T.
TryfonasandI.
Askoxylakis(Eds.
):HAS2014,LNCS8533,pp.
127–137,2014.
SpringerInternationalPublishingSwitzerland2014ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle*Yee-YinChoongNationalInstituteofStandardsandTechnology,100BureauDrive,Gaithersburg,MD20899,USAyee-yin.
choong@nist.
govAbstract.
Passwordsarethemostcommonlyusedmechanismincontrollingusers'accesstoinformationsystems.
Littleresearchhasbeenestablishedontheentireuserpasswordmanagementlifecyclefromthestartofgeneratingapassword,maintainingthepassword,usingthepasswordtoauthenticate,thentotheendofthelifespanofthepasswordwhenitneedstobechanged.
Wedevelopacognitive-behavioralframeworkdepictingthecognitiveactivitiesthatusersperformwithineachstage,andhowthestagesinteractwiththehumaninformationprocessor,i.
e.
memoryandattentionresources.
Individualfactorsarealsorepresentedintheframeworksuchasattitudes,motivations,andemotionsthatcanaffectusers'behaviorsduringthepasswordmanagementlifecycle.
Thepaperdiscussescognitiveandbehavioralactivitiesthroughoutthelifecycleaswellastheassociatedeconomics.
Weshowtheimportanceofaholisticapproachinunderstandingusers'passwordbehaviorsandtheframeworkprovidesguidanceonfutureresearchdirections.
Keywords:password,passwordmanagementlifecycle,cybersecurity,passwordpolicy,usability,cognitive-behavioralframework,economicsofpasswords.
1IntroductionText-basedpasswordsarethemostcommonlyusedmechanismincontrollingusers'accesstoinformationsystems.
Arguably,passwordsarecurrentlythebestfitformanyauthenticationneedsaspasswordsallowaccessfromanywhereassumingonlyasimplebrowserandrevocationisassimpleaschangingpasswords[1].
Usersoftenpossessmultipleaccount-passwordpairsforwork,schoolandprivateuse.
Forexample,itisreportedthatanaverageuserhas25webaccountsrequiringpasswords[2],andemployeesoforganizationshaveabout4[3]to9passwords[4]atwork.
UsersareoftenviewedbyITsecurityprofessionalsastheweakestlinkofcybersecurity[5,6].
Usersarealsoblamedforemployinginsecurebehaviorssuchasselectingbadandsimple-easy-to-guesspasswords,reusingpasswords,writingdownorsharingtheirpasswords,and,wheneverpossible,notchangingtheirpasswordsona*Therightsofthisworkaretransferredtotheextenttransferableaccordingtotitle17U.
S.
C.
105.
128Y.
-Y.
Choongregularbasis.
Forexample,inarecentmajorsecuritybreachinwhich150millionuseraccountswerecompromised,"123456"wasusedthemostasthepasswordbyover2millionusers,followedbyalittlemorecomplicatedpassword"123456789",andtheword"password"ranked3rdusedby345,000users[7].
Ontheotherhand,forusers,usabilityofpasswordsistheirmainconcern.
Usershavetojugglemultiplepasswordsforwork,schoolorpersonaluseandoftenareforcedtocomplywithpasswordpoliciesthattheyviewasburdensome[4,8].
Frustrationwithloginproblemssuchasforgettingormistypingpasswordsincreasegreatlywiththenumberofpasswordsthatusersmustmanage[1,4].
Usersperceivethatsecuritymeasureshindertheirproductivityandsometimesuseworkaroundstobreakthesecurityprotocol[4,8].
Researchfocusingonhumanfactorsandusabilityofpasswordshasbeenchallengingtheviewthatusersaretheprimarycauseforcybersecurityissuesandpointingoutthatsecuritypoliciesareoftenimposingunreasonablerequirementsandpushingusers'cognitivelimits.
Forexample,atypicalenterprisepasswordpolicycanrequireitsemployeescreatecomplicatedpasswords,notwritedownorstorethem,changepasswordsevery90days,andnotreusethelast10passwords.
Itisalmostimpossibleforemployeestocomplywiththisstringentpolicyespeciallywithmultiplepasswordsastherearefundamentallimitationsonhumanmemory(e.
g.
limitedmemoryspan,memorydecay,recognitionvs.
recall,andmemoryinterferences)assummarizedbySasseetal.
[9].
Manystudieshaveinvestigatedtheconstructofusers'selectionof"good"or"bad"passwords[10-12].
Researchersalsochallengethenecessityandtrueeffectivenessofusingaggressivepasswordpoliciesforsecurityandsacrificingusabilitythatforcesuserstoadoptinsecurepracticesandmayeventuallycompromisesecurity[13-15].
Asshown,studiesareabundantonpasswordusabilityanditsimplicationsoncybersecurity.
However,littleresearchhasbeenestablishedonthecognitiveandbehavioralaspectsoftheentireuserpasswordmanagementlifecycle,i.
e.
fromthestartofgeneratingapasswordtotheendofthelifespanofthepasswordwhenitneedstobechangedduetoeventssuchasforgetting,expiration,orcompromise.
Whileperformingresearchonaparticularstageofthelifecycleprovidesvaluableinsightonusers'experiencesduringthatstage,itdoesnotoffercompleteunderstandingoftheentireprocessandcouldmissopportunitiesforidentifyingpotentialinteractionsandinterdependenciesamongvariousstagesduringthepasswordmanagementlifecycle.
Thispaperfocusesontheholisticviewoftheend-to-endpasswordmanagementlifecycleandproposesaframeworkconnectingthedotsofusers'activitiesduringthelifecycle.
Thisframeworkservesasafoundationinguidingfutureresearchdirections.
2TheCognitive-BehavioralFrameworkWedevelopaframeworktorepresentthecognitiveprocessanduserbehaviorsintheend-to-endpasswordmanagementlifecycleandtoguideourfutureresearch.
Theuserpasswordmanagementlifecycleconsistsofthreestages:Generation,Maintenance,andAuthentication.
Theframeworkdepictsthecognitiveactivitiesthatusersperformwithineachstage,andhowthestagesinteractwiththehumaninformationprocessor,i.
e.
memoryandattentionresources.
Inaddition,individualfactorssuchasattitudes,ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle129motivations,andemotionsarealsoincludedthatcanaffectusers'decision-makingandbehaviorsduringthepasswordmanagementlifecycle.
TheframeworkisillustratedinFigure1andeachstageintheuserpasswordmanagementlifecycleisdescribedindetailinthesectionsbelow.
Fig.
1.
ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle2.
1PasswordGenerationInthefirststageofthepasswordmanagementlifecycle,i.
e.
Generation,usershavetogenerateaplausibletextstringbycombiningvariouscharacterstosatisfytherequirementsforaccessingtheassociatedaccountorsystem.
Therequirements,knownascompositionrules,areacommonorganizationalapproachaimedatforcinguserstoselectstrongerpasswords.
Thecontentsandwordingsofthosecompositionrulesvarygreatlyfromsystemtosystem,buttheygenerallyconsistofruleson:passwordlength(minimumand/ormaximum),use(allowedorprohibited)ofcertaincharacters(uppercaseorlowercasealphabets,numericaldigits,specialcharacters),use(allowedorprohibited)ofcommonnames,dictionarywords,birthdaysorotherpersonalinformation.
Compositionrulescanbepresentedasjustpasswordselectionguidelinesinsomesystems,whereasforothersystems,therulescanbeprogrammaticallyenforcedsuchthatusershavetocreatecompliantpasswordsinordertogainaccesstothesystems.
130Y.
-Y.
ChoongThispasswordgeneratingandcomposingprocessissimilartoawritingprocessthatusuallystartswiththewritersettingupthegoalsofthewriting,understandingtheconstraints(e.
g.
grammar,targetaudience),generatingideas,selectingandarrangingwords,constructingtext,andfinallyrefiningthewrittentext[16].
Thisprocess,inessence,isaproblemsolvingprocessthatincludeshighermentalfunctionsandcreativethinking[17].
Passwordcompositionprogressesinasimilarwaywiththeuserfirstsettingthegoalsofwhataccount/systemthepasswordisfor,understandingtheconstraints,choosingcharacters,thenrefiningthetextstringtomeetthepasswordrequirements.
Theconstraintstothepasswordgenerationproblemcanbecategorizedas:(1)Environmental–suchascompositionrules,platforms(e.
g.
desktopand/orlaptopcomputers,and/ormobiledevices),account/systemtype(e.
g.
web,application,orhardwareaccess);(2)Cognitive–suchasmemoryloadandattentionresources,rulecomprehensionability;(3)Individual–suchasattitudes,motivation,andperceptionofthecriticalityandsensitivityoftheaccountandpotentialsecuritythreats.
Thisstagecanbeiterativeastheusertriestofindthebestcombinationofcharactersthatsatisfiesthepasswordrequirementswhiletakingintoaccountotherenvironmentalconstraints,human-informationprocessconstraints(e.
g.
attentiondeficit,memorycapacity)andindividualfactors(e.
g.
attitudes,motivations,andemotions).
Thisstagecanalsobeapurelydecisionmakingstagewithoutinvolvingpasswordcompositionoronlyinvolvingcompositionpartially.
Thishappenswhentheuserdecidestoreuseormakeminorchangestoanexistingpasswordasthebestapproachinthesolutionspacewhilemeetingthepasswordrequirementsandtheuser'sindividualneeds.
2.
2PasswordMaintenanceOncetheusergeneratesasatisfactorypasswordforaspecificaccount/system,thepasswordmovesintoitssecondstageofthelifecycle,Maintenance.
Theusermakesdecisionsonhowhe/shewillkeeptrackofthenewlygeneratedpassword,bymemorizingorstoringusingsomemechanism;andhe/shealsoneedstodecidehowbesttoorganize–mentallyorphysically–thenewlygeneratedpasswordalongwithotherexistingandactivepasswordstominimizememoryinterferencesatalaterstage.
Iftheuserdecidestomemorizethepassword,he/sheneedstoemploysomestrategies(e.
g.
mnemonicdevice,roterehearsing,ortypingmultipletimestoestablishmusclememory)tomakesurethepasswordhasbeenencodedproperlyintothelong-termmemory.
Iftheuserdecidestostorethepassword,he/sheneedstodecidethestoragemechanism,forexample,writingdown(initsentirety,partially,ordisguised),recordingelectronically(file,devices,etc.
),orutilizingsomepasswordmanagementsoftware.
Sometimes,theremaybeanorganizationalpolicyonhowpasswordsshouldbemaintainedbylimitingmaintenanceoptionstousers.
Forexample,"Passwordsshouldneverbewrittendownorstoredon-linewithoutencryption.
"isthemostcommonpolicysetbymanyorganizations.
ItshouldbenotedthattherecanbeinteractionsandinterdependenciesbetweentheGenerationandMaintenancestagesastheusermayholdanaprioripreferenceonwhethertomemorizeortostorethepasswordwhichcanimpacttheuser'spasswordACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle131composingprocesswiththethoughtthathe/shehastomemorizethetextforlateruse.
Also,thememorabilityofatextstringcanimpacttheuser'sdecisiononhowtomaintainthepassword.
2.
3AuthenticationThelaststageinthelifecycleisAuthenticationinwhichthepasswordisusedtogainaccesstotheassociatedaccount/system.
Theauthenticationstageisrepetitiveasthepasswordwillbeusedmultipletimesforitsentirelifespanuntilachangeeventoccurssuchasforgotten,expiration,passwordcompromised,oruser'sdesiretosynchronizemultiplepasswordsfordifferentaccounts.
Ineachauthenticationinstance,theuserneedstoretrievethecorrectpasswordeitherbyrecallingfrommemoryorbylookingupfromstoredmediathatmatchestheassociatedaccount/systemforaccess,atthesametimestruggleswithforgettingduetomemorydecayorinterferencesfromotherpasswords,andneedstoenterthepasswordcorrectlywhichrequiresattentions,motorskills,musclememory,andhand-eyecoordination.
Therearemanyfactorsthatcanaffectauser'sauthenticationexperiencewithapasswordsuchasauthenticationfrequency,howthepasswordismaintained,memorabilityandtype-abilityoftheaccount/passwordpair,orinterferencesfromotherpasswords.
Theauthenticationexperience(positiveornegative)cantheninfluencehowtheusercreatesnewpasswordswhenhe/shemovesoutfromtheauthenticationstageandstartsthenextpasswordmanagementlifecycle.
3HolisticResearchApproachonUserPasswordBehaviorsGuidedbytheFrameworkTheframeworkservesasaconstantreminderinresearchapproachestoalwaysconsiderusers'passwordbehaviorsinaholisticmannerthat,atanypointoftime,theusersaregoingthroughastageinthepasswordmanagementlifecycleandtheirbehaviorsareareflectionoftheinteractionsamongstagesinthelifecycle,thecapabilitiesandlimitationsofthehumaninformationprocessor,andtheindividualfactors.
Inthefollowingsections,wediscusstheimportanceofemployingaholisticapproachandsomemisconceptionsintheliteratureonuserpasswordbehaviorsresearch.
Wealsoreviewrelevantresearchandpointoutareasforfurtherresearch.
3.
1PasswordGeneration–MorethanaSelectionTaskThemostcommonmisconceptionofpasswordgenerationintheliteratureisthenotionofusers'selectingpasswords.
Itisoftendescribedthatusersselectbadandinsecurepasswords[11,18,19].
However,generatingpasswordsismorethanaselectiontaskinthattheword"selection"implieschoosingfromasetofreadilyavailablepasswordoptions.
Usersonlyselectpasswordswhentheydecidetoreuseexistingpasswords.
Inpasswordgeneratingtasks,usersemployhigh-levelcognitive,132Y.
-Y.
Choongproblem-solvingtaskswhentheyarefacedwiththetaskofcomposingtextstringstosatisfypasswordrequirementsofcombiningandarrangingvariouscharacterswithlengthlimitswhiletryingtomakesenseofthetextstringsandmeetingtheirownpersonalneeds.
3.
2PasswordComposition–ProblemSolvingAsnotedearlier,passwordcompositionisinessenceproblemsolvinginthatitinvolvesgoalsdefining,ideassearching/planning,andrefining/finalizing.
Therehavebeenfewstudiesinvestigatingpasswordgenerationunderrestrictivecompositionrules[11,20,21].
However,thosestudiesfocusedonlyontheoutcomesofthepasswordgeneration,i.
e.
thecharacteristicsofthepasswordsgenerated,andtheimpactsoftherestrictions,butdidnotinvestigatetheentiregenerationprocess.
Passwordresearchhasseldomrecognizedthatcompositionisnotatrivialtask.
Thereisaneedforresearchonhowuserssolvethe"passwordgeneration"problemfromthebeginningwhenusersfirstencounterandperceivetheproblemdomain;comprehendtheconstraints(Environmental,Cognitive,andIndividual);explorethesolutionspace;verifysolutionfeasibility;refine/narrowsolutionspace;andmakedecisionsonthebest-fitsolution.
Byresearchingpasswordgenerationasaproblemsolvingeffortwiththeframework,itenablesustoinvestigatetopicssuchasthedifferencesamongthe"problemsolvers"(e.
g.
expertsvs.
novices);theimpactsofpasswordconstraintsonthesolutionspace;themostimportantfactor(s)leadingtothebest-fitsolution;andtheinfluencesofthemaintenancedecisiononpasswordgeneration.
3.
3TheEconomics–PasswordManagementLifecycleThecostofpasswordsappearslowataglancefromtheserviceproviders'perspectiveasdeployingafunctionalpasswordsystemisrelativelysimplecomparedtootherauthenticationalternativessuchasbiometricsorsmartcards.
Fromtheusers'perspective,itdoesn'tseemtocostmuch,either,sincepasswordsallowinstantaneousaccountsetupandarereadilyunderstood[1].
However,therearesignificantcostsassociatedwiththepasswordauthenticationmechanismforboththeserviceprovidersandtheendusers.
Itisshownqualitatively[15]thatanunusablepasswordpolicycandegradeemployees'productivity,andultimatelyaffecttheorganization'soverallproductivity.
Itisreportedthatmorethan30%ofITsupportcentercallswererelatedtopasswordresets[22].
Onaverage,eachcalllastsabout5minutesandthecostofsupportperincidentis$251onaverage[23].
Inadditiontothesupportcentercost,therearealsocostsassociatedwithauser'stimeandproductivitylosswhenmakingcallstothesupportcenter.
Ofthethreestagesintheuserpasswordmanagementlifecycle,GenerationandAuthenticationarethemosteffort-andtime-consumingstagesfortheusers.
Itisimperativeforresearcherstostartinvestigatingtheassociatedcostsforthesetwostagesfromtheusers'perspective.
1AllcostestimatesinthispaperarebasedontheUnitedStatesdollar,i.
e.
USDorUS$.
ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle133TheCostofPasswordGenerationBesidescompositionrules,organizationsoftenincludeotherrequirementssuchaspasswordexpiration,passwordreuselimitations,andpassworduniquenessintheirorganizationalpolicies.
Itwillbedifficulttoquantifythedirectimpactsofthepasswordpoliciesonusers'cognitiveactivitiesandbehaviorsandtranslatetheimpactsintoassociatedcosts.
Onewaytoestimatethecostsistolookatthenumberofpasswordsgeneratedandthetimeittakestogeneratethosepasswords.
InthestudyperformedbyChoongetal.
[4],itisreportedthatanemployeehasonaverage9work-relatedpasswords.
Anorganizationalpasswordpolicycommonlylookslike:PasswordmustbeoChangedatleastevery60daysoAtleast12characterslongoConsistentwiththecomplexityrequirements(mixed-casecharacters,numbers,andspecialcharacters)PasswordmustnotoBewrittendownorstoredon-lineonnon-organizationsystemsoReuseanypasswordofthelast24priorpasswordsoUsethesamepasswordonmultiplesystems,applicationsorwebsitesIfanewemployeeacquireshis/her9passwordsinthefirstmonthsonthejob,byfollowingthepolicy,itmeansthatthenewemployeewillhavetogenerate54uniquepasswordswithinthefirstyearofemployment,whichmeansthatauniqueandcomplexpasswordisgeneratedonaverageeveryweekthroughouttheyear.
Theconstantpasswordgenerationtaskputsahugeamountofburdenonemployeeswhoonlyseemanagingpasswordsasasecondarytaskenablingaccesstotheirprimarytask[24].
Thisestimatedoesnottakeintoaccountotherpasswordgenerationeventsoutsideoftheregularchangingcycleduetounplannedincidentssuchasforgottenpasswordsorpasswordcompromises.
Itisalsoreportedthatthelongesttimeittakestogeneratepasswordsforworkis,onaverage,98.
5minutesforfrequentpasswordsand86.
6minutesforoccasionallypasswords[4].
Theworstscenario:ifeverypasswordtakesthelongesttimetogenerate,anemployeecanspend18.
6hours(or2businessdays)ata60-daycycleeachyeargeneratingpasswordsfortheirwork.
Iftheaverageannualwageof$81,704(or$39.
15/hour)offederalcivilianworkersisused[25],wecanestimateanannualcostof$728.
19peremployeebeingpulledawayfromworktogeneratepasswords.
TheCostofAuthenticationUsersinteractwithauthenticationsystemsonadailybasisforwork,school,orforpersonaluse.
AsshowninFigure1,eachauthenticationinstanceinvolvesretrievingthecorrectpassword(frommemoryorfromstoredmedia)andtypingthepasswordtogainaccess.
Thisauthenticationinstancecanbeiterativeinitselfifanystepfailsinthesequence,e.
g.
incorrectpasswordretrieved–forgettingorinterferences,typingerrors,orsystemfailure.
134Y.
-Y.
ChoongResearchinvestigatingreal-lifeuserauthenticationexperienceincludesdiarystudies,e.
g.
[15,24,26,27],andlongitudinalstudies,e.
g.
[2,28].
Thenumberofauthenticationinstancesvariesgreatlyinthosestudies,rangingfromtyping8.
11passwordsperday[2],75passwordeventsinatwo-weekspan[27],to23authenticationeventsinadaywith46.
9%(~11times)beingpasswordlogins[24].
Usersexpressedfrustrationandtimewastedfromvariousloginproblemssuchasmistypingpasswords,forgettingpasswords,mismatchingaccountandpassword,andgettinglockedout[4].
Whenenteringpasswordsfrommemory,itisreportedthatthemostcommonerrorisincorrectcapitalization(shifting),followedbymissingcharacter(s)[29].
Whileitisdifficulttoestimatethefullcostsofusers'authenticationexperiencewithpasswords,wecanstartwithasimplifiedwaytocalculatethecostsassociatedwithpasswordentry.
InthediarystudydoneattheNationalInstituteofStandardsandTechnology(NIST)[24],employeesenteredpasswordsabout11timesinadayandtheNIST'spasswordpolicyrequirespasswordsbeing12charactersorlonger.
Asreportedin[21],ittakesroughly14secondstotypeapasswordof8characterslong.
Estimatingconservatively(astheNISTrequiredpasswordsarelongerthan8characters),atypicalfull-timeemployeecanspend10.
27hoursayearontypingpasswordsforauthentication2.
Theestimateshouldbedoubled,i.
e.
20.
54hours,asacompleteauthenticationoftenincludestypingtheusernamebesidesthepassword.
Usingthesamewageinformation(i.
e.
$39.
15/hour)in[25],theannualcostperemployeeonenteringusernameandpasswordpairsforauthenticationisroughly$804.
14.
Foranorganizationwith100employees,aroughestimateof$153,000annuallycanbespentonemployees'basicpasswordmanagementactivities(Maintenancenotincluded),i.
e.
Generation($728.
19)andAuthentication($802.
58),asidefromproductivity.
Forlargeorganizationswith1,000employeesormore,thiscostofbasicpasswordmanagementcanbemorethan$1,500,000eachyear.
HiddenCostsBeyondthetwocostsforbasicpasswordmanagementdemonstratedearlier,thereareotherhiddencostsassociatedwiththepasswordmanagementlifecycle.
Forexample,itisnotuncommonfororganizationstoenforcetimeoutsandscreenlockingtomitigateopportunisticmisuseofanunattendedcomputer[15,24].
Itcreatesconstanttaskinterruptionsandrequiresuserstorecoverfrominterruptionsthatwillalsotranslatetoproductivityloss.
Moreandmoreusers'computingexperienceshappenonmobiledevicessuchaslaptopcomputers,tablets,andsmartphones.
Thecognitiveandbehavioralframeworkwillprovideusafoundationtoexploretheimpactsonpasswordenteringexperiencewithdifferentkeyboardsandlayouts.
Itwillalsoallowustoinvestigatethepotentialinterferencesonusers'musclememoryofawell-practicedpasswordandtheincreaseonrecallerrorsortypingerrorsduetotransitioningfromoneplatformtoanotherorhavingtoswitchbackandforthbetweenplatforms.
Researchisneededtounderstandtheassociatedcostsofusers'mobileauthenticationexperience.
2Totalof240workdaysassuming5daysaweek,52weeks,andminustwovacationweeksand10federalholidays.
ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle1353.
4PositiveAttitudes=BetterSecurityBehaviorsandLessFrustrationIngeneral,usersareconcernedwithsecurity,buttheyoftenareforcedtodeveloplesssecurecopingstrategies(e.
g.
reusepasswords,orwritedownpasswords)whentheyareunabletocomplywithpasswordpoliciesthataretoorestrictiveandinflexibletomatchusers'capabilities[15].
However,inalarge-scalesurveystudy[4],theresearchersfoundthatusers'attitudestowardorganizationalpasswordrequirementsarerelatedtotheirpasswordbehaviorsandexperiencesacrossallthreestagesinthepasswordmanagementlifecycle.
Usersholdingpositiveattitudestowardpasswordrequirementsvaluemoreincreatingcompliantandstrongpasswords,writedownpasswordslessoften,feellessfrustrationwithauthenticationproblems,betterunderstandandrespectthesignificanceofsecurity,ascomparedtouserswithnegativeattitudes.
Thefindingsonattitudesleadustomoreresearchquestionsonsearchingforplausiblemeanstoencouragepositiveuserattitudesandtoprovideusersupportaddressingthenegativethoughts.
4ConclusionArecybersecurityandusabilitytwoparallellinesthatnevermeetOr,aretheycrossroadswheretheintersectionisyettobereachedWebelievethat,thoughitmaynotbeeasilyseen,theintersectiondoesexistamongthetheoretical,technical,andusabilityaspectsofcybersecurity.
Itrequirescollaborationfromresearchersandpractitionerswithmulti-disciplinarybackgroundsinfindingtherightbalancetoreachthatintersectionthatwillprovideacceptablesecurityandusability.
Moreresearchisneededonusers'cognitiveandbehavioralactivitiesregardinginterrelationshipsamongthethreestagesinthepasswordmanagementlifecycle.
Whatcanbedonemoreonthetechnologysidetoensuresecurityandprotectinformationassets,andalleviatetheburdenonuserssotheywillthinkmorepositivelyaboutsecuritymeasuresFutureresearchshoulduseaholisticapproachwiththegoalofprovidingdatatoenablethepolicymakerstomakeinformeddecisionsonsecuritypoliciesthatarebothsecureandusable,andtoprovideguidanceinusersupportandeducationtopromotepositiveattitudes.
References1.
Herley,C.
,vanOorschot,P.
:AResearchAgendaAcknowledgingthePersistenceofPasswords.
IEEESecurity&Privacy10(1),28–36(2012)2.
Florêncio,D.
,Herley,C.
:ALarge-ScaleStudyofWebPasswordHabits.
In:Proceedingsofthe16thInternationalConferenceonWorldWideWeb,pp.
657–666.
ACM(2007)3.
Hoonakker,P.
,Bornoe,N.
,Carayon,P.
:PasswordAuthenticationfromaHumanFactorsPerspective:ResultsofaSurveyamongEnd-Users.
In:ProceedingsoftheHumanFactorsandErgonomicsSocietyAnnualMeeting,vol.
53(6),pp.
459–463.
SAGEPublications(2009)136Y.
-Y.
Choong4.
Choong,Y.
-Y.
T.
M.
,Liu,H.
-K.
:ALarge-ScaleSurveyofEmployees'PasswordBehaviors.
Manuscriptsubmittedforpublication(2014)5.
Goverance,I.
T.
:BoardroomCyberWatch2013–Report(2013),http://www.
itgovernance.
co.
uk/what-is-cybersecurity/boardroom-cyber-watch.
aspx6.
Haskins,W.
:NetworkSecurity:GullibleUsersAretheWeakestLink.
TechNewsWorld(November29,2007),http://www.
technewsworld.
com/story/60520.
html(retrieved)7.
Malenkovich,S.
:10WorstPasswordIdeas(AsSeenIntheAdobeHack).
KasperskyLabDaily(November21,2013),http://blog.
kaspersky.
com/10-worst-password-ideas-as-seen-in-the-adobe-hack/(retrieved)8.
MeriTalk.
:CyberSecurityExperience:SecurityProsfromMars,UsersfromMercury(2013),http://www.
meritalk.
com/cybersecurityexperience(retrieved)9.
Sasse,M.
A.
,Brostoff,B.
,Weirich,D.
:Transformingthe'weakestlink'—ahuman/computerinteractionapproachtousableandeffectivesecurity.
BTTechnologyJournal19(3),122–131(2001)10.
Brown,A.
S.
,Bracken,E.
,Zoccoli,S.
,Douglas,K.
:Generatingandrememberingpasswords.
AppliedCognitivePsychology18(6),641–651(2004)11.
Campbell,J.
,Ma,W.
,Kleeman,D.
:Impactofrestrictivecompositionpolicyonuserpasswordchoices.
Behaviour&InformationTechnology30(3),379–388(2011)12.
Yan,J.
,Blackwell,A.
,Anderson,R.
,Grant,A.
:PasswordMemorabilityandSecurity:EmpiricalResults.
IEEESecurity&Privacy2(5),25–31(2004)13.
Florêncio,D.
,Herley,C.
,Coskun,B.
:DoStrongWebPasswordsAccomplishAnythingIn:Proceedingsofthe2ndUSENIXWorkshoponHotTopicsinSecurity,pp.
1–6(2007)14.
Herley,C.
:SoLong,AndNoThanksfortheExternalities:TheRationalRejectionofSecurityAdvicebyUsers.
In:NSPW2009Proceedingsofthe2009WorkshoponNewSecurityParadigmsWorkshop,pp.
133–144(2009)15.
Inglesant,P.
,Sasse,M.
A.
:TheTrueCostofUnusablePasswordPolicies:PasswordUseintheWild.
In:ProceedingsoftheSIGCHIConferenceonHumanFactorsinComputingSystems,pp.
383–392(2010)16.
Flower,L.
H.
,Hayes,J.
R.
:ACognitiveProcessTheoryofWriting.
CollegeCompositionandCommunication32(4),365–387(1981)17.
Flower,L.
H.
,Hayes,J.
R.
:Problem-solvingstrategiesandthewritingprocess.
CollegeEnglish39(4),449–461(1977)18.
ImervaApplicationDefenseCenter(ADC).
:ConsumerPasswordWorstPractices.
ImpervaWhitePaper(2009),http://www.
imperva.
com/docs/wp_consumer_password_worst_practices.
pdf(retrieved)19.
Zhang,Y.
,Monrose,F.
,Reiter,M.
K.
:TheSecurityofModernPasswordExpiration:AnAlgorithmicFrameworkandEmpiricalAnalysis.
In:Proceedingsofthe17thACMConferenceonComputerandCommunicationsSecurity,pp.
176–186(2010)20.
Proctor,R.
W.
,Lien,M.
-C.
,Vu,K.
-P.
L.
,Schultz,E.
E.
,Salvendy,G.
:Improvingcomputersecurityforauthenticationofusers:Influenceofproactivepasswordrestrictions.
BehaviorResearchMethods,Instruments,&Computers34(2),163–169(2002)21.
Vu,K.
-P.
L.
,Bhargav,A.
,Proctor,R.
W.
:ImposingPasswordRestrictionsforMultipleAccounts:ImpactonGenerationandRecallofPasswords.
In:ProceedingsoftheHumanFactorsandErgonomicsSocietyAnnualMeeting,vol.
47(11),pp.
1331–1335.
SAGEPublications(2003)ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle13722.
Pratt,M.
K.
:5AnnonyingHelpDeskCalls-AndHowtoBanishThem.
PCWorld(April3,2012),http://www.
pcworld.
com/article/253073/5_annoying_help_desk_calls_and_how_to_banish_them.
html(retrieved)23.
Abel,S.
:IndustryAverageHelpDeskSupportCosts.
TheContentWrangler(April28,2011),http://thecontentwrangler.
com/2011/04/28/industry-average-help-desk-support-costs/(retrieved)24.
Steves,M.
,Chisnell,D.
,Sasse,M.
A.
,Krol,K.
,Theofanos,M.
,Wald,H.
:Report:AuthenticationDiaryStudy.
NISTIR7983.
NationalInstituteofStandardsandTechnology,Gaithersburg,MD(2014)25.
U.
S.
BureauofEconomicAnalysis:NationalIncomeandProductAccounts,Tables6.
6D,WagesandSalariesPerFull-TimeEquivalentEmployeebyIndustry(August7,2013),http://www.
bea.
gov/national/nipaweb(retrieved)26.
Grawemeyer,B.
,Johnson,H.
:Usingandmanagingmultiplepasswords:Aweektoaview.
InteractingwithComputers23(3),256–267(2011)27.
Hayashi,E.
,Hong,J.
I.
:ADiaryStudyofPasswordUsageinDailyLife.
In:ProceedingsoftheSIGCHIConferenceonHumanFactorsinComputingSystems,pp.
2627–2630.
ACM(2011)28.
Keith,M.
,Shao,B.
,Steinbart,P.
:ABehavioralAnalysisofPassphraseDesignandEffectiveness.
JournaloftheAssociationforInformationSystems10(2),63–89(2009)29.
Stanton,B.
,Greene,K.
K.
:CharacterStrings,MemoryandPasswords:WhataRecallStudyCanTellUs.
In:Proceedingsofthe16thInternationalConferenceonHuman-ComputerInteraction(inpress,2014)
月神科技怎么样?月神科技是由江西月神科技有限公司运营的一家自营云产品的IDC服务商,提供香港安畅、香港沙田、美国CERA、华中电信等机房资源,月神科技有自己的用户群和拥有创宇认证,并且也有电商企业将业务架设在月神科技的平台上。目前,香港CN2云服务器、洛杉矶CN2云主机、华中电信高防vps,月付20元起。点击进入:月神科技官方网站地址月神科技vps优惠信息:香港安畅CN2-GIA低至20元核心:2...
华为云怎么样?华为云用在线的方式将华为30多年在ICT基础设施领域的技术积累和产品解决方案开放给客户,致力于提供稳定可靠、安全可信、可持续创新的云服务,做智能世界的“黑土地”,推进实现“用得起、用得好、用得放心”的普惠AI。华为云作为底座,为华为全栈全场景AI战略提供强大的算力平台和更易用的开发平台。本次年终聚惠618活动相当给力,1核2G内存1m云耀云服务器仅88元/年起,送主机安全基础版套餐,...
今天下午遇到一个网友聊到他昨天新注册的一个域名,今天在去使用的时候发现域名居然不见。开始怀疑他昨天是否付款扣费,以及是否有实名认证过,毕竟我们在国内域名注册平台注册域名是需要实名认证的,大概3-5天内如果不验证那是不可以使用的。但是如果注册完毕的域名找不到那也是奇怪。同时我也有怀疑他是不是忘记记错账户。毕竟我们有很多朋友在某个商家注册很多账户,有时候自己都忘记是用哪个账户的。但是我们去找账户也不办...
kaspersky.com为你推荐
在线教育平台在线教育平台系统有哪些futureshop在加拿大买电脑的注意事项是什么?商标注册流程及费用注册商标的流程是什么,大概需要多少费用?psbc.com怎样登录wap.psbc.com丑福晋谁有好看的言情小说介绍下巫正刚阿迪三叶草彩虹板鞋的鞋带怎么穿?详细点,最后有图解。高分求seo优化工具seo优化软件有哪些?百度关键词工具百度有关键字分析工具吗?Google AdWords有的www.bbb336.comwww.zzfyx.com大家感觉这个网站咋样,给俺看看呀。多提意见哦。哈哈。51sese.comwww.51xuanh.com这是什么网站是骗人的吗?
php主机空间 七牛优惠码 siteground 便宜域名 360抢票助手 绍兴高防 灵动鬼影 国外免费全能空间 699美元 网通服务器托管 昆明蜗牛家 100mbps 鲁诺 web服务器安全 支持外链的相册 江苏双线服务器 台湾google 海外空间 789 智能dns解析 更多