Applying Chunking Theory in Organizational Password Guidelines
نویسندگان
چکیده
This research evaluates the human impact that password authentication issues have on the security of information systems within organizations. This research resulted in the creation of password guidelines for authentication with passwords based on Miller’s (1956) and Cowan’s (2001) chunking theory research and a model for predicting the vulnerability that a particular set of conditions have on the likelihood of error in an information system. The findings indicate that human error associated with password authentication can be significantly reduced through the use of passwords that are composed of meaningful data for the user and that meet technical requirements for strong passwords.
منابع مشابه
Elastic Systems: Case of Hebbian Neurons
As the neuronal (and cognitive) processes are, after all, so well known, they offer a nice testbench for complexity theories, and they are a nice prototype for understanding behaviors in cybernetic systems in general. It turns out that when applying the framework of Hebbian neurons, many observed brain functionalities can be attacked, including sparse coding on the low level, and chunking on th...
متن کاملDeveloping an Intervention Guidelines for Social Health Promotion Based on the Social Capital Theory
Introduction: Social capital can influence social health so it is essential to consider their interaction for health promotion. Guidelines for applying social capital theory in social health promotion programs will help practitioners to intervene step by step and make sure that all components of social capital theory will consider in health promotion programs. This article presents the results ...
متن کاملExamining the Role of Organizational Password Security Policies in Individual Password Security Behaviors
Organizations typically construct computer access password policies that request or require employees to create “strong” passwords. Challenges arise for these employees in attempting to conform to a long list of difficult and potentially conflicting criteria. This dissertation research-in-progress uses concepts from Behavioral Reasoning Theory, General Deterrence Theory, and other theories to e...
متن کاملPassword Logbooks and What Their Amazon Reviews Reveal About Their Users’ Motivations, Beliefs, and Behaviors
The existence of and market for notebooks designed for users to write down passwords illuminates a sharp contrast: what is often prescribed as proper password behavior—e.g., never write down passwords—differs from what many users actually do. These password logbooks and their reviews provide many unique and surprising insights into their users’ beliefs, motivations, and behaviors. We examine th...
متن کاملBaseNP Chunking using ILP
This is to present work on applying Inductive Logic Programming (ILP) to the task of BaseNP chunking. After ILP and NP Chunking are discussed, the experimental setup for using ILP to construct a BaseNP tagger in Prolog is described. Finally, the results are quantitatively as well as qualitatively analysed.
متن کامل