Encouraging users to improve password security and memorability
M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …
but rather by the limitations of human memory, and human perceptions together with their …
The influence of social education level on cybersecurity awareness and behaviour: a comparative study of university students and working graduates
WCH Hong, CY Chi, J Liu, YF Zhang, VNL Lei… - Education and …, 2023 - Springer
A multitude of studies have suggested potential factors that influence internet security
awareness (ISA). Some, for example, used GDP and nationality to explain different ISA …
awareness (ISA). Some, for example, used GDP and nationality to explain different ISA …
[HTML][HTML] Factors affecting cybersecurity awareness among university students
MA Alqahtani - Applied Sciences, 2022 - mdpi.com
One of the essential stages in increasing cyber security is implementing an effective security
awareness program. This work studies the present level of security knowledge among Imam …
awareness program. This work studies the present level of security knowledge among Imam …
Determinants of early conformance with information security policies
F Bélanger, S Collignon, K Enget… - Information & …, 2017 - Elsevier
Individuals often fail to perform the security behaviors their organizations request to protect
informational assets. However, forcing individuals into the compliance can trigger undesired …
informational assets. However, forcing individuals into the compliance can trigger undesired …
Human-centered authentication guidelines
Purpose Despite the widespread use of authentication schemes and the rapid emergence of
novel authentication schemes, a general set of domain-specific guidelines has not yet been …
novel authentication schemes, a general set of domain-specific guidelines has not yet been …
Am I really at risk? Determinants of online users' intentions to use strong passwords
By using the protection motivation theory, this article tests a model of password protection
intentions for online users. Hypotheses are proposed concerning the intention to engage in …
intentions for online users. Hypotheses are proposed concerning the intention to engage in …
Improving multiple-password recall: an empirical study
As one of the most common authentication methods, passwords help secure information by
granting access only to authorized parties. To be effective, passwords should be strong …
granting access only to authorized parties. To be effective, passwords should be strong …
Analysis of health professional security behaviors in a real clinical setting: An empirical study
JL Fernández-Alemán, A Sánchez-Henarejos… - International journal of …, 2015 - Elsevier
Objective The objective of this paper is to evaluate the security behavior of healthcare
professionals in a real clinical setting. Method Standards, guidelines and recommendations …
professionals in a real clinical setting. Method Standards, guidelines and recommendations …
Click passwords under investigation
K Gołofit - Computer Security–ESORICS 2007: 12th European …, 2007 - Springer
The paper explores one of the graphical authentication techniques as the possible solution
to the most important problems of traditional passwords. The aim of this work is to bring …
to the most important problems of traditional passwords. The aim of this work is to bring …
Identification and authentication: technology and implementation issues
M Zviran, Z Erlich - … of the Association for Information Systems, 2006 - aisel.aisnet.org
Computer-based information systems in general, and Internet e-commerce and e-business
systems in particular, employ many types of resources that need to be protected against …
systems in particular, employ many types of resources that need to be protected against …