The goal of this research was to determine if there was any link between personality types and password usage. The SONA system and the Amazon Mechanical Turk was used to recruit users to participate in the research study. Each user’s personality was obtained through a survey. The survey asked users to enter a strong password. Passwords were scored from zero to four with zero being classified as “too guessable” and four being classified as “very unguessable.” A second aspect of this research was to determine if a targeted message, based on the personality, had an effect on password behavior
Using weak passwords and re-using passwords can make one vulnerable to cybersecurity breaches. Cyber...
n spite of the number of public advice campaigns, researchers have found that individuals still enga...
Information security has for long time been a field of study in computer science, software engineeri...
People often create passwords for their accounts that are insecure. An insecure password is often ea...
The use of strong passwords is viewed as a recommended cybersecurity practice, as the hacking of wea...
People have many accounts and usually need to create a password for each. They tend to create insecu...
Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investi...
This study aimed to examine whether some types of people are more likely to create ‘strong’ password...
Phishing attacks and other social manipulation attacks are an everyday occurrence for most workers i...
While passwords have served the purpose of authentication throughout human history, text passwords h...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
We investigate the relationship between personality types and the strength of created and selected p...
In spite of the number of public advice campaigns, researchers have found that individuals still eng...
PhD ThesisThis thesis is concerned with usable security. It describes a series of experiments to un...
Organizations have become increasingly concerned with developing and protecting their information se...
Using weak passwords and re-using passwords can make one vulnerable to cybersecurity breaches. Cyber...
n spite of the number of public advice campaigns, researchers have found that individuals still enga...
Information security has for long time been a field of study in computer science, software engineeri...
People often create passwords for their accounts that are insecure. An insecure password is often ea...
The use of strong passwords is viewed as a recommended cybersecurity practice, as the hacking of wea...
People have many accounts and usually need to create a password for each. They tend to create insecu...
Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investi...
This study aimed to examine whether some types of people are more likely to create ‘strong’ password...
Phishing attacks and other social manipulation attacks are an everyday occurrence for most workers i...
While passwords have served the purpose of authentication throughout human history, text passwords h...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
We investigate the relationship between personality types and the strength of created and selected p...
In spite of the number of public advice campaigns, researchers have found that individuals still eng...
PhD ThesisThis thesis is concerned with usable security. It describes a series of experiments to un...
Organizations have become increasingly concerned with developing and protecting their information se...
Using weak passwords and re-using passwords can make one vulnerable to cybersecurity breaches. Cyber...
n spite of the number of public advice campaigns, researchers have found that individuals still enga...
Information security has for long time been a field of study in computer science, software engineeri...