Constructing secure and memorable passwords

2020 ◽  
Vol 28 (5) ◽  
pp. 701-717 ◽  
Author(s):  
Joakim Kävrestad ◽  
Markus Lennartsson ◽  
Marcus Birath ◽  
Marcus Nohlberg

Purpose Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remain the most common type of authentication. As long and complex passwords are encouraged by research studies and practitioners alike, computer users design passwords using strategies that enable them to remember their passwords. This paper aims to find strategies that allow for the generation of passwords that are both memorable and computationally secure. Design/methodology/approach The study began with a literature review that was used to identify cognitive password creation strategies that facilitate the creation of passwords that are easy to remember. Using an action-based approach, attack models were created for the resulting creation strategies. The attack models were then used to calculate the entropy for passwords created with different strategies and related to a theoretical cracking time. Findings The result of this study suggests that using phrases with four or more words as passwords will generate passwords that are easy to remember and hard to attack. Originality/value This paper considers passwords from a socio-technical approach and provides insight into how passwords that are easy to remember and hard to crack can be generated. The results can be directly used to create password guidelines and training material that enables users to create usable and secure passwords.

2020 ◽  
Vol 37 (8) ◽  
pp. 7-9
Author(s):  
Israel Odede

Purpose The paper aims to critically examine the bibliographic utility as a roadmap to increase library consortia and provide an insight into a new library consortia strategy that integrates librarians into a system of sharing both resources and knowledge. Design/methodology/approach This study adopted a literature review approach with a focus on bibliographic utility as a necessary prerequisite for effective library consortia, which is a paradigm shift from the concept of individual ownership to a collective access of distributed network resources and knowledge. Findings The reviewed literature indicated that significant bibliographic utilities and integrated library systems are factors that shaped and developed consortia activities in libraries. Originality/value The bibliographic utility has limited literature, and a few published scholarly studies have combined bibliographic utility and library consortia as strategies to share resources and knowledge


2014 ◽  
Vol 42 (3) ◽  
pp. 446-466 ◽  
Author(s):  
Teressa M. Keenan

Purpose – The aim of this paper is to highlight the relationship between cataloging data and reference service and the importance of including reference librarians, in general resource description and access (RDA) training. Design/methodology/approach – A literature review and the author’s experiences related to implementing RDA are presented with minimal cataloging jargon to help librarians better understand the effects of cataloging standards on reference service. Findings – There is a noticeable lack of research and training related to RDA for audiences beyond technical services. More research is needed to determine how users are interacting with the catalog, how bibliographic data is supporting their discovery and access, what, if any, obstacles reference librarians encounter as a result of RDA and how future iterations of RDA may open bibliographic data to communities beyond the library. Originality/value – This paper is one the few that discuss how RDA may affect reference service. It will be useful for providing librarians with a general understanding of the relationship between cataloging and reference and may serve as a starting point for further research.


2014 ◽  
Vol 22 (6) ◽  
pp. 7-9
Author(s):  
Teena Bagga ◽  
Geetanjali Khanna

Purpose – This paper aims to describe how computer giant Dell recruits and trains its technical-support staff. Design/methodology/approach – The paper reveals the competencies the company seeks in its recruits and how the recruits are developed. Findings – It highlights the importance of being tech-savvy, patient and adaptable and having a positive attitude, good communication skills, empathy with customers and loyalty to the organization. Practical implications – It explains that the company’s competency-based interview questions are designed to elicit details about the work the candidate has done, the way he or she has completed that work and the environment in which he or she worked. Originality/value – It provides a good insight into the recruitment and training of technical-support staff at a major international organization.


2019 ◽  
Vol 27 (3) ◽  
pp. 453-467 ◽  
Author(s):  
Joakim Kävrestad ◽  
Fredrik Eriksson ◽  
Marcus Nohlberg

PurposeUsing authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remains the most common type of authentication. As long and complex passwords are encouraged by research studies and practitioners alike, computer users design passwords using strategies that enable them to remember their passwords. This paper aims to present a taxonomy of those password creation strategies in the form of a model describing various strategies used to create passwords.Design/methodology/approachThe study was conducted in a three-step process beginning with a short survey among forensic experts within the Swedish police. The model was then developed by a series of iterative semi-structured interviews with forensic experts. In the third and final step, the model was validated on 5,000 passwords gathered from 50 different password databases that have leaked to the internet.FindingsThe result of this study is a taxonomy of password creation strategies presented as a model that describes the strategies as properties that a password can hold. Any given password can be classified as holding one or more of the properties outlined in the model.Originality/valueOn an abstract level, this study provides insight into password creation strategies. As such, the model can be used as a tool for research and education. It can also be used by practitioners in, for instance, penetration testing to map the most used password creation strategies in a domain or by forensic experts when designing dictionary attacks.


2019 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ian Seymour Yeoman ◽  
Una McMahon-Beattie

Purpose This trends paper is based upon a literature review and access to a series of databases; thus, with the help of these the purpose of this paper is to provide insight into changing consumer behaviours. Design/methodology/approach This paper explores how the experience economy will evolve and outlines the micro and sub-trends that will shape its future. Findings This paper identifies seven micro trends associated with the experience economy. The micro trends are: once is never enough, luxury experienced, leisure upgrade, escape from modernity to authenti-seeking, fluid identity, everyday exceptional and experience first. Originality/value This trends paper provides useful insights into the experience economy for researchers, practitioners, students or interested parties. Going beyond a broad interpretation, it focuses on specific micro trends in action.


foresight ◽  
2019 ◽  
Vol 21 (6) ◽  
pp. 640-653 ◽  
Author(s):  
Kimia Ghaffari ◽  
Mohammad Lagzian ◽  
Mostafa Kazemi ◽  
Gholamreza Malekzadeh

Purpose Prior research on the area of internet of things (IoT) development has primarily emphasized the overview descriptions and rarely investigated this area from a socio-technical standpoint. However, IoT development is a socio-technical ensemble, which requires analysis with a simultaneous focus on both technical and non-technical issues. Hence, this paper aims to analyze the development of IoT through the lens of the socio-technical system (STS) theory. Design/methodology/approach Having reviewed the STS theory, the key components of the IoT development are identified using prior literature review and semi-structured interviews with experts involved in the Iranian IoT development effort. Findings As a result, this paper provides insight into the key socio-technical issues in the IoT development classified under technology, tasks, structure and actors as four components of STS. Moreover, the close connections between the components are clarified. Originality/value This research is among the earliest studies, which use the STS theory to investigate the IoT development. The conducted socio-technical analysis of this study may assist the governments, industries and entrepreneurs as the chief stakeholders of IoT development to better align their actions with each other and achieve a balance between both technical and social sides.


2019 ◽  
Vol 22 (5) ◽  
pp. 766-780
Author(s):  
Tereza Kuldova

Purpose Fetishism has been often linked to misrecognition and false belief, to one being “ideologically duped” so to speak. But could we think that fetishism may be precisely the very opposite? The purpose of this paper is to explore the potential of this at first sight counterintuitive notion. It locates the problem of fetishism at the crux of the problem of disavowal and argues that one needs to distinguish between a disavowal – marked by cynical knowledge – and fetishistic disavowal, which can be understood as a subcategory of the same belief structure of ideology. Design/methodology/approach This conceptual paper is based on literature review and utilizes examples from the author’s ethnographic fieldworks in India (2008-2013) and central Europe (2015-2019). Findings The paper provides a new insight into the structure of fetishism, relying on the psychoanalytic structure of disavowal, where all disavowal is ideological, but not all disavowal is fetishistic, thereby positing a crucial, often unacknowledged distinction. Where disavowal follows the structure “I know quite well how things are, but still […],” fetishistic disavowal follows the formula: “I don’t only know how things are, but also how they appear to me, and nonetheless […].” Originality/value The paper develops an original conceptualization of fetishism by distinguishing ideological disavowal from fetishistic disavowal.


2019 ◽  
Vol 27 (5) ◽  
pp. 25-26

Purpose This paper aims to review existing literature about both e-recruitment and training comprehensiveness to find out if there was a link to perceptions of the organization among employees. The authors felt this would lead to more positive beliefs and higher levels of employer branding (EB). Design/methodology/approach To test their beliefs, they analyzed literature published between 1964 and 2017. The strategy was to use the databases of Emerald, EBSCO, Scopus, ProQuest and JSTOR, and search engines like Google Scholar. They searched for key words and came up with 51 articles, 17 dealing with employer branding, 23 about e-recruitment and employer branding, and 11 about training comprehensiveness and employer branding. Findings The authors felt the literature review confirmed their beliefs that e-recruitment was a good way to create a more positive view of organizations, and training comprehensiveness helped to develop both employee skills and levels of commitment. Originality/value Very little research has previously addressed e-recruitment and training comprehensiveness as drivers of EB.


2016 ◽  
Vol 117 (11/12) ◽  
pp. 768-771 ◽  
Author(s):  
Bruce Massis

Purpose The purpose of this paper is to reflect on the use of Open Electronic Resources (OER) as a supplement or replacement for textbooks or entire courses in higher education teaching and learning. Design/methodology/approach This paper is a literature review and commentary on this topic that has been addressed by professionals, researchers and practitioners. Findings Librarians are in a unique position to offer support for faculty seeking to incorporate OER into their courses. In an overall effort to serve as an important option to the mounting costs of education, librarians can offer up their knowledge, skill and training in the development and evaluation of OER. Originality/value The value in exploring this topic is to examine the library’s use of OER and their benefits and challenges in a higher education classroom environment.


Author(s):  
María de-Miguel-Molina ◽  
José Luis Barrera-Gabaldón

Purpose The purpose of this study is to analyse the concept of dark tourism and apply it to the Valley of the Fallen in Spain, a controversial monument that is a symbol of the Spanish Civil War and the subsequent dictatorship. Design/methodology/approach First, the authors carried out a literature review to get an insight into the concept of “dark tourism”, the types of existing dark tourism and the methods that are applied to the main cases around the world. Then, the authors analysed the case through a content analysis of press articles and interviews. Findings The authors propose a way to change the current symbolism and connotations of the Valley of the Fallen towards a new symbolism engaging all the stakeholders involved, from a dark tourism point of view. Research limitations/implications Applying this new symbolism requires attaining a difficult consensus that Spain has not yet been able to put into practice. Originality/value The dark tourism framework is an opportunity to link both economic and educational objectives, co-working on a model of consensus, but there is a gap in the literature on dark tourism in terms of Spain’s history. This strategy could be also applied to other controversial heritage with similar characteristics, according to different positioning classifications.


Sign in / Sign up

Export Citation Format

Share Document