Assessing the Value of Formal Control Mechanisms on Strong Password Selection
نویسنده
چکیده
Applications often use behavior control mechanisms in order to ensure that individuals create sufficiently strong passwords. Behavior controls, which force individuals to utilize specific password characteristics, are assumed to be the best mechanism to encourage strong password creation. However, an over reliance on them could lead to counterproductive security behaviors. This study examines the efficacy of formal controls in the password creation process to determine if their use does indeed result in meaningfully stronger passwords than informal control techniques. Findings demonstrate that controls used during the password creation process do indeed shape password strength, but that behavior controls do not produce significantly stronger passwords than informal controls. Using an Agency Theory perspective, control techniques are considered in their ability to align principal-agent goal and risk perceptions. Findings illustrate the importance of using both informal and formal controls as a means of creating strong and effective passwords. Assessing the Value of Formal Control Mechanisms on Strong Password Selection
منابع مشابه
Presenting a model for assessing the risk of welding cracks using the ّFBWM method
One of the most dangerous industries is welding and inspection. Risk assessment is a rational procedure for determining the probable repercussions of prospective incidents on people, materials, equipment, and the environment. The risk assessment identifies the efficacy of selected control mechanisms and offers essential data for risk reduction, risk management, control system enhancement, and r...
متن کاملPresenting a model for assessing the risk of welding cracks using the ّFBWM method
One of the most dangerous industries is welding and inspection. Risk assessment is a rational procedure for determining the probable repercussions of prospective incidents on people, materials, equipment, and the environment. The risk assessment identifies the efficacy of selected control mechanisms and offers essential data for risk reduction, risk management, control system enhancement, and r...
متن کاملBlind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols
Many organisations enforce policies on the length and formation of passwords to encourage selection of strong passwords and protect their multi-user systems. For Two-Server Password Authenticated Key Exchange (2PAKE) and Two-Server Password Authenticated Secret Sharing (2PASS) protocols, where the password chosen by the client is secretly shared between the two servers, the initial remote regis...
متن کاملAssessing the impact of knowledge management strategies on employee innovative behavior in the work place(case study:knowledge-based organizations)
The goal of this research is the evaluation of knowledge management strategies which impact to innovative behavior personnel in workplace. Statistical community includes all human source bosses and assistants in Mazandaran public universities which their numbers were 105 totally. The number of statistical sample was evaluated 82 individuals by using Cochrane equation. To gather data, a question...
متن کاملThe application of formal axiology to medical education through the hartman value profile: a prospective cohort study
Introduction: Many criteria such as USMLE scores, applicantresumes, Dean’s letters, recommendation letters, personaldiscussions, interview scores and medical school transcripts canbe used to predict the success of a medical trainee in the USA. Thisinformation is either relatively objective, or subjective. It would bevaluable if we had some objective measures that m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJSSE
دوره 4 شماره
صفحات -
تاریخ انتشار 2013