As businesses across the globe become more heavily dependent on information technology, safeguarding digital information assets against misuse has assumed vital importance. Passwords have become a necessary part of our everyday lives, controlling access to the systems and applications hosting digital information. The growth of IT necessitates the use of passwords as the basic tools for safeguarding digital information. The growth of e-commerce as well as the use of multiple platforms and applications has resulted in multiple accounts for end users, who have to manage multiple passwords in this current global business scenario. In fact, some users manage as many as 15 separate passwords (Ives et al., 2004). Though important, passwords often remain below the level of active, conscious thought for many. Users are caught in a dilemma of devising a password that is simultaneously easy to remember and secure enough for the desired purpose (Bort, 2002). Often passwords aren't secure enough (Aytes et al., 2004; Bort, 2002; Cazier et al., 2006; Fontana, 2005; Ives et al., 2004; Kelly, 2004; Mulligan et al., 2005; Stanton et al., 2005; Wakefield, 2004). In fact, the SysAdmin, Audit, Network, Security (SANS) Institute indicates that weak or nonexistent passwords are among the top 10 computer vulnerabilities in homes and businesses (Wakefield, 2004).
展开▼