Cohen, Eli B. Growing Information, Part I. Santa Rosa, Calif: Informing Science Institute, 2009. Print.
Cohen in this peer reviewed article has given an insight on a well researched paper. Cohen gives the essential components of a well researched and articulated work through giving the best research problem statement. The article provides practical example for new comers into the world of research (Cohen, 2009). The elements of scholarly research are also a basic component of the article. This article is essential for a starter due to the fact that, it provides insights on how to create a research statement in order to obtain a viable research. Therefore, this can be a guide for research on passwords in information technology.
Shay, R. (2007). Encountering Stronger Password Requirements:. Passwords , 3-20. http://users.ece.cmu.edu/~mmazurek/papers/soups2010-passwords.pdf
In this article, Richard shay investigates the need for policy that can enhance the protection of passwords. Authentication mechanisms in managing information systems are an essential component in data protection. Through this piece, the practices and behaviors that most individuals use when creating passwords have been established (Shay, 2007). As a result, it is possible to gauge the best alternative way of creating passwords through the policies. This is an essential piece for password authentication since it provides details on how to create complex passwords through policy guides that will reduce information system insecurity.
Vuojärvi, H. (2012). Designing and Implementing a CSCL-based Course on . Online Journal of Communication and Media Technologies , 57-73. http://www.sirel.fi/ttt/Downloads/Design%20Science%20Research%20Methodology%202008.pdf
Al, K. P. (2007). A Design Science Research Methodology. Journal of Management Information System , 4-12. http://www.ojcmt.net/articles/22/224.pdf
This is a journal on communication and media technology which is an essential in learning about data security within a wireless environmental learning area. It gives insights on design research which is a key component of the implementation of a computer supported collaborative learning course (Al, 2007). It provides more information on secure wireless networks for students in a learning environment. Through this journal, students get to know the importance of learning how to secure a wireless network communication system.
Outhwaite, A. D. (2005). Learning resource needs of UK NHS support staff. NCBI Resources , 61. http://www.ncbi.nlm.nih.gov/pubmed/16293167
This is an article based report on resource needs of the UK HNS support staff. In this report, Devaney explores the experiences and views from support staff based on communication of the staff. Through this research, it is established that, staff should be taught how to obtain a password that is network based (Outhwaite 2005). Skills in information management have been demonstrated hence, an advantage to support systems for proper information systems in communication department.
Pilar, D., Jaeger, A., Gomes, C. A., & Stein, L. (2012). Passwords Usage and Human Memory Limitations: A Survey across Age and Educational Background.
The article talks about the use of passwords and as such this narrows down to the use of technology. Basically, the article focuses on the practices of using passwords amongst individuals with different levels of education and those of different ages (Pilar et al, 2012). If not overtly stated, I would be of the view that the article is talking about the likelihood of passwords being forgotten by users as a result of memory loss and due to low literacy levels.The study on the usage of passwords and limitations of passwords helps to identify the effect of frequently changing passwords and those that are appropriate for individuals of different levels of education and different ages so that they can be advised appropriately. For instance, the findings show that it is not advisable for older people to make use of many passwords, as they are likely to forget.
Ostojic, P., & Phillips, J. (2009). Memorability of alternative password systems. International Journal of Pattern Recognition and Artificial Intelligence, 23(5), 987-1004.
Cheswick, W. (2013). Rethinking Passwords. Communications of the ACM, 56(2), 40-44.
The article presents the author’s perspective on the importance of password authentication and also let the users know that the authentication rules vary widely and incomprehensibly. The main goal is protect the passwords from the bad intentions of the hackers. Passwords and on the U.S. Department of Defense's (DoD's) Password Management Guideline published in 1985 which is known as the Green Book. The DOD’s report notes the vulnerability of passwords on an automated data processing (ADP) system to security threats and suggests user IDs (identifications) should be revalidated periodically. It also notes the cracking time and password change rates for password schemes including the 8-character eye-of-newt and 13-character full alphanumeric.
Ben-Asher, N., Kirshchnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Möller, S. (2011). On the need for different security methods on mobile phones. MobileHCI, 465-473.
In this research paper author examine today's mobile phone security methods (specifically graded security and biometric security). Increasing use of mobile phones so-called smart phones are less protected from unauthorized access than on most desktop and mobile computers. This paper presents a survey on users' security needs, awareness and concerns in the context of mobile. The responses from 465 participants reveal that users are interested in increased security and data protection. The current protection by using PIN is less protective. The sensitivity of data stored on the devices varies depending on the data type and the context of use, asking for the need for another level of protection. According to these findings, a two-level security model for mobile phones is proposed. The model provides differential data and service protection by utilizing existing capabilities of a mobile phone for authenticating users.
Duggan, G., Johnson, H., &Grawemeyer, B. (2012). Rational security: modeling everyday password use. 415-431.
In this paper authors explain the different security behavior by taking the example of three groups including computer scientist groups, admin staffs and students (Duggan, Grawemeyer&Johnson, 2012, p. 416). Users have different goals with regards to password authentication. The authors used three different groups to understand the password security behavior. This study helps to understand different reasons for password selection among these three groups. Computer Scientists viewed information security as part of their tasks and passwords provided a way of completing their work (Duggan, Grawemeyer & Johnson, 2012, p. 415. The studies in this article are important as password plays a major role in ensuring the security and the confidentiality of data. It is important to understand proper password guidelines. This article is very important as it tells the reason for selection of password in all three user groups with different reasons. There are many internal and external constraints that affect password security.
Reference
Al, K. P. (2007). A Design Science Research Methodology. Journal of Management Information System , 4-12.
Ben-Asher, N., Kirshchnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Möller, S. (2011). On the need for different security methods on mobile phones. MobileHCI, 465-473.
Cohen, Eli B. Growing Information, Part I. Santa Rosa, Calif: Informing Science Institute, 2009. Print.
Duggan, G., Johnson, H., &Grawemeyer, B. (2012). Rational security: modeling everyday password use. 415-431.
Outhwaite, A. D. (2005). Learning resource needs of UK NHS support staff. NCBI Resources , 61.
Ostojic, P., & Phillips, J. (2009). Memorability of alternative password systems. International Journal of Pattern Recognition and Artificial Intelligence, 23(5), 987-1004.
Pilar, D., Jaeger, A., Gomes, C. A., & Stein, L. (2012). Passwords Usage and Human Memory Limitations: A Survey across Age and Educational Background.
Shay, R. (2007). Encountering Stronger Password Requirements:. Passwords , 3-20.