메뉴 건너뛰기




Volumn 30, Issue 3, 2011, Pages 379-388

Impact of restrictive composition policy on user password choices

Author keywords

computer security; password authentication; password composition policy

Indexed keywords

COMPUTER RESOURCES; COMPUTER SECURITY; MANAGEMENT PRACTICES; PASSWORD AUTHENTICATION; PASSWORD COMPOSITION POLICY; PASSWORD SECURITY; PASSWORD-BASED SYSTEMS; PRIMARY FUNCTIONS; USER AUTHENTICATION; USER BEHAVIOUR;

EID: 79956068379     PISSN: 0144929X     EISSN: 13623001     Source Type: Journal    
DOI: 10.1080/0144929X.2010.492876     Document Type: Article
Times cited : (40)

References (36)
  • 1
    • 2642549662 scopus 로고    scopus 로고
    • Computer security and risky computer practices: A rational choice perspective
    • Aytes, K. and Connolly, T., 2004. Computer security and risky computer practices: a rational choice perspective. Journal of Organizational and End-User Computing, 16 (3), 22-40.
    • (2004) Journal of Organizational and End-User Computing , vol.16 , Issue.3 , pp. 22-40
    • Aytes, K.1    Connolly, T.2
  • 3
    • 77951662387 scopus 로고    scopus 로고
    • User behaviours associated with password security and management
    • Bryant, K. and Campbell, J., 2006. User behaviours associated with password security and management. Australasian Journal of Information Systems, 14 (1), 81-100.
    • (2006) Australasian Journal of Information Systems , vol.14 , Issue.1 , pp. 81-100
    • Bryant, K.1    Campbell, J.2
  • 4
    • 67650124268 scopus 로고    scopus 로고
    • The good and not so good of enforcing password composition rules
    • Campbell, J., Kleeman, D., and Ma, W., 2007. The good and not so good of enforcing password composition rules. Information Systems Security, 16 (1), 2-8.
    • (2007) Information Systems Security , vol.16 , Issue.1 , pp. 2-8
    • Campbell, J.1    Kleeman, D.2    Ma, W.3
  • 5
    • 18544374846 scopus 로고    scopus 로고
    • Evaluation of the human impact of password authentication practices on information security
    • Carstens, D.S., et al., 2004. Evaluation of the human impact of password authentication practices on information security. Informing Science Journal, 7 (1), 67-85. (Pubitemid 40659984)
    • (2004) Informing Science , vol.7 , pp. 67-85
    • Carstens, D.S.1    McCauley-Bell, P.R.2    Malone, L.C.3    DeMara, R.F.4
  • 8
    • 4544248322 scopus 로고    scopus 로고
    • Constant capacity in an immediate serial-recall task: A logical sequel to Miller (1956)
    • DOI 10.1111/j.0956-7976.2004.00732.x
    • Cowan, N., Chen, Z., and Rouder, J.N., 2004. Constant capacity in an immediate serial-recall task: a logical sequel to Miller (1956). Psychological Science, 15 (9), 634-640. (Pubitemid 39234380)
    • (2004) Psychological Science , vol.15 , Issue.9 , pp. 634-640
    • Cowan, N.1    Chen, Z.2    Rouder, J.N.3
  • 9
    • 79956090133 scopus 로고    scopus 로고
    • [online], [Accessed 20 January 2009]
    • Fedora, 2009. Fedora core 5 [online]. Available from: http:// docs.fedoraproject.org/release-notes/fc5/release-notes-ISO/ [Accessed 20 January 2009].
    • (2009) Fedora Core 5
  • 10
    • 18844456006 scopus 로고    scopus 로고
    • Have you met your organization's computer usage policy?
    • DOI 10.1108/02635570510583280
    • Foltz, C.B., Cronan, T.P., and Jones, T.W., 2005. Have you met your organization's computer usage policy? Industrial Management & Data Systems, 105 (2), 137-146. (Pubitemid 40682971)
    • (2005) Industrial Management and Data Systems , vol.105 , Issue.2 , pp. 137-146
    • Foltz, C.B.1    Cronan, T.P.2    Jones, T.W.3
  • 11
    • 0141852355 scopus 로고    scopus 로고
    • Automated choice heuristics
    • T. Gilovich D. Griffin, and D. Kahneman, eds., New York, NY: Cambridge University Press
    • Frederick, S., 2002. Automated choice heuristics. In: T. Gilovich, D. Griffin, and D. Kahneman, eds. Heuristics and biases: the psychology of intuitive judgment. New York, NY: Cambridge University Press, 548-558.
    • (2002) Heuristics and Biases: The Psychology of Intuitive Judgment , pp. 548-558
    • Frederick, S.1
  • 12
    • 0033633028 scopus 로고    scopus 로고
    • Authentication and supervision: A survey of user attitudes
    • Furnell, S.M., et al., 2000. Authentication and supervision: a survey of user attitudes. Computers & Security, 19 (6), 529-539.
    • (2000) Computers & Security , vol.19 , Issue.6 , pp. 529-539
    • Furnell, S.M.1
  • 16
    • 0013305901 scopus 로고    scopus 로고
    • Representativeness revisited: Attribute substitution in intuitive judgment
    • T. Gilovich D. Griffin, and D. Kahneman, eds., New York, NY: Cambridge University Press
    • Kahneman, D. and Frederick, S., 2002. Representativeness revisited: attribute substitution in intuitive judgment. In: T. Gilovich, D. Griffin, and D. Kahneman, eds. Heuristics and biases: the psychology of intuitive judgment. New York, NY: Cambridge University Press, 49-81.
    • (2002) Heuristics and Biases: The Psychology of Intuitive Judgment , pp. 49-81
    • Kahneman, D.1    Frederick, S.2
  • 17
    • 0002619432 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • Levenshtein, V., 1965. Binary codes capable of correcting deletions, insertions, and reversals. Problems in Information Transmission, 1, 8-17.
    • (1965) Problems in Information Transmission , vol.1 , pp. 8-17
    • Levenshtein, V.1
  • 18
    • 79956089633 scopus 로고    scopus 로고
    • Microsoft, [online], [Accessed 20 January 2009]
    • Microsoft, 2009. Forcing strong password usage throughout your organization [online]. Available form: http://technet. microsoft.com/en-us/ library/cc875814.aspx [Accessed 20 January 2009].
    • (2009) Forcing Strong Password Usage Throughout Your Organization
  • 19
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • Miller, G.A., 1956. The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review, 63, 81-97.
    • (1956) Psychological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 20
    • 18844379696 scopus 로고    scopus 로고
    • The sad and increasingly deplorable state of internet security
    • February
    • Piscitello, D. and Kent, S., 2003. The sad and increasingly deplorable state of internet security. Business Communications Review, February, 49-53.
    • (2003) Business Communications Review , pp. 49-53
    • Piscitello, D.1    Kent, S.2
  • 22
    • 0036559882 scopus 로고    scopus 로고
    • Improving computer security for authentication of users: Influence of proactive password restrictions
    • Proctor, R.W., et al., 2002. Improving computer security for authentication of users: influence of proactive password restrictions. Behaviour Research Methods, Instruments & Computers, 34 (2), 163-169.
    • (2002) Behaviour Research Methods, Instruments & Computers , vol.34 , Issue.2 , pp. 163-169
    • Proctor, R.W.1
  • 23
    • 34547464301 scopus 로고    scopus 로고
    • Now what was that password again? A more flexible way of identifying and authenticating our seniors
    • DOI 10.1080/01449290601173770, PII 780572024, Designing Computer Systems for and with Older Users
    • Renaud, L. and Ramsay, J., 2007. Now what was that password again? A more flexible way of identifying and authenticating our seniors. Behaviour & Information Technology, 26 (4), July-August, 309-322. (Pubitemid 47171546)
    • (2007) Behaviour and Information Technology , vol.26 , Issue.4 , pp. 309-322
    • Renaud, K.1    Ramsay, J.2
  • 24
    • 34249671060 scopus 로고    scopus 로고
    • Operations security awareness: The mind has no firewall
    • Rhodes, K., 2004. Operations security awareness: the mind has no firewall. Computer Security Journal, 16 (2), 27-36.
    • (2004) Computer Security Journal , vol.16 , Issue.2 , pp. 27-36
    • Rhodes, K.1
  • 27
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • Straub, D., 1990. Discovering and disciplining computer abuse in organizations: a field study. MIS Quarterly, 14 (1), 45-57.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-57
    • Straub, D.1
  • 28
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. and Welke, R., 1998. Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22 (4), 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.1    Welke, R.2
  • 29
    • 77951996290 scopus 로고    scopus 로고
    • The psychology of password management: A tradeoff between security and convenience
    • Tam, L., Glassman, M., and Vandenwauver, M., 2010. The psychology of password management: a tradeoff between security and convenience. Behaviour & Information Technology, 29 (3), 233-244.
    • (2010) Behaviour & Information Technology , vol.29 , Issue.3 , pp. 233-244
    • Tam, L.1    Glassman, M.2    Vandenwauver, M.3
  • 31
    • 0016264378 scopus 로고
    • Judgment under uncertainty: Heuristics and biases
    • Tversky, A. and Kahneman, D., 1974. Judgment under uncertainty: heuristics and biases. Science, 185, 1124-1131.
    • (1974) Science , vol.185 , pp. 1124-1131
    • Tversky, A.1    Kahneman, D.2
  • 32
    • 34249733184 scopus 로고    scopus 로고
    • Improving password security and memorability to protect personal and organizational information
    • Vu, K.L., et al., 2007. Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies, 65, 744-757.
    • (2007) International Journal of Human-Computer Studies , vol.65 , pp. 744-757
    • Vu, K.L.1
  • 33
    • 2642569127 scopus 로고    scopus 로고
    • Introducing the check-off password systems (COPS): An advancement in user authentication methods and information security
    • Warkentin, M., Davis, K., and Bekkering, E., 2004. Introducing the check-off password systems (COPS): an advancement in user authentication methods and information security. Journal of Organizational and End User Computing, 16 (3), 41-58.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 41-58
    • Warkentin, M.1    Davis, K.2    Bekkering, E.3
  • 35
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical results
    • September/ October, 25-30
    • Yan, J., et al., 2004. Password memorability and security: empirical results. IEEE Security and Privacy, September/ October, 25-30.
    • (2004) IEEE Security and Privacy
    • Yan, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.