T.
TryfonasandI.
Askoxylakis(Eds.
):HAS2014,LNCS8533,pp.
127–137,2014.
SpringerInternationalPublishingSwitzerland2014ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle*Yee-YinChoongNationalInstituteofStandardsandTechnology,100BureauDrive,Gaithersburg,MD20899,USAyee-yin.
choong@nist.
govAbstract.
Passwordsarethemostcommonlyusedmechanismincontrollingusers'accesstoinformationsystems.
Littleresearchhasbeenestablishedontheentireuserpasswordmanagementlifecyclefromthestartofgeneratingapassword,maintainingthepassword,usingthepasswordtoauthenticate,thentotheendofthelifespanofthepasswordwhenitneedstobechanged.
Wedevelopacognitive-behavioralframeworkdepictingthecognitiveactivitiesthatusersperformwithineachstage,andhowthestagesinteractwiththehumaninformationprocessor,i.
e.
memoryandattentionresources.
Individualfactorsarealsorepresentedintheframeworksuchasattitudes,motivations,andemotionsthatcanaffectusers'behaviorsduringthepasswordmanagementlifecycle.
Thepaperdiscussescognitiveandbehavioralactivitiesthroughoutthelifecycleaswellastheassociatedeconomics.
Weshowtheimportanceofaholisticapproachinunderstandingusers'passwordbehaviorsandtheframeworkprovidesguidanceonfutureresearchdirections.
Keywords:password,passwordmanagementlifecycle,cybersecurity,passwordpolicy,usability,cognitive-behavioralframework,economicsofpasswords.
1IntroductionText-basedpasswordsarethemostcommonlyusedmechanismincontrollingusers'accesstoinformationsystems.
Arguably,passwordsarecurrentlythebestfitformanyauthenticationneedsaspasswordsallowaccessfromanywhereassumingonlyasimplebrowserandrevocationisassimpleaschangingpasswords[1].
Usersoftenpossessmultipleaccount-passwordpairsforwork,schoolandprivateuse.
Forexample,itisreportedthatanaverageuserhas25webaccountsrequiringpasswords[2],andemployeesoforganizationshaveabout4[3]to9passwords[4]atwork.
UsersareoftenviewedbyITsecurityprofessionalsastheweakestlinkofcybersecurity[5,6].
Usersarealsoblamedforemployinginsecurebehaviorssuchasselectingbadandsimple-easy-to-guesspasswords,reusingpasswords,writingdownorsharingtheirpasswords,and,wheneverpossible,notchangingtheirpasswordsona*Therightsofthisworkaretransferredtotheextenttransferableaccordingtotitle17U.
S.
C.
105.
128Y.
-Y.
Choongregularbasis.
Forexample,inarecentmajorsecuritybreachinwhich150millionuseraccountswerecompromised,"123456"wasusedthemostasthepasswordbyover2millionusers,followedbyalittlemorecomplicatedpassword"123456789",andtheword"password"ranked3rdusedby345,000users[7].
Ontheotherhand,forusers,usabilityofpasswordsistheirmainconcern.
Usershavetojugglemultiplepasswordsforwork,schoolorpersonaluseandoftenareforcedtocomplywithpasswordpoliciesthattheyviewasburdensome[4,8].
Frustrationwithloginproblemssuchasforgettingormistypingpasswordsincreasegreatlywiththenumberofpasswordsthatusersmustmanage[1,4].
Usersperceivethatsecuritymeasureshindertheirproductivityandsometimesuseworkaroundstobreakthesecurityprotocol[4,8].
Researchfocusingonhumanfactorsandusabilityofpasswordshasbeenchallengingtheviewthatusersaretheprimarycauseforcybersecurityissuesandpointingoutthatsecuritypoliciesareoftenimposingunreasonablerequirementsandpushingusers'cognitivelimits.
Forexample,atypicalenterprisepasswordpolicycanrequireitsemployeescreatecomplicatedpasswords,notwritedownorstorethem,changepasswordsevery90days,andnotreusethelast10passwords.
Itisalmostimpossibleforemployeestocomplywiththisstringentpolicyespeciallywithmultiplepasswordsastherearefundamentallimitationsonhumanmemory(e.
g.
limitedmemoryspan,memorydecay,recognitionvs.
recall,andmemoryinterferences)assummarizedbySasseetal.
[9].
Manystudieshaveinvestigatedtheconstructofusers'selectionof"good"or"bad"passwords[10-12].
Researchersalsochallengethenecessityandtrueeffectivenessofusingaggressivepasswordpoliciesforsecurityandsacrificingusabilitythatforcesuserstoadoptinsecurepracticesandmayeventuallycompromisesecurity[13-15].
Asshown,studiesareabundantonpasswordusabilityanditsimplicationsoncybersecurity.
However,littleresearchhasbeenestablishedonthecognitiveandbehavioralaspectsoftheentireuserpasswordmanagementlifecycle,i.
e.
fromthestartofgeneratingapasswordtotheendofthelifespanofthepasswordwhenitneedstobechangedduetoeventssuchasforgetting,expiration,orcompromise.
Whileperformingresearchonaparticularstageofthelifecycleprovidesvaluableinsightonusers'experiencesduringthatstage,itdoesnotoffercompleteunderstandingoftheentireprocessandcouldmissopportunitiesforidentifyingpotentialinteractionsandinterdependenciesamongvariousstagesduringthepasswordmanagementlifecycle.
Thispaperfocusesontheholisticviewoftheend-to-endpasswordmanagementlifecycleandproposesaframeworkconnectingthedotsofusers'activitiesduringthelifecycle.
Thisframeworkservesasafoundationinguidingfutureresearchdirections.
2TheCognitive-BehavioralFrameworkWedevelopaframeworktorepresentthecognitiveprocessanduserbehaviorsintheend-to-endpasswordmanagementlifecycleandtoguideourfutureresearch.
Theuserpasswordmanagementlifecycleconsistsofthreestages:Generation,Maintenance,andAuthentication.
Theframeworkdepictsthecognitiveactivitiesthatusersperformwithineachstage,andhowthestagesinteractwiththehumaninformationprocessor,i.
e.
memoryandattentionresources.
Inaddition,individualfactorssuchasattitudes,ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle129motivations,andemotionsarealsoincludedthatcanaffectusers'decision-makingandbehaviorsduringthepasswordmanagementlifecycle.
TheframeworkisillustratedinFigure1andeachstageintheuserpasswordmanagementlifecycleisdescribedindetailinthesectionsbelow.
Fig.
1.
ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle2.
1PasswordGenerationInthefirststageofthepasswordmanagementlifecycle,i.
e.
Generation,usershavetogenerateaplausibletextstringbycombiningvariouscharacterstosatisfytherequirementsforaccessingtheassociatedaccountorsystem.
Therequirements,knownascompositionrules,areacommonorganizationalapproachaimedatforcinguserstoselectstrongerpasswords.
Thecontentsandwordingsofthosecompositionrulesvarygreatlyfromsystemtosystem,buttheygenerallyconsistofruleson:passwordlength(minimumand/ormaximum),use(allowedorprohibited)ofcertaincharacters(uppercaseorlowercasealphabets,numericaldigits,specialcharacters),use(allowedorprohibited)ofcommonnames,dictionarywords,birthdaysorotherpersonalinformation.
Compositionrulescanbepresentedasjustpasswordselectionguidelinesinsomesystems,whereasforothersystems,therulescanbeprogrammaticallyenforcedsuchthatusershavetocreatecompliantpasswordsinordertogainaccesstothesystems.
130Y.
-Y.
ChoongThispasswordgeneratingandcomposingprocessissimilartoawritingprocessthatusuallystartswiththewritersettingupthegoalsofthewriting,understandingtheconstraints(e.
g.
grammar,targetaudience),generatingideas,selectingandarrangingwords,constructingtext,andfinallyrefiningthewrittentext[16].
Thisprocess,inessence,isaproblemsolvingprocessthatincludeshighermentalfunctionsandcreativethinking[17].
Passwordcompositionprogressesinasimilarwaywiththeuserfirstsettingthegoalsofwhataccount/systemthepasswordisfor,understandingtheconstraints,choosingcharacters,thenrefiningthetextstringtomeetthepasswordrequirements.
Theconstraintstothepasswordgenerationproblemcanbecategorizedas:(1)Environmental–suchascompositionrules,platforms(e.
g.
desktopand/orlaptopcomputers,and/ormobiledevices),account/systemtype(e.
g.
web,application,orhardwareaccess);(2)Cognitive–suchasmemoryloadandattentionresources,rulecomprehensionability;(3)Individual–suchasattitudes,motivation,andperceptionofthecriticalityandsensitivityoftheaccountandpotentialsecuritythreats.
Thisstagecanbeiterativeastheusertriestofindthebestcombinationofcharactersthatsatisfiesthepasswordrequirementswhiletakingintoaccountotherenvironmentalconstraints,human-informationprocessconstraints(e.
g.
attentiondeficit,memorycapacity)andindividualfactors(e.
g.
attitudes,motivations,andemotions).
Thisstagecanalsobeapurelydecisionmakingstagewithoutinvolvingpasswordcompositionoronlyinvolvingcompositionpartially.
Thishappenswhentheuserdecidestoreuseormakeminorchangestoanexistingpasswordasthebestapproachinthesolutionspacewhilemeetingthepasswordrequirementsandtheuser'sindividualneeds.
2.
2PasswordMaintenanceOncetheusergeneratesasatisfactorypasswordforaspecificaccount/system,thepasswordmovesintoitssecondstageofthelifecycle,Maintenance.
Theusermakesdecisionsonhowhe/shewillkeeptrackofthenewlygeneratedpassword,bymemorizingorstoringusingsomemechanism;andhe/shealsoneedstodecidehowbesttoorganize–mentallyorphysically–thenewlygeneratedpasswordalongwithotherexistingandactivepasswordstominimizememoryinterferencesatalaterstage.
Iftheuserdecidestomemorizethepassword,he/sheneedstoemploysomestrategies(e.
g.
mnemonicdevice,roterehearsing,ortypingmultipletimestoestablishmusclememory)tomakesurethepasswordhasbeenencodedproperlyintothelong-termmemory.
Iftheuserdecidestostorethepassword,he/sheneedstodecidethestoragemechanism,forexample,writingdown(initsentirety,partially,ordisguised),recordingelectronically(file,devices,etc.
),orutilizingsomepasswordmanagementsoftware.
Sometimes,theremaybeanorganizationalpolicyonhowpasswordsshouldbemaintainedbylimitingmaintenanceoptionstousers.
Forexample,"Passwordsshouldneverbewrittendownorstoredon-linewithoutencryption.
"isthemostcommonpolicysetbymanyorganizations.
ItshouldbenotedthattherecanbeinteractionsandinterdependenciesbetweentheGenerationandMaintenancestagesastheusermayholdanaprioripreferenceonwhethertomemorizeortostorethepasswordwhichcanimpacttheuser'spasswordACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle131composingprocesswiththethoughtthathe/shehastomemorizethetextforlateruse.
Also,thememorabilityofatextstringcanimpacttheuser'sdecisiononhowtomaintainthepassword.
2.
3AuthenticationThelaststageinthelifecycleisAuthenticationinwhichthepasswordisusedtogainaccesstotheassociatedaccount/system.
Theauthenticationstageisrepetitiveasthepasswordwillbeusedmultipletimesforitsentirelifespanuntilachangeeventoccurssuchasforgotten,expiration,passwordcompromised,oruser'sdesiretosynchronizemultiplepasswordsfordifferentaccounts.
Ineachauthenticationinstance,theuserneedstoretrievethecorrectpasswordeitherbyrecallingfrommemoryorbylookingupfromstoredmediathatmatchestheassociatedaccount/systemforaccess,atthesametimestruggleswithforgettingduetomemorydecayorinterferencesfromotherpasswords,andneedstoenterthepasswordcorrectlywhichrequiresattentions,motorskills,musclememory,andhand-eyecoordination.
Therearemanyfactorsthatcanaffectauser'sauthenticationexperiencewithapasswordsuchasauthenticationfrequency,howthepasswordismaintained,memorabilityandtype-abilityoftheaccount/passwordpair,orinterferencesfromotherpasswords.
Theauthenticationexperience(positiveornegative)cantheninfluencehowtheusercreatesnewpasswordswhenhe/shemovesoutfromtheauthenticationstageandstartsthenextpasswordmanagementlifecycle.
3HolisticResearchApproachonUserPasswordBehaviorsGuidedbytheFrameworkTheframeworkservesasaconstantreminderinresearchapproachestoalwaysconsiderusers'passwordbehaviorsinaholisticmannerthat,atanypointoftime,theusersaregoingthroughastageinthepasswordmanagementlifecycleandtheirbehaviorsareareflectionoftheinteractionsamongstagesinthelifecycle,thecapabilitiesandlimitationsofthehumaninformationprocessor,andtheindividualfactors.
Inthefollowingsections,wediscusstheimportanceofemployingaholisticapproachandsomemisconceptionsintheliteratureonuserpasswordbehaviorsresearch.
Wealsoreviewrelevantresearchandpointoutareasforfurtherresearch.
3.
1PasswordGeneration–MorethanaSelectionTaskThemostcommonmisconceptionofpasswordgenerationintheliteratureisthenotionofusers'selectingpasswords.
Itisoftendescribedthatusersselectbadandinsecurepasswords[11,18,19].
However,generatingpasswordsismorethanaselectiontaskinthattheword"selection"implieschoosingfromasetofreadilyavailablepasswordoptions.
Usersonlyselectpasswordswhentheydecidetoreuseexistingpasswords.
Inpasswordgeneratingtasks,usersemployhigh-levelcognitive,132Y.
-Y.
Choongproblem-solvingtaskswhentheyarefacedwiththetaskofcomposingtextstringstosatisfypasswordrequirementsofcombiningandarrangingvariouscharacterswithlengthlimitswhiletryingtomakesenseofthetextstringsandmeetingtheirownpersonalneeds.
3.
2PasswordComposition–ProblemSolvingAsnotedearlier,passwordcompositionisinessenceproblemsolvinginthatitinvolvesgoalsdefining,ideassearching/planning,andrefining/finalizing.
Therehavebeenfewstudiesinvestigatingpasswordgenerationunderrestrictivecompositionrules[11,20,21].
However,thosestudiesfocusedonlyontheoutcomesofthepasswordgeneration,i.
e.
thecharacteristicsofthepasswordsgenerated,andtheimpactsoftherestrictions,butdidnotinvestigatetheentiregenerationprocess.
Passwordresearchhasseldomrecognizedthatcompositionisnotatrivialtask.
Thereisaneedforresearchonhowuserssolvethe"passwordgeneration"problemfromthebeginningwhenusersfirstencounterandperceivetheproblemdomain;comprehendtheconstraints(Environmental,Cognitive,andIndividual);explorethesolutionspace;verifysolutionfeasibility;refine/narrowsolutionspace;andmakedecisionsonthebest-fitsolution.
Byresearchingpasswordgenerationasaproblemsolvingeffortwiththeframework,itenablesustoinvestigatetopicssuchasthedifferencesamongthe"problemsolvers"(e.
g.
expertsvs.
novices);theimpactsofpasswordconstraintsonthesolutionspace;themostimportantfactor(s)leadingtothebest-fitsolution;andtheinfluencesofthemaintenancedecisiononpasswordgeneration.
3.
3TheEconomics–PasswordManagementLifecycleThecostofpasswordsappearslowataglancefromtheserviceproviders'perspectiveasdeployingafunctionalpasswordsystemisrelativelysimplecomparedtootherauthenticationalternativessuchasbiometricsorsmartcards.
Fromtheusers'perspective,itdoesn'tseemtocostmuch,either,sincepasswordsallowinstantaneousaccountsetupandarereadilyunderstood[1].
However,therearesignificantcostsassociatedwiththepasswordauthenticationmechanismforboththeserviceprovidersandtheendusers.
Itisshownqualitatively[15]thatanunusablepasswordpolicycandegradeemployees'productivity,andultimatelyaffecttheorganization'soverallproductivity.
Itisreportedthatmorethan30%ofITsupportcentercallswererelatedtopasswordresets[22].
Onaverage,eachcalllastsabout5minutesandthecostofsupportperincidentis$251onaverage[23].
Inadditiontothesupportcentercost,therearealsocostsassociatedwithauser'stimeandproductivitylosswhenmakingcallstothesupportcenter.
Ofthethreestagesintheuserpasswordmanagementlifecycle,GenerationandAuthenticationarethemosteffort-andtime-consumingstagesfortheusers.
Itisimperativeforresearcherstostartinvestigatingtheassociatedcostsforthesetwostagesfromtheusers'perspective.
1AllcostestimatesinthispaperarebasedontheUnitedStatesdollar,i.
e.
USDorUS$.
ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle133TheCostofPasswordGenerationBesidescompositionrules,organizationsoftenincludeotherrequirementssuchaspasswordexpiration,passwordreuselimitations,andpassworduniquenessintheirorganizationalpolicies.
Itwillbedifficulttoquantifythedirectimpactsofthepasswordpoliciesonusers'cognitiveactivitiesandbehaviorsandtranslatetheimpactsintoassociatedcosts.
Onewaytoestimatethecostsistolookatthenumberofpasswordsgeneratedandthetimeittakestogeneratethosepasswords.
InthestudyperformedbyChoongetal.
[4],itisreportedthatanemployeehasonaverage9work-relatedpasswords.
Anorganizationalpasswordpolicycommonlylookslike:PasswordmustbeoChangedatleastevery60daysoAtleast12characterslongoConsistentwiththecomplexityrequirements(mixed-casecharacters,numbers,andspecialcharacters)PasswordmustnotoBewrittendownorstoredon-lineonnon-organizationsystemsoReuseanypasswordofthelast24priorpasswordsoUsethesamepasswordonmultiplesystems,applicationsorwebsitesIfanewemployeeacquireshis/her9passwordsinthefirstmonthsonthejob,byfollowingthepolicy,itmeansthatthenewemployeewillhavetogenerate54uniquepasswordswithinthefirstyearofemployment,whichmeansthatauniqueandcomplexpasswordisgeneratedonaverageeveryweekthroughouttheyear.
Theconstantpasswordgenerationtaskputsahugeamountofburdenonemployeeswhoonlyseemanagingpasswordsasasecondarytaskenablingaccesstotheirprimarytask[24].
Thisestimatedoesnottakeintoaccountotherpasswordgenerationeventsoutsideoftheregularchangingcycleduetounplannedincidentssuchasforgottenpasswordsorpasswordcompromises.
Itisalsoreportedthatthelongesttimeittakestogeneratepasswordsforworkis,onaverage,98.
5minutesforfrequentpasswordsand86.
6minutesforoccasionallypasswords[4].
Theworstscenario:ifeverypasswordtakesthelongesttimetogenerate,anemployeecanspend18.
6hours(or2businessdays)ata60-daycycleeachyeargeneratingpasswordsfortheirwork.
Iftheaverageannualwageof$81,704(or$39.
15/hour)offederalcivilianworkersisused[25],wecanestimateanannualcostof$728.
19peremployeebeingpulledawayfromworktogeneratepasswords.
TheCostofAuthenticationUsersinteractwithauthenticationsystemsonadailybasisforwork,school,orforpersonaluse.
AsshowninFigure1,eachauthenticationinstanceinvolvesretrievingthecorrectpassword(frommemoryorfromstoredmedia)andtypingthepasswordtogainaccess.
Thisauthenticationinstancecanbeiterativeinitselfifanystepfailsinthesequence,e.
g.
incorrectpasswordretrieved–forgettingorinterferences,typingerrors,orsystemfailure.
134Y.
-Y.
ChoongResearchinvestigatingreal-lifeuserauthenticationexperienceincludesdiarystudies,e.
g.
[15,24,26,27],andlongitudinalstudies,e.
g.
[2,28].
Thenumberofauthenticationinstancesvariesgreatlyinthosestudies,rangingfromtyping8.
11passwordsperday[2],75passwordeventsinatwo-weekspan[27],to23authenticationeventsinadaywith46.
9%(~11times)beingpasswordlogins[24].
Usersexpressedfrustrationandtimewastedfromvariousloginproblemssuchasmistypingpasswords,forgettingpasswords,mismatchingaccountandpassword,andgettinglockedout[4].
Whenenteringpasswordsfrommemory,itisreportedthatthemostcommonerrorisincorrectcapitalization(shifting),followedbymissingcharacter(s)[29].
Whileitisdifficulttoestimatethefullcostsofusers'authenticationexperiencewithpasswords,wecanstartwithasimplifiedwaytocalculatethecostsassociatedwithpasswordentry.
InthediarystudydoneattheNationalInstituteofStandardsandTechnology(NIST)[24],employeesenteredpasswordsabout11timesinadayandtheNIST'spasswordpolicyrequirespasswordsbeing12charactersorlonger.
Asreportedin[21],ittakesroughly14secondstotypeapasswordof8characterslong.
Estimatingconservatively(astheNISTrequiredpasswordsarelongerthan8characters),atypicalfull-timeemployeecanspend10.
27hoursayearontypingpasswordsforauthentication2.
Theestimateshouldbedoubled,i.
e.
20.
54hours,asacompleteauthenticationoftenincludestypingtheusernamebesidesthepassword.
Usingthesamewageinformation(i.
e.
$39.
15/hour)in[25],theannualcostperemployeeonenteringusernameandpasswordpairsforauthenticationisroughly$804.
14.
Foranorganizationwith100employees,aroughestimateof$153,000annuallycanbespentonemployees'basicpasswordmanagementactivities(Maintenancenotincluded),i.
e.
Generation($728.
19)andAuthentication($802.
58),asidefromproductivity.
Forlargeorganizationswith1,000employeesormore,thiscostofbasicpasswordmanagementcanbemorethan$1,500,000eachyear.
HiddenCostsBeyondthetwocostsforbasicpasswordmanagementdemonstratedearlier,thereareotherhiddencostsassociatedwiththepasswordmanagementlifecycle.
Forexample,itisnotuncommonfororganizationstoenforcetimeoutsandscreenlockingtomitigateopportunisticmisuseofanunattendedcomputer[15,24].
Itcreatesconstanttaskinterruptionsandrequiresuserstorecoverfrominterruptionsthatwillalsotranslatetoproductivityloss.
Moreandmoreusers'computingexperienceshappenonmobiledevicessuchaslaptopcomputers,tablets,andsmartphones.
Thecognitiveandbehavioralframeworkwillprovideusafoundationtoexploretheimpactsonpasswordenteringexperiencewithdifferentkeyboardsandlayouts.
Itwillalsoallowustoinvestigatethepotentialinterferencesonusers'musclememoryofawell-practicedpasswordandtheincreaseonrecallerrorsortypingerrorsduetotransitioningfromoneplatformtoanotherorhavingtoswitchbackandforthbetweenplatforms.
Researchisneededtounderstandtheassociatedcostsofusers'mobileauthenticationexperience.
2Totalof240workdaysassuming5daysaweek,52weeks,andminustwovacationweeksand10federalholidays.
ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle1353.
4PositiveAttitudes=BetterSecurityBehaviorsandLessFrustrationIngeneral,usersareconcernedwithsecurity,buttheyoftenareforcedtodeveloplesssecurecopingstrategies(e.
g.
reusepasswords,orwritedownpasswords)whentheyareunabletocomplywithpasswordpoliciesthataretoorestrictiveandinflexibletomatchusers'capabilities[15].
However,inalarge-scalesurveystudy[4],theresearchersfoundthatusers'attitudestowardorganizationalpasswordrequirementsarerelatedtotheirpasswordbehaviorsandexperiencesacrossallthreestagesinthepasswordmanagementlifecycle.
Usersholdingpositiveattitudestowardpasswordrequirementsvaluemoreincreatingcompliantandstrongpasswords,writedownpasswordslessoften,feellessfrustrationwithauthenticationproblems,betterunderstandandrespectthesignificanceofsecurity,ascomparedtouserswithnegativeattitudes.
Thefindingsonattitudesleadustomoreresearchquestionsonsearchingforplausiblemeanstoencouragepositiveuserattitudesandtoprovideusersupportaddressingthenegativethoughts.
4ConclusionArecybersecurityandusabilitytwoparallellinesthatnevermeetOr,aretheycrossroadswheretheintersectionisyettobereachedWebelievethat,thoughitmaynotbeeasilyseen,theintersectiondoesexistamongthetheoretical,technical,andusabilityaspectsofcybersecurity.
Itrequirescollaborationfromresearchersandpractitionerswithmulti-disciplinarybackgroundsinfindingtherightbalancetoreachthatintersectionthatwillprovideacceptablesecurityandusability.
Moreresearchisneededonusers'cognitiveandbehavioralactivitiesregardinginterrelationshipsamongthethreestagesinthepasswordmanagementlifecycle.
Whatcanbedonemoreonthetechnologysidetoensuresecurityandprotectinformationassets,andalleviatetheburdenonuserssotheywillthinkmorepositivelyaboutsecuritymeasuresFutureresearchshoulduseaholisticapproachwiththegoalofprovidingdatatoenablethepolicymakerstomakeinformeddecisionsonsecuritypoliciesthatarebothsecureandusable,andtoprovideguidanceinusersupportandeducationtopromotepositiveattitudes.
References1.
Herley,C.
,vanOorschot,P.
:AResearchAgendaAcknowledgingthePersistenceofPasswords.
IEEESecurity&Privacy10(1),28–36(2012)2.
Florêncio,D.
,Herley,C.
:ALarge-ScaleStudyofWebPasswordHabits.
In:Proceedingsofthe16thInternationalConferenceonWorldWideWeb,pp.
657–666.
ACM(2007)3.
Hoonakker,P.
,Bornoe,N.
,Carayon,P.
:PasswordAuthenticationfromaHumanFactorsPerspective:ResultsofaSurveyamongEnd-Users.
In:ProceedingsoftheHumanFactorsandErgonomicsSocietyAnnualMeeting,vol.
53(6),pp.
459–463.
SAGEPublications(2009)136Y.
-Y.
Choong4.
Choong,Y.
-Y.
T.
M.
,Liu,H.
-K.
:ALarge-ScaleSurveyofEmployees'PasswordBehaviors.
Manuscriptsubmittedforpublication(2014)5.
Goverance,I.
T.
:BoardroomCyberWatch2013–Report(2013),http://www.
itgovernance.
co.
uk/what-is-cybersecurity/boardroom-cyber-watch.
aspx6.
Haskins,W.
:NetworkSecurity:GullibleUsersAretheWeakestLink.
TechNewsWorld(November29,2007),http://www.
technewsworld.
com/story/60520.
html(retrieved)7.
Malenkovich,S.
:10WorstPasswordIdeas(AsSeenIntheAdobeHack).
KasperskyLabDaily(November21,2013),http://blog.
kaspersky.
com/10-worst-password-ideas-as-seen-in-the-adobe-hack/(retrieved)8.
MeriTalk.
:CyberSecurityExperience:SecurityProsfromMars,UsersfromMercury(2013),http://www.
meritalk.
com/cybersecurityexperience(retrieved)9.
Sasse,M.
A.
,Brostoff,B.
,Weirich,D.
:Transformingthe'weakestlink'—ahuman/computerinteractionapproachtousableandeffectivesecurity.
BTTechnologyJournal19(3),122–131(2001)10.
Brown,A.
S.
,Bracken,E.
,Zoccoli,S.
,Douglas,K.
:Generatingandrememberingpasswords.
AppliedCognitivePsychology18(6),641–651(2004)11.
Campbell,J.
,Ma,W.
,Kleeman,D.
:Impactofrestrictivecompositionpolicyonuserpasswordchoices.
Behaviour&InformationTechnology30(3),379–388(2011)12.
Yan,J.
,Blackwell,A.
,Anderson,R.
,Grant,A.
:PasswordMemorabilityandSecurity:EmpiricalResults.
IEEESecurity&Privacy2(5),25–31(2004)13.
Florêncio,D.
,Herley,C.
,Coskun,B.
:DoStrongWebPasswordsAccomplishAnythingIn:Proceedingsofthe2ndUSENIXWorkshoponHotTopicsinSecurity,pp.
1–6(2007)14.
Herley,C.
:SoLong,AndNoThanksfortheExternalities:TheRationalRejectionofSecurityAdvicebyUsers.
In:NSPW2009Proceedingsofthe2009WorkshoponNewSecurityParadigmsWorkshop,pp.
133–144(2009)15.
Inglesant,P.
,Sasse,M.
A.
:TheTrueCostofUnusablePasswordPolicies:PasswordUseintheWild.
In:ProceedingsoftheSIGCHIConferenceonHumanFactorsinComputingSystems,pp.
383–392(2010)16.
Flower,L.
H.
,Hayes,J.
R.
:ACognitiveProcessTheoryofWriting.
CollegeCompositionandCommunication32(4),365–387(1981)17.
Flower,L.
H.
,Hayes,J.
R.
:Problem-solvingstrategiesandthewritingprocess.
CollegeEnglish39(4),449–461(1977)18.
ImervaApplicationDefenseCenter(ADC).
:ConsumerPasswordWorstPractices.
ImpervaWhitePaper(2009),http://www.
imperva.
com/docs/wp_consumer_password_worst_practices.
pdf(retrieved)19.
Zhang,Y.
,Monrose,F.
,Reiter,M.
K.
:TheSecurityofModernPasswordExpiration:AnAlgorithmicFrameworkandEmpiricalAnalysis.
In:Proceedingsofthe17thACMConferenceonComputerandCommunicationsSecurity,pp.
176–186(2010)20.
Proctor,R.
W.
,Lien,M.
-C.
,Vu,K.
-P.
L.
,Schultz,E.
E.
,Salvendy,G.
:Improvingcomputersecurityforauthenticationofusers:Influenceofproactivepasswordrestrictions.
BehaviorResearchMethods,Instruments,&Computers34(2),163–169(2002)21.
Vu,K.
-P.
L.
,Bhargav,A.
,Proctor,R.
W.
:ImposingPasswordRestrictionsforMultipleAccounts:ImpactonGenerationandRecallofPasswords.
In:ProceedingsoftheHumanFactorsandErgonomicsSocietyAnnualMeeting,vol.
47(11),pp.
1331–1335.
SAGEPublications(2003)ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle13722.
Pratt,M.
K.
:5AnnonyingHelpDeskCalls-AndHowtoBanishThem.
PCWorld(April3,2012),http://www.
pcworld.
com/article/253073/5_annoying_help_desk_calls_and_how_to_banish_them.
html(retrieved)23.
Abel,S.
:IndustryAverageHelpDeskSupportCosts.
TheContentWrangler(April28,2011),http://thecontentwrangler.
com/2011/04/28/industry-average-help-desk-support-costs/(retrieved)24.
Steves,M.
,Chisnell,D.
,Sasse,M.
A.
,Krol,K.
,Theofanos,M.
,Wald,H.
:Report:AuthenticationDiaryStudy.
NISTIR7983.
NationalInstituteofStandardsandTechnology,Gaithersburg,MD(2014)25.
U.
S.
BureauofEconomicAnalysis:NationalIncomeandProductAccounts,Tables6.
6D,WagesandSalariesPerFull-TimeEquivalentEmployeebyIndustry(August7,2013),http://www.
bea.
gov/national/nipaweb(retrieved)26.
Grawemeyer,B.
,Johnson,H.
:Usingandmanagingmultiplepasswords:Aweektoaview.
InteractingwithComputers23(3),256–267(2011)27.
Hayashi,E.
,Hong,J.
I.
:ADiaryStudyofPasswordUsageinDailyLife.
In:ProceedingsoftheSIGCHIConferenceonHumanFactorsinComputingSystems,pp.
2627–2630.
ACM(2011)28.
Keith,M.
,Shao,B.
,Steinbart,P.
:ABehavioralAnalysisofPassphraseDesignandEffectiveness.
JournaloftheAssociationforInformationSystems10(2),63–89(2009)29.
Stanton,B.
,Greene,K.
K.
:CharacterStrings,MemoryandPasswords:WhataRecallStudyCanTellUs.
In:Proceedingsofthe16thInternationalConferenceonHuman-ComputerInteraction(inpress,2014)
DMIT怎么样?DMIT最近动作频繁,前几天刚刚上架了日本lite版VPS,正在酝酿上线日本高级网络VPS,又差不多在同一时间推出了美国cn2 gia线路不限流量的美国云服务器,不过价格太过昂贵。丐版只有30M带宽,月付179.99美元 !!目前,美国云服务器已经有个4个套餐,分别是,Premium(cn2 gia线路)、Lite(普通直连)、Premium Secure(带高防的cn2 gia线...
进入6月,各大网络平台都开启了618促销,腾讯云目前也正在开展618云上Go活动,上海/北京/广州/成都/香港/新加坡/硅谷等多个地区云服务器及轻量服务器秒杀,最低年付95元起,参与活动的产品还包括短信包、CDN流量包、MySQL数据库、云存储(标准存储)、直播/点播流量包等等,本轮秒杀活动每天5场,一直持续到7月中旬,感兴趣的朋友可以关注本页。活动页面:https://cloud.tencent...
wordpress高级跨屏企业主题,通用响应式跨平台站点开发,自适应PC端+各移动端屏幕设备,高级可视化自定义设置模块+高效的企业站搜索优化。wordpress绿色企业自适应主题采用标准的HTML5+CSS3语言开发,兼容当下的各种主流浏览器: IE 6+(以及类似360、遨游等基于IE内核的)、Firefox、Google Chrome、Safari、Opera等;同时支持移动终端的常用浏览器应...
kaspersky.com为你推荐
ip购买不同的ID不同的IP买同一个店铺同样的商品属于虚假交易吗?特朗普取消访问丹麦特朗普出国访问什么飞机护送?Baby被问婚变绯闻小s在黄晓明婚礼上问了什么问题Baby被问婚变绯闻黄晓明baby一起出来带娃,想要打破离婚传闻?百度关键词价格查询百度推广里怎么查指定的关键字参与竞价的价位呢同一ip网站如何用不同的IP同时登陆一个网站百度关键词工具常见的关键词挖掘工具有哪些777k7.comwww.777tk.com.怎么打不 开www.haole012.com阜阳有什么好的正规的招聘网站?百度指数词什么是百度指数
电信测速器 sharktech ixwebhosting godaddy优惠券 好看的桌面背景图片 150邮箱 789电视网 双十一秒杀 1g内存 傲盾官网 shopex主机 个人免费主页 cloudlink 阿里云邮箱登陆 万网主机 网站防护 碳云 九零网络 register.com 连连支付 更多