : (129)

References (32)
  • 1
    • 33845275228 scopus 로고    scopus 로고
    • Who are the victims of identity theft? The effect of demographics
    • Anderson, K. B., 2006. Who are the victims of identity theft? The effect of demographics. Journal of Public Policy and Marketing, 25 (2), 160-171.
    • (2006) Journal of Public Policy and Marketing , vol.25 , Issue.2 , pp. 160-171
    • Anderson, K.B.1
  • 2
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • Anderson, R. and Moore, T., 2006. The economics of information security. Science, 314, 610-613.
    • (2006) Science , vol.314 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 4
    • 0023020183 scopus 로고
    • The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
    • Baron, R. and Kenny, D., 1986. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 51 (6), 1173-1182.
    • (1986) Journal of Personality and Social Psychology , vol.51 , Issue.6 , pp. 1173-1182
    • Baron, R.1    Kenny, D.2
  • 6
    • 33846367309 scopus 로고    scopus 로고
    • People - often the weakest link in security, but one of the best places to start: Without awareness and training, security compliance is not possible
    • Bresz, F. P., 2004. People - often the weakest link in security, but one of the best places to start: without awareness and training, security compliance is not possible. Journal of Health Care Compliance, 6 (4), 57-61.
    • (2004) Journal of Health Care Compliance , vol.6 , Issue.4 , pp. 57-61
    • Bresz, F.P.1
  • 7
    • 77952001229 scopus 로고    scopus 로고
    • Controlling authentication in a health care environment: Multi-factor mechanisms may be one option for your organization
    • Bresz, F. P. and Villacres, C., 2004. Controlling authentication in a health care environment: multi-factor mechanisms may be one option for your organization. Journal of Health Care Compliance, 6 (6), 52-54.
    • (2004) Journal of Health Care Compliance , vol.6 , Issue.6 , pp. 52-54
    • Bresz, F.P.1    Villacres, C.2
  • 8
    • 77951662387 scopus 로고    scopus 로고
    • User behaviours associated with password security and management
    • Bryant, K. and Campbell, J., 2006. User behaviours associated with password security and management. Australasian Journal of Information System, 14 (1), 81-100.
    • (2006) Australasian Journal of Information System , vol.14 , Issue.1 , pp. 81-100
    • Bryant, K.1    Campbell, J.2
  • 9
    • 33846047871 scopus 로고    scopus 로고
    • Unrealistic optimism in internet events
    • Campbell, J., et al., 2007. Unrealistic optimism in internet events. Computers in Human Behaviour, 23, 1273-1284.
    • (2007) Computers in Human Behaviour , vol.23 , pp. 1273-1284
    • Campbell, J.1
  • 11
    • 77951986850 scopus 로고    scopus 로고
    • Security expert: User education is pointless
    • Online. Available from
    • Evers, J., 2006. Security expert: user education is pointless. CNet News [Online]. Available from: http://news.com. com/2102-7350-3-6125213.html
    • (2006) CNet News
    • Evers, J.1
  • 12
    • 2542595586 scopus 로고    scopus 로고
    • The pros and cons of temporally near and distant action
    • Eyal, T., et al., 2004. The pros and cons of temporally near and distant action. Journal of Personality and Social Psychology, 86 (6), 781-795.
    • (2004) Journal of Personality and Social Psychology , vol.86 , Issue.6 , pp. 781-795
    • Eyal, T.1
  • 13
    • 33644773926 scopus 로고    scopus 로고
    • Is that authentic or artificial? Understanding consumer perceptions of risk in e-service encounters
    • Featherman, M. S., Valacich, J. S., and Wells, J. D., 2006. Is that authentic or artificial? Understanding consumer perceptions of risk in e-service encounters. Information Systems Journal, 16, 107-134.
    • (2006) Information Systems Journal , vol.16 , pp. 107-134
    • Featherman, M.S.1    Valacich, J.S.2    Wells, J.D.3
  • 14
    • 32444433117 scopus 로고    scopus 로고
    • The challenges of understanding and using security: A survey of end-users
    • Furnell, S., Jusoh, A., and Katsabas, D., 2006. The challenges of understanding and using security: a survey of end-users. Computers & Security, 25, 27-35.
    • (2006) Computers & Security , vol.25 , pp. 27-35
    • Furnell, S.1    Jusoh, A.2    Katsabas, D.3
  • 15
    • 35248846782 scopus 로고    scopus 로고
    • Password management strategies for online accounts
    • July, Pittsburgh, PA, USA
    • Gaw, S. and Felten, E. W., 2006. Password management strategies for online accounts. In: Symposium on Usable Privacy and Security (SOUPS), July 12-14, Pittsburgh, PA, USA.
    • (2006) Symposium on Usable Privacy and Security (SOUPS) , pp. 12-14
    • Gaw, S.1    Felten, E.W.2
  • 17
    • 33746363214 scopus 로고    scopus 로고
    • From the editor: Passwords and passion
    • July/Aug
    • Harrison, W., 2006. From the editor: passwords and passion. IEEE Software, July/Aug. 5-7.
    • (2006) IEEE Software , pp. 5-7
    • Harrison, W.1
  • 19
    • 77951996550 scopus 로고    scopus 로고
    • Four in ten security staffers write down passwords
    • June 13
    • Millman, R., 2006. Four in ten security staffers write down passwords. SC Magazine, June 13.
    • (2006) SC Magazine
    • Millman, R.1
  • 20
    • 77951999292 scopus 로고    scopus 로고
    • Googling for ATM masters passwords
    • 21 Sept
    • Naraine, R., 2006. Googling for ATM masters passwords. eWeek.com, 21 Sept.
    • (2006) EWeek.com
    • Naraine, R.1
  • 22
    • 77951984499 scopus 로고    scopus 로고
    • How security breaches impact your brand
    • 31 Oct
    • Powell, J., 2006. How security breaches impact your brand. Enterprise Systems, 31 Oct.
    • (2006) Enterprise Systems
    • Powell, J.1
  • 25
    • 74049121475 scopus 로고    scopus 로고
    • Online. Available from:, Accessed 18 January
    • Schneier, B., 2007b. The psychology of security [Online]. Available from: http://www.schneier.com/essay-155.html [Accessed 18 January 2008].
    • (2007) The Psychology of Security
    • Schneier, B.1
  • 26
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • Stanton, J., et al., 2005. Analysis of end user security behaviors. Computers & Security, 24, 124-133.
    • (2005) Computers & Security , vol.24 , pp. 124-133
    • Stanton, J.1
  • 28
  • 29
    • 77951987149 scopus 로고    scopus 로고
    • Study: Weak passwords really do help hackers
    • 7 February
    • Weiss, T., 2007. Study: weak passwords really do help hackers. Computerworld, 7 February.
    • (2007) Computerworld
    • Weiss, T.1
  • 30
    • 77951984848 scopus 로고    scopus 로고
    • Online. Available from:, Accessed 24 October 2006
    • Wilson, T., 2006. It's the people, stupid [Online]. Available from: http://www.darkreading.com/document.asp?doc-id=108163 [Accessed 24 October 2006].
    • (2006) It's the People, Stupid
    • Wilson, T.1
  • 32
    • 27944510130 scopus 로고    scopus 로고
    • Perceived security determinants in e-commerce among Turkish university students
    • Yenisey, M., Ozok, A., and Salvendy, G., 2005. Perceived security determinants in e-commerce among Turkish university students. Behaviour & Information Technology, 24 (4), 259-274.
    • (2005) Behaviour & Information Technology , vol.24 , Issue.4 , pp. 259-274
    • Yenisey, M.1    Ozok, A.2    Salvendy, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.