Search results

1 – 9 of 9
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 August 2002

I. Irakleous, S.M. Furnell, P.S. Dowland and M. Papadaki

The paper presents a comparative study of software‐based user authentication techniques, contrasting the use of traditional password and personal identifier numbers (PIN) against…

813

Abstract

The paper presents a comparative study of software‐based user authentication techniques, contrasting the use of traditional password and personal identifier numbers (PIN) against alternative methods involving question and answer responses and graphical representation. All methods share the common basis of some secret knowledge and rely upon the user’s ability to recall it in order to achieve authentication. An experimental trial is described, along with the results based upon 27 participants. The alternative methods are assessed in terms of practical effectiveness (in this context relating to the participant’s ability to authenticate themselves a significant time after initial use of the methods), as well as the perceived levels of user friendliness and security that they provide. The investigation concludes that while passwords and PIN approaches garner good ratings on the basis of their existing familiarity to the participants, other methods based upon image recall and cognitive questions also achieved sufficiently positive results to suggest them as viable alternatives in certain contexts.

Details

Information Management & Computer Security, vol. 10 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 2004

S.M. Furnell, I. Papadopoulos and P. Dowland

Modern IT systems have a continued requirement for reliable user authentication at login. However, the majority of systems are still using username/password combinations, in spite…

999

Abstract

Modern IT systems have a continued requirement for reliable user authentication at login. However, the majority of systems are still using username/password combinations, in spite of a variety of recognised weaknesses. Identifies the need for improved login authentication, and investigates the suitability of two alternative methods, using cognitive questions and an image‐based PIN. The effectiveness of these techniques has already been evaluated in an earlier study, which assessed users' ability to recall the necessary information after a prolonged period of inactivity. Here, the evaluation is focused on the perceived acceptability of the techniques, based upon users' longer‐term opinions arising from a period of regular usage. Discovers that 56 per cent of the participants would support the use of such techniques as a replacement for traditional password or numeric PIN‐based authentication. However, also discovers that some users have the potential to compromise the security of the methods by using them inappropriately. As such, concludes that, although the use of alternative authentication techniques is viable, further research is needed to refine the approaches and identify the best combination of methods across a larger base of users.

Details

Information Management & Computer Security, vol. 12 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 January 2009

Ron Langevin, Mara Langevin, Suzanne Curnoe and Jerald Bain

The prevalence of thyroid abnormalities among 831 sexual, violent, and non‐violent non‐sex offenders was found to be greater than found in the general population. Thyroid…

162

Abstract

The prevalence of thyroid abnormalities among 831 sexual, violent, and non‐violent non‐sex offenders was found to be greater than found in the general population. Thyroid abnormalities were most common among violent offenders and among sex offenders who victimized children. Thyroid disorders were associated with psychotic diagnoses, delusions, mania, suicidal thoughts, and showed a trend to more suicide attempts. These disorders were undiagnosed in 49.1% of the cases prior to the present clinical assessment. Of these, 59.3% faced their first criminal charges, and the undiagnosed thyroid abnormalities may be important in the offenders’ treatment and may be possible legal mitigating factors in some offenses. Results indicate that a routine endocrine evaluation with blood tests would be a valuable addition to the assessment of violent and sexual offenders.

Details

International Journal of Prisoner Health, vol. 5 no. 1
Type: Research Article
ISSN: 1744-9200

Keywords

Access Restricted. View access options
Article
Publication date: 20 June 2019

Verena Zimmermann, Nina Gerber, Peter Mayer, Marius Kleboth, Alexandra von Preuschen and Konstantin Schmidt

Six years ago, Bonneau et al. (2012) proposed a framework to compare authentication schemes to the ubiquitous text password. Even though their work did not reveal an alternative…

207

Abstract

Purpose

Six years ago, Bonneau et al. (2012) proposed a framework to compare authentication schemes to the ubiquitous text password. Even though their work did not reveal an alternative outperforming the text password on every criterion, the framework can support decision makers in finding suitable solutions for specific authentication contexts. The purpose of this paper is to extend and update the database, thereby discussing benefits, limitations and suggestions for continuing the development of the framework.

Design/methodology/approach

This paper revisits the rating process and describes the application of an extended version of the original framework to an additional 40 authentication schemes identified in a literature review. All schemes were rated in terms of 25 objective features assigned to the three main criteria: usability, deployability and security.

Findings

The rating process and results are presented along with a discussion of the benefits and pitfalls of the rating process.

Research limitations/implications

While the extended framework, in general, proves suitable for rating and comparing authentication schemes, ambiguities in the rating could be solved by providing clearer definitions and cut-off values. Further, the extension of the framework with subjective user perceptions that sometimes differ from objective ratings could be beneficial.

Originality/value

The results of the rating are made publicly available in an authentication choice support system named ACCESS to support decision makers and researchers and to foster the further extension of the knowledge base and future development of the extended rating framework.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Book part
Publication date: 18 July 2007

Georgios D. Sideridis

Goal orientations and classroom goal structures proved to be highly predictive of classroom-related behaviors and academic achievement. The purpose of the present study was to…

Abstract

Goal orientations and classroom goal structures proved to be highly predictive of classroom-related behaviors and academic achievement. The purpose of the present study was to predict students’ classroom behaviors from goal orientations and classroom goal structures and compare those predictions across students with and without learning problems. Participants were 209 typical students and 18 students with learning difficulties/disabilities (LD). Individual goal orientations and perceptions of classrooms’ goal structures were assessed using self-reports. Student behaviors were assessed over five consecutive days during school hours. Using Multilevel Random Coefficient Modeling (MRCM) procedures, results indicated that mastery approach goals and a mastery goal structure were positive predictors of positive affect, student engagement and students’ perceptions of reinforcement from teachers. Mastery avoidance goals were a negative predictor of positive affective states and a positive predictor of both negative affective states and perceptions of punishment. Last, performance approach goals and a performance goal structure exerted deleterious effects on students’ positive classroom behaviors, particularly for students with LD. When matching mastery goals with a mastery goal structure, effects were significantly more pronounced, and in the desired direction, compared to the matching of performance goals with a performance goal structure. Implications of the findings for practice are discussed.

Details

International Perspectives
Type: Book
ISBN: 978-1-84950-503-1

Access Restricted. View access options
Article
Publication date: 22 March 2011

Lior Lazar, Omer Tikolsky, Chanan Glezer and Moshe Zviran

Cognitive passwords are typically realized using “one size fits all” fact‐based or opinion‐based questions, and as such are prone to guessing attacks. The purpose of this paper is…

2243

Abstract

Purpose

Cognitive passwords are typically realized using “one size fits all” fact‐based or opinion‐based questions, and as such are prone to guessing attacks. The purpose of this paper is to propose a method of personalizing cognitive passwords to individual users, to close this loophole, and evaluate its performance against rigid cognitive passwords.

Design/methodology/approach

A personalized questionnaire formulated by the subjects was benchmarked against a rigid questionnaire in terms of recall and security. The evaluation employed two constructs used extensively in previous research, namely, Recall – the success in remembering a password, and Secrecy – the likelihood that the password cannot be guessed.

Findings

While the experiment found that personalization increases the recall of cognitive passwords, it showed no improvement in secrecy (reducing guessing rates).

Research limitations/implications

The study was conducted in an academic environment with young freshmen students thereby limiting external validity. Another problem might stem from the difference in the length of the questionnaires between groups in order to minimize drop‐out rates.

Practical implications

Secrecy was and still is the Achilles heel of the cognitive password mechanism and therefore the results imply that some restrictions should be imposed to prevent selection of over‐simplistic cognitive passwords.

Originality/value

This study is important because it is the first of its kind – benchmarking recall and secrecy of two types of cognitive authentication methods – rigid and personalized.

Details

Information Management & Computer Security, vol. 19 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Available. Open Access. Open Access
Book part
Publication date: 1 December 2022

Clemens Striebing

Purpose: This study examines the relationship between gender, nationality, care responsibilities for children, and the psychological work climate of researchers.Basic Design:

Abstract

Purpose: This study examines the relationship between gender, nationality, care responsibilities for children, and the psychological work climate of researchers.

Basic Design: Based on a dataset of approximately 2,900 cases, the main effects of gender and nationality, their interaction effect and the interaction effects of gender with care responsibilities for minor children, and with hierarchical position are considered in relation to work climate. Dummy regressions and t-tests were performed to estimate and compare the means and regression parameters of the perceived group climate and the view of leaders as evaluated by researchers. The dataset used was taken from a full survey of employees of the Max Planck Society, which is one of Germany’s largest research organizations with over 80 facilities and institutes in various disciplines and a focus on basic research.

Results: Gender differences concerning the evaluation of the work climate are particularly pronounced among doctoral candidates and researchers who have a non-EU nationality. Gender gaps increasingly level out with each successive career step. Additionally, a main effect of gender and a weak interaction of gender and care responsibility for minor children was supported by the data. A main effect of nationality on work climate ratings was found but could not be meaningfully interpreted.

Interpretation and Relevance: The interaction effect between gender and the position of a researcher can be interpreted as being a product of the filtering mechanism of the research system. With this interpretation, the results of the study can plausibly be explained in the light of previous research that concludes that female researchers face higher career hurdles than male researchers.

Details

Diversity and Discrimination in Research Organizations
Type: Book
ISBN: 978-1-80117-959-1

Keywords

Available. Open Access. Open Access
Book part
Publication date: 1 December 2022

Clemens Striebing

Purpose: The study elaborates the contextual conditions of the academic workplace in which gender, age, and nationality considerably influence the likelihood of…

Abstract

Purpose: The study elaborates the contextual conditions of the academic workplace in which gender, age, and nationality considerably influence the likelihood of self-categorization as being affected by workplace bullying. Furthermore, the intersectionality of these sociodemographic characteristics is examined.

Basic Design: The hypotheses underlying the study were mainly derived from the social role, social identity, and cultural distance theory, as well as from role congruity and relative deprivation theory. A survey data set of a large German research organization, the Max Planck Society, was used. A total of 3,272 cases of researchers and 2,995 cases of non-scientific employees were included in the analyses performed. For both groups of employees, binary logistic regression equations were constructed. the outcome of each equation is the estimated percentage of individuals who reported themselves as having experienced bullying at work occasionally or more frequently in the 12 months prior to the survey. The predictors are the demographic and organization-specific characteristics (hierarchical position, scientific field, administrative unit) of the respondents and selected interaction terms. Using regression equations, hypothetically relevant conditional marginal means and differences in regression parameters were calculated and compared by means of t-tests.

Results: In particular, the gender-related hypotheses of the study could be completely or conditionally verified. Accordingly, female scientific and non-scientific employees showed a higher bullying vulnerability in (almost) all contexts of the academic workplace. An increased bullying vulnerability was also found for foreign researchers. However, the patterns found here contradicted those that were hypothesized. Concerning the effect of age analyzed for non-scientific personnel, especially the age group 45–59 years showed a higher bullying probability, with the gender gap in bullying vulnerability being greatest for the youngest and oldest age groups in the sample.

Interpre4tation and Relevance: The results of the study especially support the social identity theory regarding gender. In the sample studied, women in minority positions have a higher vulnerability to bullying in their work fields, which is not the case for men. However, the influence of nationality on bullying vulnerability is more complex. The study points to the further development of cultural distance theory, whose hypotheses are only partly able to explain the results. The evidence for social role theory is primarily seen in the interaction of gender with age and hierarchical level. Accordingly, female early career researchers and young women (and women in the oldest age group) on the non-scientific staff presumably experience a masculine workplace. Thus, the results of the study contradict the role congruity theory.

Details

Diversity and Discrimination in Research Organizations
Type: Book
ISBN: 978-1-80117-959-1

Keywords

Available. Open Access. Open Access
Book part
Publication date: 1 December 2022

Clemens Striebing

Purpose: Previous research identified a measurement gap in the individual assessment of social misconduct in the workplace related to gender. This gap implies that women respond…

Abstract

Purpose: Previous research identified a measurement gap in the individual assessment of social misconduct in the workplace related to gender. This gap implies that women respond to comparable self-reported acts of bullying or sexual discrimination slightly more often than men with the self-labeling as “bullied” or “sexually discriminated and/or harassed.” This study tests this hypothesis for women and men in the scientific workplace and explores patterns of gender-related differences in self-reporting behavior.

Basic design: The hypotheses on the connection between gender and the threshold for self-labeling as having been bullied or sexually discriminated against were tested based on a sample from a large German research organization. The sample includes 5,831 responses on bullying and 6,987 on sexual discrimination (coverage of 24.5 resp. 29.4 percentage of all employees). Due to a large number of cases and the associated high statistical power, this sample for the first time allows a detailed analysis of the “gender-related measurement gap.” The research questions formulated in this study were addressed using two hierarchical regression models to predict the mean values of persons who self-labeled as having been bullied or sexually discriminated against. The status of the respondents as scientific or non-scientific employees was included as a control variable.

Results: According to a self-labeling approach, women reported both bullying and sexual discrimination more frequently. This difference between women and men disappeared for sexual discrimination when, in addition to the gender of a person, self-reported behavioral items were considered in the prediction of self-labeling. For bullying, the difference between the two genders remained even in this extended prediction. No statistically significant relationship was found between the frequency of self-reported items and the effect size of their interaction with gender for either bullying or sexual discrimination. When comparing bullying and sexual discrimination, it should be emphasized that, on average, women report experiencing a larger number of different behavioral items than men.

Interpretation and relevance: The results of the study support the current state of research. However, they also show how volatile the measurement instruments for bullying and sexual discrimination are. For example, the gender-related measurement gap is considerably influenced by single items in the Negative Acts Questionnaire and Sexual Experience Questionnaire. The results suggest that women are generally more likely than men to report having experienced bullying and sexual discrimination. While an unexplained “gender gap” in the understanding of bullying was found for bullying, this was not the case for sexual discrimination.

Details

Diversity and Discrimination in Research Organizations
Type: Book
ISBN: 978-1-80117-959-1

Keywords

1 – 9 of 9
Per page
102050