메뉴 건너뛰기




Volumn 17, Issue 1, 2008, Pages 45-54

Weak password security: An empirical study

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85006986397     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/10658980701824432     Document Type: Article
Times cited : (18)

References (27)
  • 1
    • 2642549662 scopus 로고    scopus 로고
    • Computer security and risky computing practices: A rational choice perspective
    • Aytes, K. and Connolly, T. (2004). Computer Security and Risky Computing Practices: A Rational Choice Perspective, Journal of Organizational and End User Computing, 16 (3):22-40.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 22-40
    • Aytes, K.1    Connolly, T.2
  • 3
    • 85024009930 scopus 로고    scopus 로고
    • Identity management begins with the simple password
    • Bort, J. (2002). Identity Management Begins with the Simple Password, Network World, 19 (42):8-10.
    • (2002) Network World , vol.19 , Issue.42 , pp. 8-10
    • Bort, J.1
  • 4
    • 85001728633 scopus 로고    scopus 로고
    • Password security: An empirical investigation into e-commerce passwords and their crack times
    • Cazier, J. A. and Medlin, B. D. (2006). Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times, Information Systems Security: The (ISC2) Journal, 15 (6): 45-55.
    • (2006) 2) Journal , vol.15 , Issue.6 , pp. 45-55
    • Cazier, J.A.1    Medlin, B.D.2
  • 5
    • 85024015988 scopus 로고    scopus 로고
    • Tricks of the trade: A techie's password
    • De Lisser, E. (2002). Tricks of the trade: A Techie's Password, The Wall Street Journal, May 22.
    • (2002) The Wall Street Journal , pp. 22
    • De Lisser, E.1
  • 6
    • 84938780205 scopus 로고    scopus 로고
    • Privacy, risk perception, and expert online behavior: An exploratory study of household end users
    • Drennen, J., Mort, G. S., and Previte, J. (2006). Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users, Journal of Organizational and End User Computing, 18 (1): 1-22.
    • (2006) Journal of Organizational and End User Computing , vol.18 , Issue.1 , pp. 1-22
    • Drennen, J.1    Mort, G.S.2    Previte, J.3
  • 7
    • 84877763920 scopus 로고    scopus 로고
    • 3 ways to keep passwords and user names out of the wrong hands
    • Engebretson, D. J. (2004). 3 Ways to Keep Passwords and User Names Out of the Wrong Hands, Security Distributing & Marketing, 34 (10):39-40.
    • (2004) Security Distributing & Marketing , vol.34 , Issue.10 , pp. 39-40
    • Engebretson, D.J.1
  • 8
    • 85024046000 scopus 로고    scopus 로고
    • Tricks of the trade: A techie picks a password
    • Oct. 13
    • Flandez, R. (2004). Tricks of the Trade: A Techie Picks a Password, The Wall Street Journal, Oct. 13.
    • (2004) The Wall Street Journal
    • Flandez, R.1
  • 10
    • 0040661360 scopus 로고
    • Security-related behavior of pc users in organizations
    • Frank, J., Shamir, B., and Briggs, W. (1991). Security-Related Behavior of PC Users in Organizations. Information & Management, 21 (3):127-135.
    • (1991) Information & Management , vol.21 , Issue.3 , pp. 127-135
    • Frank, J.1    Shamir, B.2    Briggs, W.3
  • 11
    • 84896511104 scopus 로고    scopus 로고
    • Business computer information systems security against hacking attacks: Application of distributed processing and software modifiers in defense of password files
    • S. Fullerton and D. Moore (eds). Las Vegas, NV: Academy of Business Administration
    • Guster, D., Safonov, P., Podkorytov, D., and Hall, C. (2004). Business Computer Information Systems Security Against Hacking Attacks: Application of Distributed Processing and Software Modifiers in Defense of Password Files. In International Business Trends: Contemporary Readings, S. Fullerton and D. Moore (eds). Las Vegas, NV: Academy of Business Administration.
    • (2004) International Business Trends: Contemporary Readings
    • Guster, D.1    Safonov, P.2    Podkorytov, D.3    Hall, C.4
  • 12
    • 85024058346 scopus 로고    scopus 로고
    • Cited April 11 2007. Available from http://www.sans.org/resources/policies/
    • Institute, SANS. (2007). SANS Security Policy Project 2006. Cited April 11 2007. Available from http://www.sans.org/resources/policies/
    • (2007) SANS Security Policy Project
  • 14
    • 85024034257 scopus 로고    scopus 로고
    • The password is: Useless (probably)
    • Kelly, C. J. (2004). The Password Is: Useless (Probably), Computerworld, 38 (49):32.
    • (2004) Computerworld , vol.38 , Issue.49 , pp. 32
    • Kelly, C.J.1
  • 15
    • 85011548130 scopus 로고    scopus 로고
    • Desktop security and usability tradeoffs: An evaluation of password management systems
    • Mulligan, J. and Elbirt, A. J. (2005). Desktop Security and Usability TradeOffs: An Evaluation of Password Management Systems, Information Systems Security: The (ISC2) Journal, 14 (2): 10-20.
    • (2005) 2) Journal , vol.14 , Issue.2 , pp. 10-20
    • Mulligan, J.1    Elbirt, A.J.2
  • 16
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • Miller, G. A. (1956). The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information, Psychological Review, 63:81-97.
    • (1956) Psychological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 17
    • 85024008474 scopus 로고    scopus 로고
    • Cited April 3, 2006. Available from http:// www.passwordportal.net/
    • Password Crackers, Inc. (2006) Password Portal-Password Recovery, Password Cracking 2004, Cited April 3, 2006. Available from http:// www.passwordportal.net/
    • (2006) Password Portal-Password Recovery, Password Cracking
  • 18
    • 85024066751 scopus 로고    scopus 로고
    • Better passwords made easy
    • Piazza, P. (2004). Better Passwords Made Easy, Security Management, 48 (8):34.
    • (2004) Security Management , vol.48 , Issue.8 , pp. 34
    • Piazza, P.1
  • 19
    • 84872105856 scopus 로고    scopus 로고
    • Retrieved April 10, 2006. Available from http://www.openwall.com/ john/
    • Project, Openwall. (2006). John the Ripper password cracker 2005. Retrieved April 10, 2006. Available from http://www.openwall.com/ john/
    • (2006) John the Ripper Password Cracker
    • Project, O.1
  • 20
    • 2642534245 scopus 로고    scopus 로고
    • Information assurance and security, journal of organizational and end user computing
    • Schou, C. D. and Trimmer, K. J. (2004). Information Assurance and Security, Journal of Organizational and End User Computing, 16 (3):i-vii.
    • (2004) , vol.16 , Issue.3 , pp. i-vii
    • Schou, C.D.1    Trimmer, K.J.2
  • 21
    • 85023969680 scopus 로고    scopus 로고
    • Cited April 3, 2006. Available from http://www.password-crackers.com/en/articles/12/
    • Semjanov, P. (2006). Password Cracking FAQ 2006. Cited April 3, 2006. Available from http://www.password-crackers.com/en/articles/12/
    • (2006) Password Cracking FAQ
    • Semjanov, P.1
  • 24
    • 33845692139 scopus 로고    scopus 로고
    • Trying to remember new passwords isn't as easy as abc123
    • Dec. 9
    • Thurm, S. and Mangalindan, M. (2004). Trying to Remember New Passwords Isn't as Easy as ABC123, The Wall Street Journal, Dec. 9, A1.
    • (2004) The Wall Street Journal , pp. A1
    • Thurm, S.1    Mangalindan, M.2
  • 25
    • 85023994462 scopus 로고    scopus 로고
    • Bad policy makes for weak passwords
    • Tuesday, V. (2003). Bad Policy Makes for Weak Passwords, Computerworld, 37 (48):38.
    • (2003) Computerworld , vol.37 , Issue.48 , pp. 38
    • Tuesday, V.1
  • 26
    • 62349118207 scopus 로고    scopus 로고
    • Network security and password policies
    • Wakefield, R. L. (2004). Network Security and Password Policies, The CPA Journal, 74 (7):6.
    • (2004) The CPA Journal , vol.74 , Issue.7 , pp. 6
    • Wakefield, R.L.1
  • 27
    • 2642569127 scopus 로고    scopus 로고
    • Introducing the check-off password system (Cops): An advancement in user authentication methods and information security
    • Warkentin, M., Davis, K., and Bekkering, E. (2004). Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security, Journal of Organizational and End User Computing, 16 (3):41-58.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 41-58
    • Warkentin, M.1    Davis, K.2    Bekkering, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.