Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(150.21KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Password Security
Danuvasin Charoen
Pages - 1 - 14     |    Revised - 20-01-2014     |    Published - 11-02-2014
Published in International Journal of Security (IJS)
Volume - 8   Issue - 1    |    Publication Date - February 2014  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Password Security, Password Utilization, Password Management.
ABSTRACT
This study investigates users’ behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among executive MBA students who hold managerial positions. The results of the survey indicate that users practice insecure behaviors in the utilization of passwords. The results support the literature and can be used to guide password management policy.
ABSTRACTING & INDEXING
1 CiteSeerX 
2 Scribd 
3 SlideShare 
4 PdfSR 
REFERENCES
Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Association for Computing Machinery. Communications of the ACM, 42(12), 40 (47 pages)
Anderson, J. R. (1994). Learning and Memory: An Integrated Approach: John Wiley & Sons Inc
B.DawnMedlin, & Cazier, J. A. (2005). An Investigatieve Study: Consumers Password Choices on Journal of Information Privacy & Security, 1(4), 44.
Burnett, M. (2002, March 7, 2002 ). Ten Windows Password Myths Retrieved April 12, 2005,from http://www.securityfocus.com/infocus/1554
Hewett, T. T. (1999). Cognitive factors in design (tutorial session): Basic phenomena in human memory and problem solving. Paper presented at the Proceeding of the Third Conference on Creativity & Cognition, Loughborough, UK.
Higbee, K. L. (2001). Your Memory: How It Works & How To Improve It (2 ed.). New York,NY: Marlowe & Company.
Ives, B., Walsh, K. R., & Schneider, H. (2004). The Domino Effect of Password Reuse.Association for Computing Machinery. Communications of the ACM, 47(4).
Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63, 81-97.
Newell, A., & Simon, H. A. (1972). Human Problem Solving. Englewood Cliffs, NJ: PrenticeHall.
Sans.org. (2013). Password Policy: www.sans.org.
Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the 'Weakest Link' -- a Human/Computer Interaction Approach to Usable and Effective Security. BT Technology Journal, 19(3), 122.
Schneier, B. (2000). Secrets and Lies. New York: John Wiley and Sons.
Warkentin, M., Davis, K., & Bekkering, E. (2004). Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security.Journal of Organizational and End User Computing, 16(3), 41 (18 pages)
Zviran, M., & Haga, W. J. (1999). Password security: An empirical study. Journal of Management Information Systems, 15(4), 161 (125 pages).
MANUSCRIPT AUTHORS
Dr. Danuvasin Charoen
NIDA Business School - Thailand
danuvasin@gmail.com


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions