Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Making Passwords Secure and Usable

  • Conference paper
People and Computers XII

Abstract

To date, system research has focused on designing security mechanisms to protect systems access although their usability has rarely been investigated. This paper reports a study in which users’ perceptions of password mechanisms were investigated through questionnaires and interviews. Analysis of the questionnaires shows that many users report problems, linked to the number of passwords and frequency of password use. In-depth analysis of the interview data revealed that the degree to which users conform to security mechanisms depends on their perception of security levels, information sensitivity and compatibility with work practices. Security mechanisms incompatible with these perceptions may be circumvented by users and thereby undermine system security overall.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Barton, B.F. and Barton, M. S. (1984) “User-friendly password methods for computer-mediated information systems. Computers and Security, 3, 186–195.

    Google Scholar 

  • Carroll, J.M (1996) “Computer Security” 3rd ed. Butterworth-Heinemann, MA.

    Google Scholar 

  • DeAlvare, A. M. (1988) “A Framework for Password Selection” Unix Security Workshop II. Portland. Aug 29–30

    Google Scholar 

  • DeAlvare, A. M. (1990) “How Crackers Crack Passwords OR What Passwords to Avoid” Unix Security Workshop II. Portland. Aug 27–28

    Google Scholar 

  • Davis, D. and Price, W. (1987) “Security for Computer Networks” John Wiley and Sons, Chichester.

    Google Scholar 

  • Fafchamps, D (1991) “Ethnographic workflow analysis: Specifications for design.” In Bullinger, H. J. (eds). Human aspects in computing: Design and use of interactive systems and work with terminals, Elsevier, pp. 709–715.

    Google Scholar 

  • FIPS (1985) “Password Usage” Federal Information Processing Standards Publication. May 30.

    Google Scholar 

  • Ford, W. (1994) “Computer communications security: Principles, standard protocols and techniques” Prentice Hall. NJ

    Google Scholar 

  • Glaser, B. and Strauss, A. (1967) “The discovery of grounded theory”. Aldine, Chicago.

    Google Scholar 

  • Gordon, S. (1995) “Social Engineering: Techniques and Prevention”, Computer Security, 1995

    Google Scholar 

  • Graf, P. and Mandler, G. (1984) “Activation makes words more accessible, but not necessarily more retrievable.” Journal of Verbal Learning and Verbal Behavior, 23, 553–568.

    Article  Google Scholar 

  • Graf and Schacter (1985) “Implicit and explicit memory for new associations in normal and amnesic subjects” Journal of Experimental Psychology: Learning, Memory and cognition, 11, 385–395.

    Google Scholar 

  • Hitchings, J. (1995) “Deficiencies of the Traditional Approach to Information Security and the Requirements for a New Methodology.” Computers and Security, 14, 377–383.

    Article  Google Scholar 

  • Parker, D. B. (1992) “Restating the foundation of information security” in “IT Security: The Need for International Co-operation” G. G. Gable and W.J. Caelli (eds). Elsevier Science Publishers, Holland.

    Google Scholar 

  • Strauss, A. and Corbin, J. (1990) “Basics of qulitative research: Grounded theory procedures and techniques” Sage, London.

    Google Scholar 

  • Stevenson, C. and Cooper, N. (1997) “Qualitative and Quantitative research.” The Psychologist: Bulletin of the British Psychological Society, April. 159–160

    Google Scholar 

  • Suchman, L. (1987) “Plans and Situated Action: The problem of Human-MachineCommunication” Cambridge Univerity Press. Cambridge.

    Google Scholar 

  • Wickens, C.D (1992) “Engineering Psychology and Human performance” (2nd ed.) Harper Collins, NY.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag London

About this paper

Cite this paper

Adams, A., Sasse, M.A., Lunt, P. (1997). Making Passwords Secure and Usable. In: Thimbleby, H., O’Conaill, B., Thomas, P.J. (eds) People and Computers XII. Springer, London. https://doi.org/10.1007/978-1-4471-3601-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3601-9_1

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-76172-3

  • Online ISBN: 978-1-4471-3601-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics