IS

Haga, William J.

Topic Weight Topic Terms
0.314 satisfaction information systems study characteristics data results using user related field survey empirical quality hypotheses
0.236 use question opportunities particular identify information grammars researchers shown conceptual ontological given facilitate new little
0.135 information systems paper use design case important used context provide presented authors concepts order number

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Zviran, Moshe 1
access control 1 information system security 1 passwords 1 user authentication. 1

Articles (1)

Password Security: An Empirical Study. (Journal of Management Information Systems, 1999)
Authors: Abstract:
    Organizations are more dependent than ever on the reliable operation of their information systems, which have become a key to their success and effectiveness. While the growing dependence on information systems creates an urgent need to collect information and make it accessible, the proliferation of computer technology has also spawned opportunities for ill-intentioned individuals to violate the information systems' integrity and validity. One of the most common control mechanisms for authenticating users of computerized information systems is the use of passwords. However, despite the widespread use of passwords, little attention has been given to the characteristics of their actual use. This paper addresses the gap in evaluating the characteristics of real-life passwords and presents the results of an empirical study on password usage. It investigates the core characteristics of user-generated passwords and associations among those characteristics.