575
Views
50
CrossRef citations to date
0
Altmetric
Original Article

Improving multiple-password recall: an empirical study

, , &
Pages 165-176 | Received 08 Apr 2008, Accepted 23 Feb 2009, Published online: 19 Dec 2017

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (6)

Naomi Woods & Johanna Silvennoinen. (2023) Enhancing the user authentication process with colour memory cues. Behaviour & Information Technology 42:10, pages 1548-1567.
Read now
Mahdi Nasrullah Al-Ameen, Sonali T. Marne, Kanis Fatema, Matthew Wright & Shannon Scielzo. (2022) On improving the memorability of system-assigned recognition-based passwords. Behaviour & Information Technology 41:5, pages 1115-1131.
Read now
Ignacio X. Domínguez, Prairie Rose Goodwin, David L. Roberts & Robert St. Amant. (2017) Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity. International Journal of Human–Computer Interaction 33:1, pages 44-54.
Read now
Ofir Turel & Hamed Qahri-Saremi. (2016) Problematic Use of Social Networking Sites: Antecedents and Consequence from a Dual-System Theory Perspective. Journal of Management Information Systems 33:4, pages 1087-1116.
Read now
Allen C Johnston, Merrill Warkentin, Maranda McBride & Lemuria Carter. (2016) Dispositional and situational factors: influences on information security policy violations. European Journal of Information Systems 25:3, pages 231-251.
Read now
KevinF. McCrohan, Kathryn Engel & JamesW. Harvey. (2010) Influence of Awareness and Training on Cyber Security. Journal of Internet Commerce 9:1, pages 23-41.
Read now

Articles from other publishers (44)

Kate-Riin Kont. (2024) Management of cyber risks in the library: analysis of information security awareness of Estonian library employees. Library Management 45:1/2, pages 118-140.
Crossref
Naomi Woods & Mikko Siponen. (2024) How memory anxiety can influence password security behavior. Computers & Security 137, pages 103589.
Crossref
Maria Papaioannou, Georgios Zachos, Georgios Mantas, Ismael Essop, Firooz B Saghezchi & Jonathan Rodriguez. (2023) Outlier Detection for Risk-Based User Authentication on Mobile Devices. Outlier Detection for Risk-Based User Authentication on Mobile Devices.
Clay Posey & Mindy Shoss. (2023) Employees as a Source of Security Issues in Times of Change and Stress: A Longitudinal Examination of Employees’ Security Violations during the COVID-19 Pandemic. Journal of Business and Psychology.
Crossref
Maria Papaioannou, Georgios Mantas, Emmanouil Manos Panaousis, Aliyah Essop, Jonathan Rodriguez & Victor Sucasas. (2023) Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations. Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations.
Maria Papaioannou, Filippos Pelekoudas-Oikonomou, Georgios Mantas, Emmanouil Serrelis, Jonathan Rodriguez & Maria-Anna Fengou. (2023) A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones. Sensors 23:6, pages 2979.
Crossref
Warut Khern-am-nuai, Matthew J. Hashim, Alain PinsonneaultWeining YangNinghui Li. (2023) Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments. Information Systems Research 34:1, pages 157-177.
Crossref
Obi Ogbanufe. (2023) Securing online accounts and assets: An examination of personal investments and protection motivation. International Journal of Information Management 68, pages 102590.
Crossref
Maria Papaioannou, Georgios Zachos, Georgios Mantas & Jonathan Rodriguez. (2022) Novelty Detection for Risk-based User Authentication on Mobile Devices. Novelty Detection for Risk-based User Authentication on Mobile Devices.
Maria Papaioannou, Georgios Mantas, Aliyah Essop, Victor Sucasas, Najwa Aaraj & Jonathan Rodriguez. (2022) Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices. Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices.
Joshua J. Rodriguez, Minhaz F. Zibran & Farjana Z. Eishita. (2022) Finding the Middle Ground: Measuring Passwords for Security and Memorability. Finding the Middle Ground: Measuring Passwords for Security and Memorability.
Weihong Ning, Fred D. Davis & René Riedl. (2021) Musical consumption, self-control and smartphone addiction: a dual-systems theory perspective and evidence from a survey study. Internet Research 32:3, pages 657-679.
Crossref
Obi M. Ogbanufe & Corey Baham. (2022) Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret. Information Systems Frontiers.
Crossref
Maria Papaioannou, Georgios Zachos, Ismael Essop, Georgios Mantas & Jonathan Rodriguez. (2022) Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control. IEEE Access 10, pages 38832-38849.
Crossref
Maria Papaioannou, Georgios Mantas, Dimitrios Lymberopoulos & Jonathan Rodriguez. (2020) User Authentication and Authorization for Next Generation Mobile Passenger ID Devices for Land and Sea Border Control. User Authentication and Authorization for Next Generation Mobile Passenger ID Devices for Land and Sea Border Control.
Joakim Kävrestad, Markus Lennartsson, Marcus Birath & Marcus Nohlberg. (2020) Constructing secure and memorable passwords. Information & Computer Security 28:5, pages 701-717.
Crossref
Nader Abdel Karim, Zarina Shukur & AbedElkarim M. AL-banna. (2020) UIPA: User authentication method based on user interface preferences for account recovery process. Journal of Information Security and Applications 52, pages 102466.
Crossref
Mikko Siponen, Petri Puhakainen & Anthony Vance. (2020) Can individuals’ neutralization techniques be overcome? A field experiment on password policy. Computers & Security 88, pages 101617.
Crossref
George Hatzivasilis. 2020. Model-driven Simulation and Training Environments for Cybersecurity. Model-driven Simulation and Training Environments for Cybersecurity 157 177 .
Jeffrey P. Kaleta, Jong Seok Lee & Sungjin Yoo. (2019) Nudging with construal level theory to improve online password use and intended password choice. Information Technology & People 32:4, pages 993-1020.
Crossref
Naomi Woods & Mikko Siponen. (2019) Improving password memorability, while not inconveniencing the user. International Journal of Human-Computer Studies 128, pages 61-71.
Crossref
Mari Karjalainen, Suprateek SarkerMikko Siponen. (2019) Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective. Information Systems Research 30:2, pages 687-704.
Crossref
Ruba Alomari & Julie Thorpe. (2019) On password behaviours and attitudes in different populations. Journal of Information Security and Applications 45, pages 79-89.
Crossref
Robert E. Crossler, France Bélanger & Dustin Ormond. (2017) The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats. Information Systems Frontiers 21:2, pages 343-357.
Crossref
Lila A. Loos, Michael-Brian Ogawa & Martha E. Crosby. 2019. Augmented Cognition. Augmented Cognition 84 92 .
Naomi Woods & Mikko Siponen. (2018) Too many passwords? How understanding our memory can increase password memorability. International Journal of Human-Computer Studies 111, pages 36-48.
Crossref
Sandeep Gupta, Attaullah Buriro & Bruno Crispo. (2018) Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access. Mobile Information Systems 2018, pages 1-16.
Crossref
Noura Alomar, Mansour Alsaleh & Abdulrahman Alarifi. (2017) Someone in Your Contact List: Cued Recall-Based Textual Passwords. IEEE Transactions on Information Forensics and Security 12:11, pages 2574-2589.
Crossref
Florian AltMateusz Mikusz, Stefan SchneegassAndreas Bulling. (2016) Memorability of cued-recall graphical passwords with saliency masks. Memorability of cued-recall graphical passwords with saliency masks.
S. Agholor, A.S. Sodiya, A. T. Akinwale & O. J. Adeniran. (2016) A secured Mobile-Based Password Manager. A secured Mobile-Based Password Manager.
Marios Belk, Christos Fidas, Panagiotis Germanakos & George Samaras. (2015) A Personalized User Authentication Approach Based on Individual Differences in Information Processing. Interacting with Computers 27:6, pages 706-723.
Crossref
Norliza Katuk, Hatim Mohamad Tahir, Nur Haryani Zakaria & Mohamad Subri Halim. 2015. Pattern Analysis, Intelligent Security and the Internet of Things. Pattern Analysis, Intelligent Security and the Internet of Things 85 93 .
Paul Benjamin Lowry, Clay Posey, Tom L. Roberts & Rebecca J. Bennett. (2013) Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse. Journal of Business Ethics 121:3, pages 385-401.
Crossref
Yang Cheng & Zhao Qi. 2014. Digital Services and Information Intelligence. Digital Services and Information Intelligence 264 276 .
Anthony Vance, David Eargle, Kirk Ouimet & Detmar Straub. (2013) Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment. Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment.
Denise Ranghetti Pilar, Antonio Jaeger, Carlos F. A. Gomes & Lilian Milnitsky Stein. (2012) Passwords Usage and Human Memory Limitations: A Survey across Age and Educational Background. PLoS ONE 7:12, pages e51067.
Crossref
Youngsok Bang, Dong-Joo Lee, Yoon-Soo Bae & Jae-Hyeon Ahn. (2012) Improving information security management: An analysis of ID–password usage and a new login vulnerability measure. International Journal of Information Management 32:5, pages 409-418.
Crossref
Wen Zeng & Kaiyu Liu. (2012) Sensitivity Analysis of Loss of Corporate Efficiency and Productivity Associated with Enterprise DRM Technology. Sensitivity Analysis of Loss of Corporate Efficiency and Productivity Associated with Enterprise DRM Technology.
Samuel Tusubira Kalyango & Gilbert Maiga. 2012. Foundations of Health Informatics Engineering and Systems. Foundations of Health Informatics Engineering and Systems 207 224 .
Peter A. Hausdorf. (2015) Tracking Surveys Anonymously: An Alternative to Identified Employee Surveys. Industrial and Organizational Psychology 4:4, pages 482-483.
Crossref
T. V. Laptyeva, S. Flach & K. Kladko. (2011) The weak-password problem: Chaos, criticality, and encrypted p-CAPTCHAs. EPL (Europhysics Letters) 95:5, pages 50007.
Crossref
Mary Frances Theofanos & Shari Lawrence Pfleeger. (2011) Guest Editors' Introduction: Shouldn't All Security Be Usable?. IEEE Security & Privacy Magazine 9:2, pages 12-17.
Crossref
Yinqian Zhang, Fabian Monrose & Michael K. Reiter. (2010) The security of modern password expiration. The security of modern password expiration.
Warut Khern-am-nuai, Weining Yang & Ninghui Li. (2016) Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.