메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2988-2997

Enhancing password security through interactive fear appeals: A web-based field experiment

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION MECHANISMS; FIELD EXPERIMENT; INTERACTIVITY; PASSWORD SECURITY; PASSWORD STRENGTH; REGISTRATION PROCESS; STRONG PASSWORD; WEAK PASSWORDS;

EID: 84875495633     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2013.196     Document Type: Conference Paper
Times cited : (51)

References (45)
  • 2
    • 0002571450 scopus 로고
    • Field research methods: Interviewing, questionnaires, participant observation, systematic observation, unobtrusive measures
    • T. Bouchard, "Field research methods: Interviewing, questionnaires, participant observation, systematic observation, unobtrusive measures", Handbook of industrial and organizational psychology (1976), pp. 363-413.
    • (1976) Handbook of Industrial and Organizational Psychology , pp. 363-413
    • Bouchard, T.1
  • 3
    • 9744260316 scopus 로고    scopus 로고
    • Validation in information systems research: A state-ofthe-art assessment
    • M.-C. Boudreau, D. Gefen and D. W. Straub, "Validation in Information Systems Research: A State-ofthe-Art Assessment", MIS Quarterly, 25 (2001), pp. 1-16.
    • (2001) MIS Quarterly , vol.25 , pp. 1-16
    • Boudreau, M.-C.1    Gefen, D.2    Straub, D.W.3
  • 11
    • 36549049369 scopus 로고    scopus 로고
    • An assessment of website password practices
    • S. Furnell, "An assessment of website password practices", Computers & Security, 26 (2007), pp. 445-451.
    • (2007) Computers & Security , vol.26 , pp. 445-451
    • Furnell, S.1
  • 12
    • 30344471401 scopus 로고
    • Flow in human-computer interactions: Test of a model
    • J. M. Carey, ed., Ablex Publishing Copr., Norwood, NJ, USA
    • J. Ghani, Flow in human-computer interactions: test of a model, in J. M. Carey, ed., Human Factors in Information Systems, Ablex Publishing Copr., Norwood, NJ, USA, 1995, pp. 291 - 311.
    • (1995) Human Factors in Information Systems , pp. 291-311
    • Ghani, J.1
  • 13
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • T. Herath and H. R. Rao, "Protection motivation and deterrence: a framework for security policy compliance in organisations", European Journal of Information, 18 (2009), pp. 106-125.
    • (2009) European Journal of Information , vol.18 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 14
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for the externalities: The rational rejection of security advice by users
    • C. Herley, "So long, and no thanks for the externalities: the rational rejection of security advice by users", Proceedings of the 2009 workshop on New security (2009).
    • (2009) Proceedings of the 2009 Workshop on New Security
    • Herley, C.1
  • 17
    • 79952018667 scopus 로고    scopus 로고
    • Imperva, Imperva Application Defense Center
    • Imperva, Consumer Password Worst Practices, Imperva Application Defense Center, 2010, pp. 1-5.
    • (2010) Consumer Password Worst Practices , pp. 1-5
  • 18
    • 61349088058 scopus 로고    scopus 로고
    • Research note investigating the influence of the functional mechanisms of online product presentations
    • Z. Jiang and I. Benbasat, "Research Note Investigating the Influence of the Functional Mechanisms of Online Product Presentations", Information Systems Research, 18 (2007), pp. 454-470.
    • (2007) Information Systems Research , vol.18 , pp. 454-470
    • Jiang, Z.1    Benbasat, I.2
  • 19
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • A. C. Johnston and M. Warkentin, "Fear Appeals and Information Security Behaviors: An Empirical Study", MIS Quarterly, 34 (2010), pp. 549-566.
    • (2010) MIS Quarterly , vol.34 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 20
    • 84875506640 scopus 로고    scopus 로고
    • Persuasive communication strategies: Assessing the fit between organizational identification and fear appeal message orientation
    • A. C. Johnston and M. Warkentin, Persuasive Communication Strategies: Assessing the Fit Between Organizational Identification and Fear Appeal Message Orientation, The Dewald Roode Information Security Workshop, IFIP WG 8.11/11.13, 2010, pp. 128-154.
    • (2010) The Dewald Roode Information Security Workshop, IFIP WG 8.11/11.13 , pp. 128-154
    • Johnston, A.C.1    Warkentin, M.2
  • 23
    • 84866773732 scopus 로고    scopus 로고
    • Arousal theory and the religiosity-criminality relationship
    • L. J. Siegel and P. Cordella, eds., Northeastern University Press, Boston
    • E. Lee, Arousal Theory and the religiosity-Criminality Relationship, in L. J. Siegel and P. Cordella, eds., Contemporary Criminology Theory, Northeastern University Press, Boston, 1996, pp. 65-84.
    • (1996) Contemporary Criminology Theory , pp. 65-84
    • Lee, E.1
  • 25
    • 84965874692 scopus 로고
    • Dilemmatics: The study of research choices and dilemmas
    • J. E. McGrath, "Dilemmatics: The Study of Research Choices and Dilemmas", American Behavioral Scientist, 25 (1981), pp. 179-210.
    • (1981) American Behavioral Scientist , vol.25 , pp. 179-210
    • McGrath, J.E.1
  • 27
  • 28
    • 0034340409 scopus 로고    scopus 로고
    • Measuring the flow construct in online environments: A structural modeling approach
    • T. Novak, D. Hoffman and Y. Yung, "Measuring the Flow Construct in Online Environments: A Structural Modeling Approach", Marketing Science, 19 (2000), pp. 22 - 44.
    • (2000) Marketing Science , vol.19 , pp. 22-44
    • Novak, T.1    Hoffman, D.2    Yung, Y.3
  • 29
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
    • R. Rogers, "{Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation}", Social psychophysiology (1983), pp. 153 - 176.
    • (1983) Social Psychophysiology , pp. 153-176
    • Rogers, R.1
  • 30
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change1
    • R. W. Rogers, "A Protection Motivation Theory of Fear Appeals and Attitude Change1", The Journal of Psychology, 91 (1975), pp. 93-114.
    • (1975) The Journal of Psychology , vol.91 , pp. 93-114
    • Rogers, R.W.1
  • 32
    • 84985084394 scopus 로고
    • Defining virtual reality: Dimensions determining telepresence
    • J. Steuer, "Defining Virtual Reality: Dimensions Determining Telepresence", Journal of Communication, 42 (1992), pp. 73-93.
    • (1992) Journal of Communication , vol.42 , pp. 73-93
    • Steuer, J.1
  • 34
    • 0141463342 scopus 로고
    • Deterring cheating by student programmers: A field experiment in computer security
    • D. Straub, P. Carlson and E. Jones, "Deterring cheating by student programmers: A field experiment in computer security", Journal of Management Systems, 5 (1993), pp. 33-48.
    • (1993) Journal of Management Systems , vol.5 , pp. 33-48
    • Straub, D.1    Carlson, P.2    Jones, E.3
  • 35
    • 84965761590 scopus 로고
    • Flow in computer-mediated communication: Electronic mail and voice mail evaluation and impacts
    • L. K. Trevino and J. Webster, "Flow in Computer-Mediated Communication: Electronic Mail and Voice Mail Evaluation and Impacts", Communication Research, 19 (1992), pp. 539-573.
    • (1992) Communication Research , vol.19 , pp. 539-573
    • Trevino, L.K.1    Webster, J.2
  • 36
    • 84875496175 scopus 로고    scopus 로고
    • Trusteer, Trusteer, New York, New York, USA
    • Trusteer, Reused Login Credentials, Trusteer, New York, New York, USA, 2010.
    • (2010) Reused Login Credentials
  • 38
    • 84861093724 scopus 로고    scopus 로고
    • Motivating IS security compliance: Insights from habit and protection motivation theory
    • A. Vance, M. Siponen and S. Pahnila, "Motivating IS security compliance: Insights from Habit and Protection Motivation Theory", Information & Management, 49 (2012), pp. 190-198.
    • (2012) Information & Management , vol.49 , pp. 190-198
    • Vance, A.1    Siponen, M.2    Pahnila, S.3
  • 41
    • 84941646855 scopus 로고
    • Putting the fear back into fear appeals: The extended parallel process model
    • K. Witte, "Putting the fear back into fear appeals: The extended parallel process model", Communications Monographs (1992).
    • (1992) Communications Monographs
    • Witte, K.1
  • 42
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • M. Workman, W. Bommer and D. Straub, "Security lapses and the omission of information security measures: A threat control model and empirical test", Computers in Human Behavior, 24 (2008), pp. 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , pp. 2799-2816
    • Workman, M.1    Bommer, W.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.