Abstract
User authentication is a vital element in ensuring the secure operation of computer-based systems. The most common control mechanism for authenticating user access to computerised information systems is the use of passwords. Password-based systems remain the predominant method of user authentication despite the many sophisticated and viable security alternatives that have emerged from research and development. However, evidence suggests that this method is often compromised by poor security practices. This paper presents the results of a survey that examines user practice in creating and using password keys. This paper reports the findings from a pilot study examining user password composition and security practices for e-mail. Despite a greater awareness of security issues, the results show that an improvement in user password management practice is required
Original language | English |
---|---|
Title of host publication | Proceedings of the fifteenth Australasian conference on Information Systems |
Editors | Javen Ang, Shirlee-Ann Knight |
Place of Publication | Hobart |
Publisher | Association for Information Systems |
Pages | 220-225 |
Number of pages | 6 |
ISBN (Print) | 9781864876948 |
Publication status | Published - 2004 |
Externally published | Yes |
Event | Fifteenth Australasian Conference on Information Systems: ACIS 2004 - Hobart, Hobart, Australia Duration: 1 Dec 2004 → 3 Dec 2004 |
Conference
Conference | Fifteenth Australasian Conference on Information Systems |
---|---|
Country/Territory | Australia |
City | Hobart |
Period | 1/12/04 → 3/12/04 |