Show simple item record

dc.contributor.convenorJim Underwood
dc.contributor.authorBryant, Kay
dc.contributor.authorCampbell, John
dc.contributor.editorCampbell, Bruce
dc.contributor.editorUnderwood, Jim
dc.contributor.editorBunker, Deborah
dc.date.accessioned2017-05-03T11:25:44Z
dc.date.available2017-05-03T11:25:44Z
dc.date.issued2005
dc.date.modified2007-03-21T21:24:20Z
dc.identifier.refurihttp://depts.it.uts.edu.au/is/ACIS2005/
dc.identifier.urihttp://hdl.handle.net/10072/2767
dc.description.abstractMaintaining the security of information systems and associated data resources is vital if an organisation is to minimise losses. Access controls are the first line of defence in this process. The primary function of access controls is to restrict the use of information systems and resources to authorised users. Password-based systems remain the predominant method of user authentication despite the many sophisticated and viable security alternatives that have emerged from research and development. However, evidence suggests that passwords as a means of authentication is often compromised by poor security practices. This paper presents the results of a survey that examines user practice in creating and using password keys and reports the findings on user password composition and security practices for e-mail accounts. Despite a greater awareness of security issues, the results show that an improvement in user password management practice is required.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.languageEnglish
dc.language.isoeng
dc.publisherUniversity of Technology
dc.publisher.placeSydney
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofconferencename16th Australasian Conference on Information Systems
dc.relation.ispartofconferencetitleProceedings of the 16th Australasian Conference on Information Systems (ACIS 2005)
dc.relation.ispartofdatefrom2005-11-30
dc.relation.ispartofdateto2005-12-02
dc.relation.ispartoflocationSydney
dc.rights.retentionY
dc.subject.fieldofresearchcode289999
dc.titleAn Empirical Study of User Practice in Password Security and Management
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.facultyGriffith Business School, Dept of Employment Relations and Human Resources
gro.date.issued2005
gro.hasfulltextNo Full Text
gro.griffith.authorBryant, Kay


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record