1987
DOI: 10.1016/0167-4048(87)90013-7
|View full text |Cite
|
Sign up to set email alerts
|

Computer security: The long road ahead

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

1988
1988
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 6 publications
0
13
0
Order By: Relevance
“…It has been suggested that password characteristics affect memorizability [2,33,28,45,46]. Consequently, it follows that ifa password is difficult to remember it will be written down [3,27,28,52].…”
Section: Relationship Between Password Characteristics and Memorizabimentioning
confidence: 99%
See 2 more Smart Citations
“…It has been suggested that password characteristics affect memorizability [2,33,28,45,46]. Consequently, it follows that ifa password is difficult to remember it will be written down [3,27,28,52].…”
Section: Relationship Between Password Characteristics and Memorizabimentioning
confidence: 99%
“…A password that is difficult to remember invites users to write it down, ensuring they will not forget it but compromising its secrecy [45]. On the other hand, if a difficult password is not written down, it may well be forgotten, resulting in serious inconve-nience [I, 3).…”
Section: Evolution Of Passwordsmentioning
confidence: 99%
See 1 more Smart Citation
“…Such passwords are difficult to guess by others, but are difficult to remember. To remember them, users write them down [Paans and Herschberg, 1987], which reduces their secrecy. Moreover, most users have multiple passwords for different systems and applications, forcing them to remember several passwords [Adams and Sasse, 1999].…”
Section: Knowledge-based Authenticationmentioning
confidence: 99%
“…End users at the workplace are said to be "the weakest link" in information systems (IS) security (Guo, Yuan, Archer, & Connelly, 2011;Paans & Herschberg, 1987). Early studies on data breaches have showed that many hackers turned out to be employees or insiders (Escamilla, 1998;Russell & Gangemi 1992, cited in Cavusoglu, Mishra, & Raghunathan, 2005.…”
Section: Introductionmentioning
confidence: 99%