-
1
-
-
2642549662
-
Computer security and risky computing practices: A rational choice perspective
-
Aytes, K. and Connolly, T. (2004). Computer Security and Risky Computing Practices: A Rational Choice Perspective, Journal of Organizational and End User Computing, 16 (3):22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
2
-
-
1242275412
-
Hyppo- crates: A new proactive password checker
-
Blundo, C., D'Arco, P., De Santis, A., and Galdi, C. (2004). HYPPO- CRATES: A New Proactive Password Checker, The Journal of Systems and Software, 71 (1-2):163.
-
(2004)
The Journal of Systems and Software
, vol.71
, Issue.1-2
, pp. 163
-
-
Blundo, C.1
D'Arco, P.2
De Santis, A.3
Galdi, C.4
-
3
-
-
85024009930
-
Identity management begins with the simple password
-
Bort, J. (2002). Identity Management Begins with the Simple Password, Network World, 19 (42):8-10.
-
(2002)
Network World
, vol.19
, Issue.42
, pp. 8-10
-
-
Bort, J.1
-
4
-
-
85001728633
-
Password security: An empirical investigation into e-commerce passwords and their crack times
-
Cazier, J. A. and Medlin, B. D. (2006). Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times, Information Systems Security: The (ISC2) Journal, 15 (6): 45-55.
-
(2006)
2) Journal
, vol.15
, Issue.6
, pp. 45-55
-
-
Cazier, J.A.1
Medlin, B.D.2
-
5
-
-
85024015988
-
Tricks of the trade: A techie's password
-
De Lisser, E. (2002). Tricks of the trade: A Techie's Password, The Wall Street Journal, May 22.
-
(2002)
The Wall Street Journal
, pp. 22
-
-
De Lisser, E.1
-
6
-
-
84938780205
-
Privacy, risk perception, and expert online behavior: An exploratory study of household end users
-
Drennen, J., Mort, G. S., and Previte, J. (2006). Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users, Journal of Organizational and End User Computing, 18 (1): 1-22.
-
(2006)
Journal of Organizational and End User Computing
, vol.18
, Issue.1
, pp. 1-22
-
-
Drennen, J.1
Mort, G.S.2
Previte, J.3
-
7
-
-
84877763920
-
3 ways to keep passwords and user names out of the wrong hands
-
Engebretson, D. J. (2004). 3 Ways to Keep Passwords and User Names Out of the Wrong Hands, Security Distributing & Marketing, 34 (10):39-40.
-
(2004)
Security Distributing & Marketing
, vol.34
, Issue.10
, pp. 39-40
-
-
Engebretson, D.J.1
-
8
-
-
85024046000
-
Tricks of the trade: A techie picks a password
-
Oct. 13
-
Flandez, R. (2004). Tricks of the Trade: A Techie Picks a Password, The Wall Street Journal, Oct. 13.
-
(2004)
The Wall Street Journal
-
-
Flandez, R.1
-
10
-
-
0040661360
-
Security-related behavior of pc users in organizations
-
Frank, J., Shamir, B., and Briggs, W. (1991). Security-Related Behavior of PC Users in Organizations. Information & Management, 21 (3):127-135.
-
(1991)
Information & Management
, vol.21
, Issue.3
, pp. 127-135
-
-
Frank, J.1
Shamir, B.2
Briggs, W.3
-
11
-
-
84896511104
-
Business computer information systems security against hacking attacks: Application of distributed processing and software modifiers in defense of password files
-
S. Fullerton and D. Moore (eds). Las Vegas, NV: Academy of Business Administration
-
Guster, D., Safonov, P., Podkorytov, D., and Hall, C. (2004). Business Computer Information Systems Security Against Hacking Attacks: Application of Distributed Processing and Software Modifiers in Defense of Password Files. In International Business Trends: Contemporary Readings, S. Fullerton and D. Moore (eds). Las Vegas, NV: Academy of Business Administration.
-
(2004)
International Business Trends: Contemporary Readings
-
-
Guster, D.1
Safonov, P.2
Podkorytov, D.3
Hall, C.4
-
12
-
-
85024058346
-
-
Cited April 11 2007. Available from http://www.sans.org/resources/policies/
-
Institute, SANS. (2007). SANS Security Policy Project 2006. Cited April 11 2007. Available from http://www.sans.org/resources/policies/
-
(2007)
SANS Security Policy Project
-
-
-
13
-
-
4243096135
-
The domino effect of password reuse
-
Ives, B., Walsh, K. R., and Schneider, H. (2004). The Domino Effect of Password Reuse, Communications of the ACM, 47 (4):75-78.
-
(2004)
Communications of the ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
14
-
-
85024034257
-
The password is: Useless (probably)
-
Kelly, C. J. (2004). The Password Is: Useless (Probably), Computerworld, 38 (49):32.
-
(2004)
Computerworld
, vol.38
, Issue.49
, pp. 32
-
-
Kelly, C.J.1
-
15
-
-
85011548130
-
Desktop security and usability tradeoffs: An evaluation of password management systems
-
Mulligan, J. and Elbirt, A. J. (2005). Desktop Security and Usability TradeOffs: An Evaluation of Password Management Systems, Information Systems Security: The (ISC2) Journal, 14 (2): 10-20.
-
(2005)
2) Journal
, vol.14
, Issue.2
, pp. 10-20
-
-
Mulligan, J.1
Elbirt, A.J.2
-
16
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
Miller, G. A. (1956). The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information, Psychological Review, 63:81-97.
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
17
-
-
85024008474
-
-
Cited April 3, 2006. Available from http:// www.passwordportal.net/
-
Password Crackers, Inc. (2006) Password Portal-Password Recovery, Password Cracking 2004, Cited April 3, 2006. Available from http:// www.passwordportal.net/
-
(2006)
Password Portal-Password Recovery, Password Cracking
-
-
-
18
-
-
85024066751
-
Better passwords made easy
-
Piazza, P. (2004). Better Passwords Made Easy, Security Management, 48 (8):34.
-
(2004)
Security Management
, vol.48
, Issue.8
, pp. 34
-
-
Piazza, P.1
-
19
-
-
84872105856
-
-
Retrieved April 10, 2006. Available from http://www.openwall.com/ john/
-
Project, Openwall. (2006). John the Ripper password cracker 2005. Retrieved April 10, 2006. Available from http://www.openwall.com/ john/
-
(2006)
John the Ripper Password Cracker
-
-
Project, O.1
-
20
-
-
2642534245
-
Information assurance and security, journal of organizational and end user computing
-
Schou, C. D. and Trimmer, K. J. (2004). Information Assurance and Security, Journal of Organizational and End User Computing, 16 (3):i-vii.
-
(2004)
, vol.16
, Issue.3
, pp. i-vii
-
-
Schou, C.D.1
Trimmer, K.J.2
-
21
-
-
85023969680
-
-
Cited April 3, 2006. Available from http://www.password-crackers.com/en/articles/12/
-
Semjanov, P. (2006). Password Cracking FAQ 2006. Cited April 3, 2006. Available from http://www.password-crackers.com/en/articles/12/
-
(2006)
Password Cracking FAQ
-
-
Semjanov, P.1
-
22
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, J. M., Stam, K. R., Mastrangelo, P., and Jolton, J. (2005). Analysis of End User Security Behaviors, Computers & Security, 24 (2):124.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
24
-
-
33845692139
-
Trying to remember new passwords isn't as easy as abc123
-
Dec. 9
-
Thurm, S. and Mangalindan, M. (2004). Trying to Remember New Passwords Isn't as Easy as ABC123, The Wall Street Journal, Dec. 9, A1.
-
(2004)
The Wall Street Journal
, pp. A1
-
-
Thurm, S.1
Mangalindan, M.2
-
25
-
-
85023994462
-
Bad policy makes for weak passwords
-
Tuesday, V. (2003). Bad Policy Makes for Weak Passwords, Computerworld, 37 (48):38.
-
(2003)
Computerworld
, vol.37
, Issue.48
, pp. 38
-
-
Tuesday, V.1
-
26
-
-
62349118207
-
Network security and password policies
-
Wakefield, R. L. (2004). Network Security and Password Policies, The CPA Journal, 74 (7):6.
-
(2004)
The CPA Journal
, vol.74
, Issue.7
, pp. 6
-
-
Wakefield, R.L.1
-
27
-
-
2642569127
-
Introducing the check-off password system (Cops): An advancement in user authentication methods and information security
-
Warkentin, M., Davis, K., and Bekkering, E. (2004). Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security, Journal of Organizational and End User Computing, 16 (3):41-58.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 41-58
-
-
Warkentin, M.1
Davis, K.2
Bekkering, E.3
|