dc.contributor.convenor | Jim Underwood | |
dc.contributor.author | Bryant, Kay | |
dc.contributor.author | Campbell, John | |
dc.contributor.editor | Campbell, Bruce | |
dc.contributor.editor | Underwood, Jim | |
dc.contributor.editor | Bunker, Deborah | |
dc.date.accessioned | 2017-05-03T11:25:44Z | |
dc.date.available | 2017-05-03T11:25:44Z | |
dc.date.issued | 2005 | |
dc.date.modified | 2007-03-21T21:24:20Z | |
dc.identifier.refuri | http://depts.it.uts.edu.au/is/ACIS2005/ | |
dc.identifier.uri | http://hdl.handle.net/10072/2767 | |
dc.description.abstract | Maintaining the security of information systems and associated data resources is vital if an organisation is to minimise losses. Access controls are the first line of defence in this process. The primary function of access controls is to restrict the use of information systems and resources to authorised users. Password-based systems remain the predominant method of user authentication despite the many sophisticated and viable security alternatives that have emerged from research and development. However, evidence suggests that passwords as a means of authentication is often compromised by poor security practices. This paper presents the results of a survey that examines user practice in creating and using password keys and reports the findings on user password composition and security practices for e-mail accounts. Despite a greater awareness of security issues, the results show that an improvement in user password management practice is required. | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | University of Technology | |
dc.publisher.place | Sydney | |
dc.relation.ispartofstudentpublication | N | |
dc.relation.ispartofconferencename | 16th Australasian Conference on Information Systems | |
dc.relation.ispartofconferencetitle | Proceedings of the 16th Australasian Conference on Information Systems (ACIS 2005) | |
dc.relation.ispartofdatefrom | 2005-11-30 | |
dc.relation.ispartofdateto | 2005-12-02 | |
dc.relation.ispartoflocation | Sydney | |
dc.rights.retention | Y | |
dc.subject.fieldofresearchcode | 289999 | |
dc.title | An Empirical Study of User Practice in Password Security and Management | |
dc.type | Conference output | |
dc.type.description | E1 - Conferences | |
dc.type.code | E - Conference Publications | |
gro.faculty | Griffith Business School, Dept of Employment Relations and Human Resources | |
gro.date.issued | 2005 | |
gro.hasfulltext | No Full Text | |
gro.griffith.author | Bryant, Kay | |