Applying Chunking Theory in Organizational Password Guidelines
نویسندگان
چکیده
منابع مشابه
Applying Chunking Theory in Organizational Password Guidelines
This research evaluates the human impact that password authentication issues have on the security of information systems within organizations. This research resulted in the creation of password guidelines for authentication with passwords based on Miller’s (1956) and Cowan’s (2001) chunking theory research and a model for predicting the vulnerability that a particular set of conditions have on ...
متن کاملAn Organizational Learning Method for Applying Usability Guidelines and Patterns
As usability knowledge and techniques continues to grow, there is an increasing need to provide tools that disseminate the accumulated wisdom of the field. Usability guidelines are one technique that is used to convey usability knowledge. Another is the emerging discipline of usability patterns. This paper presents an approach that combines these techniques in a case-based architecture and util...
متن کاملApplying organizational routines in understanding organizational change
Organizational routines are considered basic components of organizational behavior and repositories of organizational capabilities (Nelson & Winter, 1982). They do, therefore, hold one of the keys to understanding organizational change. The article focuses on how the concept of organizational routines can be applied in empirical research to understand organizational change. We identify problems...
متن کاملApplying Queuing and Probability Theory to Predict Organizational Behaviors
Most existing organizational design processes focus on either the qualitative or domain-independent features of candidate designs. This paper demonstrates the significance of domain-specific features through an examination of an organizationally-driven information retrieval network. The behavior of a search process for appropriate agents and the consequences of hierarchical control in a continu...
متن کاملPassword Education Based on Guidelines Tailored to Different Password Categories
General password policies do not guarantee that passwords fulfilling the requirement are good enough. The policies have a tendency to be too broad to be useful for all users. Different users have different designing processes based on what kind of passwords they most easily remember. Users are also often left to generate passwords on their own without any training. In our study we used new pass...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information, Information Technology, and Organizations (Years 1-3)
سال: 2006
ISSN: 1557-1319,1557-1327
DOI: 10.28945/150