Applying Chunking Theory in Organizational Password Guidelines

  • Sater Carstens D
  • C. Malone L
  • R. Mccauley-Bell P
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

This research evaluates the human impact that password authentication issues have on the security of information systems within organizations. This research resulted in the creation of password guidelines for authentication with passwords based on Miller's (1956) and Cowan's (2001) chunking theory research and a model for predicting the vulnerability that a particular set of conditions have on the likelihood of error in an information system. The findings indicate that human error associated with password authentication can be significantly reduced through the use of passwords that are composed of meaningful data for the user and that meet technical requirements for strong passwords. [ABSTRACT FROM AUTHOR]\r \rCopyright of Journal of Information, Information Technology & Organizations is the property of Informing Science and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)

Cite

CITATION STYLE

APA

Sater Carstens, D., C. Malone, L., & R. Mccauley-Bell, P. (2006). Applying Chunking Theory in Organizational Password Guidelines. Journal of Information, Information Technology, and Organizations (Years 1-3), 1, 097–113. https://doi.org/10.28945/150

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free