An assessment on the password practices among students

User authentication can be defined as the process of proving the user's identity. Three typical categories of user authentication are based on users' knowledge (i.e. PIN and Passwords), users' possession (i.e. Smart Card and Token) and users' characteristics (i.e. Iris and typing...

Full description

Saved in:
Bibliographic Details
Main Authors: M.Z., Jali,, S., Ismail,, Z.H., Abdullah,
Format: Article
Language:en_US
Published: Asian Research Publishing Network (ARPN) 2015
Subjects:
Online Access:http://ddms.usim.edu.my/handle/123456789/8510
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.usim-8510
record_format dspace
spelling my.usim-85102017-02-23T02:52:34Z An assessment on the password practices among students M.Z., Jali, S., Ismail, Z.H., Abdullah, Knowledge-based authentication Memorability Password User authentication Vulnerabilities User authentication can be defined as the process of proving the user's identity. Three typical categories of user authentication are based on users' knowledge (i.e. PIN and Passwords), users' possession (i.e. Smart Card and Token) and users' characteristics (i.e. Iris and typing pattern). This paper presents an extensive review related to password-based authentication and then reports the latest experimental study conducted to evaluate the password practices among students within the authors' institution. Participants within the study were given a scenario where their accounts were hacked and straightforwardly, they were asked to create new passwords according to three conditions; namely C1 (i.e. having at least one upper, lower, number and special character), C2 (i.e. contains at least three words) and C3 (i.e. combination of C1 and C2 respectively). After a week time, they were again invited to participate by writing down their passwords to investigate memorability. Overall, the study managed to recruit 380 students, having a total of 1140 passwords. From the analysis covering password memorability, password creation and password perception, it could be reported that the three tested conditions have both positive and negative outcomes, thus authors suggest that 'a second look' should be considered if these conditions to be implemented in real setting. © 2005 - 2014 JATIT & LLS. All rights reserved. 2015-06-25T07:04:29Z 2015-06-25T07:04:29Z 2014 Article 19928645 http://ddms.usim.edu.my/handle/123456789/8510 en_US Asian Research Publishing Network (ARPN)
institution Universiti Sains Islam Malaysia
building USIM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universit Sains Islam i Malaysia
content_source USIM Institutional Repository
url_provider http://ddms.usim.edu.my/
language en_US
topic Knowledge-based authentication
Memorability
Password
User authentication
Vulnerabilities
spellingShingle Knowledge-based authentication
Memorability
Password
User authentication
Vulnerabilities
M.Z., Jali,
S., Ismail,
Z.H., Abdullah,
An assessment on the password practices among students
description User authentication can be defined as the process of proving the user's identity. Three typical categories of user authentication are based on users' knowledge (i.e. PIN and Passwords), users' possession (i.e. Smart Card and Token) and users' characteristics (i.e. Iris and typing pattern). This paper presents an extensive review related to password-based authentication and then reports the latest experimental study conducted to evaluate the password practices among students within the authors' institution. Participants within the study were given a scenario where their accounts were hacked and straightforwardly, they were asked to create new passwords according to three conditions; namely C1 (i.e. having at least one upper, lower, number and special character), C2 (i.e. contains at least three words) and C3 (i.e. combination of C1 and C2 respectively). After a week time, they were again invited to participate by writing down their passwords to investigate memorability. Overall, the study managed to recruit 380 students, having a total of 1140 passwords. From the analysis covering password memorability, password creation and password perception, it could be reported that the three tested conditions have both positive and negative outcomes, thus authors suggest that 'a second look' should be considered if these conditions to be implemented in real setting. © 2005 - 2014 JATIT & LLS. All rights reserved.
format Article
author M.Z., Jali,
S., Ismail,
Z.H., Abdullah,
author_facet M.Z., Jali,
S., Ismail,
Z.H., Abdullah,
author_sort M.Z., Jali,
title An assessment on the password practices among students
title_short An assessment on the password practices among students
title_full An assessment on the password practices among students
title_fullStr An assessment on the password practices among students
title_full_unstemmed An assessment on the password practices among students
title_sort assessment on the password practices among students
publisher Asian Research Publishing Network (ARPN)
publishDate 2015
url http://ddms.usim.edu.my/handle/123456789/8510
_version_ 1645152431091220480
score 13.214268