IDEAS home Printed from https://ideas.repec.org/a/taf/uipsxx/v10y2014i2p71-94.html
   My bibliography  Save this article

Factors for Measuring Password-Based Authentication Practices

Author

Listed:
  • Herbert J. Mattord
  • Yair Levy
  • Steven Furnell

Abstract

Organizations rely on password-based authentication methods to control access to their Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in such systems, focusing on three component areas: 1) password strength requirements, 2) password usage methods, and 3) password reset requirements. This study explores the criteria required to define these component areas and validated proposed measurement criteria by use of an expert panel from industry and academia. An opportunity sample of web-based ISs in two groups were assessed to examine the use of the Authentication Method System Index (AMSI).

Suggested Citation

  • Herbert J. Mattord & Yair Levy & Steven Furnell, 2014. "Factors for Measuring Password-Based Authentication Practices," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 10(2), pages 71-94, June.
  • Handle: RePEc:taf:uipsxx:v:10:y:2014:i:2:p:71-94
    DOI: 10.1080/15536548.2014.924812
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1080/15536548.2014.924812
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1080/15536548.2014.924812?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Abdullah Al Hayajneh & Hasnain Nizam Thakur & Kutub Thakur, 2023. "The Evolution of Information Security Strategies: A Comprehensive Investigation of INFOSEC Risk Assessment in the Contemporary Information Era," Computer and Information Science, Canadian Center of Science and Education, vol. 16(4), pages 1-1, November.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:uipsxx:v:10:y:2014:i:2:p:71-94. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/uips .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.