Applying Chunking Theory in Organizational Password Guidelines

نویسندگان

  • Deborah S. Carstens
  • Linda C. Malone
چکیده

This research evaluates the human impact that password authentication issues have on the security of information systems within organizations. This research resulted in the creation of password guidelines for authentication with passwords based on Miller’s (1956) and Cowan’s (2001) chunking theory research and a model for predicting the vulnerability that a particular set of conditions have on the likelihood of error in an information system. The findings indicate that human error associated with password authentication can be significantly reduced through the use of passwords that are composed of meaningful data for the user and that meet technical requirements for strong passwords.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elastic Systems: Case of Hebbian Neurons

As the neuronal (and cognitive) processes are, after all, so well known, they offer a nice testbench for complexity theories, and they are a nice prototype for understanding behaviors in cybernetic systems in general. It turns out that when applying the framework of Hebbian neurons, many observed brain functionalities can be attacked, including sparse coding on the low level, and chunking on th...

متن کامل

Developing an Intervention Guidelines for Social Health Promotion Based on the Social Capital Theory

Introduction: Social capital can influence social health so it is essential to consider their interaction for health promotion. Guidelines for applying social capital theory in social health promotion programs will help practitioners to intervene step by step and make sure that all components of social capital theory will consider in health promotion programs. This article presents the results ...

متن کامل

Examining the Role of Organizational Password Security Policies in Individual Password Security Behaviors

Organizations typically construct computer access password policies that request or require employees to create “strong” passwords. Challenges arise for these employees in attempting to conform to a long list of difficult and potentially conflicting criteria. This dissertation research-in-progress uses concepts from Behavioral Reasoning Theory, General Deterrence Theory, and other theories to e...

متن کامل

Password Logbooks and What Their Amazon Reviews Reveal About Their Users’ Motivations, Beliefs, and Behaviors

The existence of and market for notebooks designed for users to write down passwords illuminates a sharp contrast: what is often prescribed as proper password behavior—e.g., never write down passwords—differs from what many users actually do. These password logbooks and their reviews provide many unique and surprising insights into their users’ beliefs, motivations, and behaviors. We examine th...

متن کامل

BaseNP Chunking using ILP

This is to present work on applying Inductive Logic Programming (ILP) to the task of BaseNP chunking. After ILP and NP Chunking are discussed, the experimental setup for using ILP to construct a BaseNP tagger in Prolog is described. Finally, the results are quantitatively as well as qualitatively analysed.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006