A TAM Analysis of an Alternative High-Security User Authentication Procedure

A TAM Analysis of an Alternative High-Security User Authentication Procedure

Merrill Warkentin (Mississippi State University, USA), Kimberly Davis (Mississippi State University, USA) and Ernst Bekkering (Northeastern State University, USA)
Copyright: © 2005 |Pages: 21
DOI: 10.4018/978-1-59140-474-3.ch014
OnDemand PDF Download:
$37.50

Abstract

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Mo Adam Mahmood
Chapter 1
James P. Downey, Summer E. Bartczak
During the 1980s and into the early 1990s, end user computing (EUC) was reported to be among the key concerns facing managers and organizations. Is... Sample PDF
End User Computing Research Issues and Trends (1990-2000)
$37.50
Chapter 2
Tanya McGill
End user development of applications forms a significant part of organizational systems development. This study investigates the role that... Sample PDF
The Effect of End User Development on End User Success
$37.50
Chapter 3
D. Sandy Staples, Peter B. Seddon
Goodhue and Thompson (1995) proposed the Technology-to-Performance Chain (TPC) model in 1995 to help end-users and organizations understand and make... Sample PDF
Testing the Technology-to-Performance Chain Model
$37.50
Chapter 4
Mun Y. Yi, Kun S. Im
Computer task performance is an essential driver of end user productivity. Recent research indicates that computer self-efficacy (CSE) is an... Sample PDF
The Role of Personal Goal and Self-Efficiency in Predicting Computer Task Performance
$37.50
Chapter 5
Steven A. Morris, Thomas E. Marshall
The importance of perceptions of control in explaining human behavior and motivation has been identified, investigated, and found to be significant... Sample PDF
Measurement of Perceived Control in Information Systems
$37.50
Chapter 6
Qingxiong Ma, Liping Liu
The technology acceptance model proposes that perceived ease of use and perceived usefulness predict the acceptance of information technology. Since... Sample PDF
The Technology Acceptance Model: A Meta-Analysis of Empirical Findings
$37.50
Chapter 7
Nory B. Jones, Thomas R. Kochtanek
Practitioners and academics often assume that investments in technology will lead to productivity improvements. While the literature provides many... Sample PDF
Success Factors in the Implementation of a Collaborative Technology and Resulting Productivity Improvements in a Small Business: An Exploratory Study
$37.50
Chapter 8
Evan W. Duggan, Cherian S. Thachenkary
Joint Application Development (JAD) was introduced in the late 1970s to solve many of the problems system users experienced with the conventional... Sample PDF
Supporting the JAD Facilitator with the Nominal Group Technique
$37.50
Chapter 9
Barbara Adams, Eta S. Berner, Joni Rousse Wyatt
User resistance is a common occurrence when new information systems are implemented within health care organizations. Individuals responsible for... Sample PDF
Applying Strategies to Overcome User Resistance in a Group of Clinical Managers to a Business Software Application: A Case Study
$37.50
Chapter 10
Bernd Carsten Stahl
Decisions regarding information assurance and IT security can affect individuals’ rights and obligations and thereby acquire a moral quality. The... Sample PDF
Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics?
$37.50
Chapter 11
Mary C. Jones, R. Leon Price
This study examines organizational knowledge sharing in enterprise resource planning (ERP) implementation. Knowledge sharing in ERP implementation... Sample PDF
Organizational Knowledge Sharing in ERP Implementation: Lessons from Industry
$37.50
Chapter 12
Manish Gupta, Raghav Rao, Shambhu Upadhyaya
Information assurance is a key component in e-banking services. This article investigates the information assurance issues and tenets of e-banking... Sample PDF
Electronic Banking and Information Assurance Issues: Survey and Synthesis
$37.50
Chapter 13
Kregg Aytes, Terry Connolly
Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant... Sample PDF
Computer Security and Risky Computing Practices: A Rational Choice Perspective
$37.50
Chapter 14
Merrill Warkentin, Kimberly Davis, Ernst Bekkering
The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and... Sample PDF
A TAM Analysis of an Alternative High-Security User Authentication Procedure
$37.50
Chapter 15
Kalyani Chatterjea
In-service upgrading has been an accepted avenue for retraining practicing teachers in Singapore to keep abreast of changing curriculum requirements... Sample PDF
A Blended Approach Learning Strategy for Teacher Development
$37.50
About the Editor
About the Authors