Improving multiple-password recall: an empirical study
نویسندگان
چکیده
Received: 8 April 2008 Revised: 18 August 2008 2nd Revision: 31 January 2009 Accepted: 23 February 2009 Abstract As one of the most common authentication methods, passwords help secure information by granting access only to authorized parties. To be effective, passwords should be strong, secret, and memorable. While password strength can be enforced by automated information technology policies, users frequently jeopardize secrecy to improve memorability. The password memorability problem is exacerbated by the number of different passwords a user is required to remember. While short-term memory theories have been applied to individual-password management problems, the relationship between memory and the multiple-password problem has not been examined. This paper treats the multiple-password management crisis as a search and retrieval problem involving human beings’ long-term memory. We propose that interference between different passwords is one of the major challenges to multiple-password recall and that interference alleviation methods can significantly improve multiple-password recall. A lab experiment was conducted to examine the effectiveness of two interference alleviation methods: the list reduction method and the unique identifier method. While both methods improve multiple-password recall performance, the list reduction method leads to statistically significant improvement. The results demonstrate the potential merit of practices targeting multiple-password interference. By introducing long-term memory theory to multiple-password memorability issues, this study presents implications benefiting users and serves as the potential starting point for future research. European Journal of Information Systems advance online publication, 31 March 2009; doi:10.1057/ejis.2009.9
منابع مشابه
Multiple Password Interference in Text and Click-Based Graphical Passwords
People have difficulty remembering multiple passwords. This results in reduced security as users reuse the same password for different systems or reveal other passwords as they try to log in. It can also lead to reduced privacy, as users may rely on centralized services to manage their passwords. In this paper, we report on a laboratory study comparing recall of multiple ordinary text passwords...
متن کاملSpaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords
We report on a user study that provides evidence that spaced repetition and a specific mnemonic technique enable users to successfully recall multiple strong passwords over time. Remote research participants were asked to memorize 4 PersonAction-Object (PAO) stories where they chose a famous person from a drop-down list and were given machine-generated random action-object pairs. Users were als...
متن کاملAuthentication Using Graphical Passwords: Basic Results
Access to computer systems is most often based on the use of alphanumeric passwords. However, users have difficulty remembering a password that is long and random-appearing. Instead, they create short, simple, and insecure passwords. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and, therefore, more secure. Using a graphical password...
متن کاملThe usability of passphrases for authentication: An empirical field study
In developing password policies, IT managers must strike a balance between security and memorability. Rules that improve structural integrity against attacks may also result in passwords that are difficult to remember. Recent technologies have relaxed the 8-character password constraint to permit the creation of longer pass-‘‘phrases’’ consisting of multiple words. Longer passphrases are attrac...
متن کاملA Longitudinal Comparison of Four Password Procedures
Computer security has become a central concern in this age of technology. Vast and ever-increasing amounts of confidential and/or proprietary data are stored and transmitted electronically, making security issues a vital concern. The primary method of preventing unauthorized access to sensitive data has been to authenticate users through the use of passwords. We have completed a pilot study and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- EJIS
دوره 18 شماره
صفحات -
تاریخ انتشار 2009