Browse > Article
http://dx.doi.org/10.9728/dcs.2013.14.2.179

The Effects of User's Security Awareness on Password Security Behavior  

Ha, Sang-Won (고려대학교 정보보호대학원)
Kim, Hyoung-Joong (고려대학교 정보보호대학원)
Publication Information
Journal of Digital Contents Society / v.14, no.2, 2013 , pp. 179-189 More about this Journal
Abstract
With the rapid development of information technology in 21st century, networks are being used with various devices. Most human actions are processed through cyber space, and it is no longer separate from daily life; it has changed into one of the most important aspects of human life. Unfortunately, in cyber space, certification method has not only technical problems, but also ethological problems. Many users seemed to use the same password throughout several sites. And for a long period they refused to change it or made a small change from the earlier password. This research aims to discuss general factors of choosing and using passwords within information security through statistical analysis.
Keywords
User Authentication; Statistical analysis; User behavior;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 T. Jung, "Cyber Attack & Security Technology, HONGRUNG PUBLISHING COMPANY, 2009
2 S. Kim, M. S, "The Effects of the Perception of an Online Risk and Prior Knowledge on Public's Communication Behavior", KOREAN ASSOCIATION FOR ADVERTISING AND PUBLIC RELATIONS, Vo l. 13, pp. 528-568, 2011
3 G. Moon, J. Kim, M. Hong, "A Graphical Passowrd Scheme Resistant to Shoulder Surfing Attack in Mo bile Environments", Journal of computing science and engineering, Vol. 18, pp. 90-94, 2012
4 Y. Bang, et al, "Improving information security management: An analysis of ID-password usage and a new login vulnerability measure", International Journal of Information Management, Vol. 32, pp. 409-418, 2012   DOI   ScienceOn
5 D. Kang, "The Influence of Password Selection on the Security Effectiveness", Pusan National University, 2008
6 G. Post, A. Kagan, "Evaluating information security tradeoffs: Restricting access can interfere with user tasks", Computers&Security, Vol. 26, pp. 229-237, 2007
7 C. McCoy, R. Fowler, "You are the key to security: establishing a successful security awareness program", SIGUCCS'04 Proceedings of the 32nd annual ACM SIGUCCS fall conference, pp. 346-349, 2004
8 M. Chang, D. Kang, "Factors Affecting the Informati on Security Awareness and Perceived Information Security Risk of Employees of Port Companies", Journal of Navigation and Port Research, Vol. 36, pp. 261-271, 2012   DOI   ScienceOn
9 Ministry of Information and Communication, "A white paper of Protect the National information Security ",2006
10 ISO/IEC, Guidelines for the Management of IT Security (GMITS), International Organization for Standardization/International Electrotechnical Commission, 2005
11 Y. Lee, "A Study on Factors Influencing the Preventive Efforts toward Personal Information Privacy", Sungkyunkwan University, 2009
12 G. Lee, Y. Dong, "Measure for the risk of leakage of personal information about the methods and pract ices of private companies", Korea Institute of Inform ation Security & Cryptology. Vol. 18, pp. 92-100, 2008
13 I. Jang, "Exploring the Relationship between Prevention Behavior of Privacy Leakage and Perceived Risk, Efficacy Beliefs of Internet User: Use RPA(Risk Perception Attitude) Framework, Kookmin University, 2010
14 L. Drevin, H.A. Kruger, T. Steyn, "Value-focused assessment of ICT security awareness in an academic environment", Computers & Security, Vol. 26, pp. 445-451, 2007   DOI   ScienceOn
15 J. Kim, D. Kang, "The Effects of Security Policies, Security Awareness and Individual Characteristics on Password Security Effectiveness", Korea Institute of Information Security & Cryptology, Vol. 18, pp. 123-133, 2008   과학기술학회마을
16 V. Mitchell, "Consumer perceived risk: conceptualisations and models", European Journal of Marketing, Vol. 33, pp. 163-195, 1999   DOI   ScienceOn
17 W. Lee, "The Influence of Security and Risk Perception on the Reuse of Internet Banking", Asia Pacific Journal of Information Systems, Vol. 17, pp. 77-93, 2007
18 Cohen. J, "Statistical power analysis for the behavio ral sciences(2nd ed.)", Hillsdale, NJ:Erlbaum, 1988
19 R. Baron, D. Kenny, "The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations", Journal of Personality and Social Psychology, Vo l. 51, pp1173-1182, 1986   DOI
20 M. Kumar, et. al, "Reducing shoulder-surfing by using gaze-based password entry", SOUPS' 07, pp. 13-19, 2007
21 D. Carstens, P. McCauley-Bell, "Evaluation of the Human Impact of Password Authentication practices on Information Security", Informing Science Journal, Vol. 7, pp. 67-85, 2004
22 J. Choi, "Using weak passwords is same as open the front door to the thief", http://www.coconut.co.kr/04news/secu/0712/htm/seculetter02.html
23 C. Kim, S. Lee, E. O, "The Impact of Interaction Factors of Digital Contents on Flow and Use Intention", Digital Contents Society, Vol. 11, pp.212-224, 2011
24 B. Ives, K. Walsh, H. Schneider, "The domino effect of password reuse". Communications of the ACM - Human-computer etiquette, Vol. 47, pp. 75-78, 2004