Applying Chunking Theory in Organizational Password Guidelines

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying Chunking Theory in Organizational Password Guidelines

This research evaluates the human impact that password authentication issues have on the security of information systems within organizations. This research resulted in the creation of password guidelines for authentication with passwords based on Miller’s (1956) and Cowan’s (2001) chunking theory research and a model for predicting the vulnerability that a particular set of conditions have on ...

متن کامل

An Organizational Learning Method for Applying Usability Guidelines and Patterns

As usability knowledge and techniques continues to grow, there is an increasing need to provide tools that disseminate the accumulated wisdom of the field. Usability guidelines are one technique that is used to convey usability knowledge. Another is the emerging discipline of usability patterns. This paper presents an approach that combines these techniques in a case-based architecture and util...

متن کامل

Applying organizational routines in understanding organizational change

Organizational routines are considered basic components of organizational behavior and repositories of organizational capabilities (Nelson & Winter, 1982). They do, therefore, hold one of the keys to understanding organizational change. The article focuses on how the concept of organizational routines can be applied in empirical research to understand organizational change. We identify problems...

متن کامل

Applying Queuing and Probability Theory to Predict Organizational Behaviors

Most existing organizational design processes focus on either the qualitative or domain-independent features of candidate designs. This paper demonstrates the significance of domain-specific features through an examination of an organizationally-driven information retrieval network. The behavior of a search process for appropriate agents and the consequences of hierarchical control in a continu...

متن کامل

Password Education Based on Guidelines Tailored to Different Password Categories

General password policies do not guarantee that passwords fulfilling the requirement are good enough. The policies have a tendency to be too broad to be useful for all users. Different users have different designing processes based on what kind of passwords they most easily remember. Users are also often left to generate passwords on their own without any training. In our study we used new pass...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information, Information Technology, and Organizations (Years 1-3)

سال: 2006

ISSN: 1557-1319,1557-1327

DOI: 10.28945/150