Password composition and security: an exploratory study of user practice

John Campbell, Kay Bryant

Research output: A Conference proceeding or a Chapter in BookConference contribution

Abstract

User authentication is a vital element in ensuring the secure operation of computer-based systems. The most common control mechanism for authenticating user access to computerised information systems is the use of passwords. Password-based systems remain the predominant method of user authentication despite the many sophisticated and viable security alternatives that have emerged from research and development. However, evidence suggests that this method is often compromised by poor security practices. This paper presents the results of a survey that examines user practice in creating and using password keys. This paper reports the findings from a pilot study examining user password composition and security practices for e-mail. Despite a greater awareness of security issues, the results show that an improvement in user password management practice is required
Original languageEnglish
Title of host publicationProceedings of the fifteenth Australasian conference on Information Systems
EditorsJaven Ang, Shirlee-Ann Knight
Place of PublicationHobart
PublisherAssociation for Information Systems
Pages220-225
Number of pages6
ISBN (Print)9781864876948
Publication statusPublished - 2004
Externally publishedYes
EventFifteenth Australasian Conference on Information Systems: ACIS 2004 - Hobart, Hobart, Australia
Duration: 1 Dec 20043 Dec 2004

Conference

ConferenceFifteenth Australasian Conference on Information Systems
CountryAustralia
CityHobart
Period1/12/043/12/04

Fingerprint Dive into the research topics of 'Password composition and security: an exploratory study of user practice'. Together they form a unique fingerprint.

Cite this