Encouraging users to improve password security and memorability

M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …

The influence of social education level on cybersecurity awareness and behaviour: a comparative study of university students and working graduates

WCH Hong, CY Chi, J Liu, YF Zhang, VNL Lei… - Education and …, 2023 - Springer
A multitude of studies have suggested potential factors that influence internet security
awareness (ISA). Some, for example, used GDP and nationality to explain different ISA …

[HTML][HTML] Factors affecting cybersecurity awareness among university students

MA Alqahtani - Applied Sciences, 2022 - mdpi.com
One of the essential stages in increasing cyber security is implementing an effective security
awareness program. This work studies the present level of security knowledge among Imam …

Determinants of early conformance with information security policies

F Bélanger, S Collignon, K Enget… - Information & …, 2017 - Elsevier
Individuals often fail to perform the security behaviors their organizations request to protect
informational assets. However, forcing individuals into the compliance can trigger undesired …

Human-centered authentication guidelines

JD Still, A Cain, D Schuster - Information & Computer Security, 2017 - emerald.com
Purpose Despite the widespread use of authentication schemes and the rapid emergence of
novel authentication schemes, a general set of domain-specific guidelines has not yet been …

Am I really at risk? Determinants of online users' intentions to use strong passwords

L Zhang, WC McDowell - Journal of Internet Commerce, 2009 - Taylor & Francis
By using the protection motivation theory, this article tests a model of password protection
intentions for online users. Hypotheses are proposed concerning the intention to engage in …

Improving multiple-password recall: an empirical study

J Zhang, X Luo, S Akkaladevi… - European Journal of …, 2009 - Taylor & Francis
As one of the most common authentication methods, passwords help secure information by
granting access only to authorized parties. To be effective, passwords should be strong …

Analysis of health professional security behaviors in a real clinical setting: An empirical study

JL Fernández-Alemán, A Sánchez-Henarejos… - International journal of …, 2015 - Elsevier
Objective The objective of this paper is to evaluate the security behavior of healthcare
professionals in a real clinical setting. Method Standards, guidelines and recommendations …

Click passwords under investigation

K Gołofit - Computer Security–ESORICS 2007: 12th European …, 2007 - Springer
The paper explores one of the graphical authentication techniques as the possible solution
to the most important problems of traditional passwords. The aim of this work is to bring …

Identification and authentication: technology and implementation issues

M Zviran, Z Erlich - … of the Association for Information Systems, 2006 - aisel.aisnet.org
Computer-based information systems in general, and Internet e-commerce and e-business
systems in particular, employ many types of resources that need to be protected against …