Reference Hub2
Human and Social Aspects of Password Authentication

Human and Social Aspects of Password Authentication

Deborah S. Carstens
ISBN13: 9781605660363|ISBN10: 1605660361|ISBN13 Softcover: 9781616925017|EISBN13: 9781605660370
DOI: 10.4018/978-1-60566-036-3.ch001
Cite Chapter Cite Chapter

MLA

Carstens, Deborah S. "Human and Social Aspects of Password Authentication." Social and Human Elements of Information Security: Emerging Trends and Countermeasures, edited by Manish Gupta and Raj Sharman, IGI Global, 2009, pp. 1-14. https://doi.org/10.4018/978-1-60566-036-3.ch001

APA

Carstens, D. S. (2009). Human and Social Aspects of Password Authentication. In M. Gupta & R. Sharman (Eds.), Social and Human Elements of Information Security: Emerging Trends and Countermeasures (pp. 1-14). IGI Global. https://doi.org/10.4018/978-1-60566-036-3.ch001

Chicago

Carstens, Deborah S. "Human and Social Aspects of Password Authentication." In Social and Human Elements of Information Security: Emerging Trends and Countermeasures, edited by Manish Gupta and Raj Sharman, 1-14. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-036-3.ch001

Export Reference

Mendeley
Favorite

Abstract

With the increasing daily reliance on electronic transactions, it is essential to have reliable security practices for individuals, businesses, and organizations to protect their information (Vu, Bhargav, & Proctor, 2003; Vu, Tai, Bhargav, Schultz, & Proctor, 2004). A paradigm shift is occurring as researchers are targeting social and human dimensions of information security, as this aspect is seen as an area where control can be exercised. Since computer security is largely dependent on the use of passwords to authenticate users of technology, the objectives of this chapter are to (a) provide a background on password authentication and information security, (b) provide a discussion on security techniques, human error in information security, human memory limitations, and password authentication in practice, and (c) provide a discussion on future and emerging trends in password authentication to include future research areas.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.