A Behavioral Analysis of Passphrase Design and Effectiveness

Mark Keith Arizona State University

[1]  Donald A. Norman,et al.  Simulating a Skilled Typist: A Study of Skilled Cognitive-Motor Performance , 1982, Cogn. Sci..

[2]  Blake Ives,et al.  The measurement of user information satisfaction , 1983, CACM.

[3]  Alan S. Brown,et al.  Generating and remembering passwords , 2004 .

[4]  Michael E. Whitman Enemy at the gate: threats to information security , 2003, CACM.

[5]  Tor Guimaraes,et al.  The Relationship Between User Participation and User Satisfaction: An Investigation of Four Contingency Factors , 1994, MIS Q..

[6]  Moshe Zviran,et al.  A Comparison of Password Techniques for Multilevel Authentication Mechanisms , 1990, Comput. J..

[7]  J. Doumont Magical numbers: the seven-plus-or-minus-two myth , 2002 .

[8]  Edward Skoudis,et al.  Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) , 2005 .

[9]  Lnnny L. Jecosy On Interpreting the Effects of Repetition : Solving a Problem Versus Remembering a Solution , 2010 .

[10]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[11]  G. A. Miller THE PSYCHOLOGICAL REVIEW THE MAGICAL NUMBER SEVEN, PLUS OR MINUS TWO: SOME LIMITS ON OUR CAPACITY FOR PROCESSING INFORMATION 1 , 1956 .

[12]  M. Rieger Automatic keypress activation in skilled typing. , 2004, Journal of experimental psychology. Human perception and performance.

[13]  Moshe Zviran,et al.  Cognitive passwords: The key to easy access control , 1990, Comput. Secur..

[14]  Giancarlo Ruffo,et al.  EnFilter: A Password Enforcement and Filter Tool Based on Pattern Recognition Techniques , 2005, ICIAP.

[15]  Gerardine DeSanctis,et al.  Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory , 1994 .

[16]  T. Salthouse Perceptual, cognitive, and motoric aspects of transcription typing. , 1986, Psychological bulletin.

[17]  Moshe Zviran,et al.  Password Security: An Empirical Study , 1999, J. Manag. Inf. Syst..

[18]  Martin Bichler,et al.  Design science in information systems research , 2006, Wirtschaftsinf..

[19]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[20]  Vitaly Shmatikov,et al.  Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.

[21]  Peter A. Todd,et al.  Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication , 1992, MIS Q..

[22]  James L. McClelland,et al.  On the control of automatic processes: a parallel distributed processing account of the Stroop effect. , 1990, Psychological review.

[23]  W. Orlikowski Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000 .

[24]  A. Baddeley The Influence of Acoustic and Semantic Similarity on Long-term Memory for Word Sequences , 1966, The Quarterly journal of experimental psychology.

[25]  Frank A. Logan,et al.  Errors in copy typewriting , 1999 .

[26]  Alexandra Durcikova,et al.  The Role of Knowledge Repositories in Technical Support Environments: Speed Versus Learning in User Performance , 2005, J. Manag. Inf. Syst..

[27]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[28]  Helmut Schneider,et al.  The domino effect of password reuse , 2004, CACM.

[29]  Vladimir I. Levenshtein,et al.  Binary codes capable of correcting deletions, insertions, and reversals , 1965 .

[30]  Bonnie E. John TYPIST: A Theory of Performance in Skilled Typing , 1996, Hum. Comput. Interact..

[31]  J. Yan,et al.  Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.

[32]  Elizabeth E. Johns,et al.  The generation effect with nonwords. , 1988 .

[33]  I. Benbasat,et al.  The Influence of Decision Aids on Choice Strategies: An Experimental Analysis of the Role of Cognitive Effort , 1994 .

[34]  Izak Benbasat,et al.  Inducing compensatory information processing through decision aids that facilitate effort reduction: an experimental assessment , 2000 .

[35]  Benjamin B. M. Shao,et al.  The usability of passphrases for authentication: An empirical field study , 2007, Int. J. Hum. Comput. Stud..

[36]  Barbara H Wixom,et al.  A Theoretical Integration of User Satisfaction and Technology Acceptance , 2005, Inf. Syst. Res..

[37]  Mo Adam Mahmood,et al.  Variables affecting information technology end-user satisfaction: a meta-analysis of the empirical literature , 2000, Int. J. Hum. Comput. Stud..

[38]  Fred D. Davis,et al.  A Model of the Antecedents of Perceived Ease of Use: Development and Test† , 1996 .

[39]  N. Cowan The magical number 4 in short-term memory: A reconsideration of mental storage capacity , 2001, Behavioral and Brain Sciences.

[40]  Nasir D. Memon,et al.  PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..

[41]  Ken Thompson,et al.  Password security: a case history , 1979, CACM.

[42]  Sig Porter,et al.  A password extension for improved human factors , 1982, Comput. Secur..

[43]  H A Simon,et al.  How Big Is a Chunk? , 1974, Science.

[44]  Jordan Grafman,et al.  Long-term memory is the representational basis for semantic verbal short-term memory. , 2005, Psychophysiology.

[45]  R. Conrad,et al.  Acoustic confusions in immediate memory. , 1964 .

[46]  Mark Burnett,et al.  Perfect Passwords: Selection, Protection, Authentication , 2005 .

[47]  B. Winsvold,et al.  A re-evaluation of the phonological similarity effect in adults' short-term memory of words and nonwords. , 2001, Memory.

[48]  Julie Bunnell,et al.  Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates , 2000, Comput. Secur..

[49]  Marcy P. Driscoll,et al.  Psychology of Learning for Instruction (3rd ed. , 2005 .

[50]  Izak Benbasat,et al.  Evaluating the Impact of DSS, Cognitive Effort, and Incentives on Strategy Selection , 1999, Inf. Syst. Res..

[51]  Robert J. Crutcher,et al.  The role of deliberate practice in the acquisition of expert performance. , 1993 .

[52]  N. J. Slamecka,et al.  The Generation Effect: Delineation of a Phenomenon , 1978 .