Improving information security management: An analysis of ID-password usage and a new login vulnerability measure

Cited 25 time in webofscience Cited 0 time in scopus
  • Hit : 1048
  • Download : 94
DC FieldValueLanguage
dc.contributor.authorBang, Young-Sokko
dc.contributor.authorLee, Dong-Jooko
dc.contributor.authorBae, Yoon-Sooko
dc.contributor.authorAhn, Jae-Hyeonko
dc.date.accessioned2013-03-12T08:18:40Z-
dc.date.available2013-03-12T08:18:40Z-
dc.date.created2012-12-24-
dc.date.created2012-12-24-
dc.date.issued2012-10-
dc.identifier.citationINTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, v.32, no.5, pp.409 - 418-
dc.identifier.issn0268-4012-
dc.identifier.urihttp://hdl.handle.net/10203/101768-
dc.description.abstractStatistics show that the number of identity theft victims in the US increased by 12% in 2009, to 11.1 million adults, while the total annual fraud amount increased by 12.5%, to $54 billion. As the e-commerce volume is increasing and various online services are becoming more popular, the number of sites to which an average Internet user subscribes is increasing rapidly. Given the limited memory capacity of human beings, an Internet user's login credentials (in the form of a combination of a user ID and a password) are usually reused over multiple accounts, which can cause significant security problems. In this study, we address the vulnerability of login credentials. First, based on a unique Internet user data set, we analyze the behavioral characteristics of login credentials usage. We find that the same login credentials are used for many more accounts and reused much more often than previously expected. Furthermore, usage patterns are found to be quite skewed. Second, building on a network perspective of login credentials usage, we suggest a vulnerability measure of an individual's login credentials and analyze the vulnerability of current Internet users. The resulting information is valuable not only to the research community but also to managers and policy makers striving to reduce security vulnerability. (C) 2012 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.publisherELSEVIER SCI LTD-
dc.subjectSYSTEMS SECURITY-
dc.subjectMETABOLIC NETWORKS-
dc.subjectMEMORABILITY-
dc.subjectPOLICY-
dc.subjectORGANIZATION-
dc.subjectPERSPECTIVE-
dc.subjectAWARENESS-
dc.subjectRECALL-
dc.titleImproving information security management: An analysis of ID-password usage and a new login vulnerability measure-
dc.typeArticle-
dc.identifier.wosid000310672300002-
dc.identifier.scopusid2-s2.0-84867459885-
dc.type.rimsART-
dc.citation.volume32-
dc.citation.issue5-
dc.citation.beginningpage409-
dc.citation.endingpage418-
dc.citation.publicationnameINTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT-
dc.identifier.doi10.1016/j.ijinfomgt.2012.01.001-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorAhn, Jae-Hyeon-
dc.contributor.nonIdAuthorLee, Dong-Joo-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorInformation security management-
dc.subject.keywordAuthorID-
dc.subject.keywordAuthorPassword-
dc.subject.keywordAuthorVulnerability measurement-
dc.subject.keywordAuthorE-business-
dc.subject.keywordPlusSYSTEMS SECURITY-
dc.subject.keywordPlusMETABOLIC NETWORKS-
dc.subject.keywordPlusMEMORABILITY-
dc.subject.keywordPlusPOLICY-
dc.subject.keywordPlusORGANIZATION-
dc.subject.keywordPlusPERSPECTIVE-
dc.subject.keywordPlusAWARENESS-
dc.subject.keywordPlusRECALL-
Appears in Collection
MT-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 25 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0