553 research outputs found

    Towards the Development and Assessment of a Method for Educating Users into Choosing Complex, Memorable Passphrases

    Get PDF
    The currently most used method for authentication is the password because it is simple to implement, and computer users are very familiarized with it. However, passwords are vulnerable to attacks that can be mitigated by increasing the complexity of the chosen password, particularly in terms of length. One possible approach to accomplish this is through the usage of passphrases, which can be easier to remember than a standard password, thus reducing the loss of work time and productivity related to forgotten passwords. To achieve the required balance between complexity and memorability, the concept of passphrase categories can be used, i.e. more sensitive accounts or services should have more complex passphrases, and vice versa. This work-in-progress study proposes to develop and assess a method for educating users into creating complex, yet easy to remember passphrases, according to the category of account or service they want to protect. The work-in-progress study will be developed in three phases, including validation of the method by a panel of subject matter experts, a pilot test, and a main data collection and analysis phase

    Password Policy Effects on Entropy and Recall: Research in Progress

    Get PDF
    Passwords are commonly used for authentication. System architects generally put in place password policies that define the required length of a password, the complexity requirements of the password, and the expiration (if ever) of the password. Password policies are designed with the intent of helping users choose secure passwords, and in the case of password expiration, limit the potential damage of a compromised password. However, password policies can have unintended consequences that could potentially undermine their security aims. Based on the theory of cognitive load, it is hypothesized that password policy elements increase extraneous load, which can result in high entropy passwords, but to the detriment of recall. It is further hypothesized that certain password policy elements can still help increase entropy, while minimizing the negative impact on recall. An experiment to test the hypotheses and determine both a secure and user friendly password policy is put forward

    LS 152L.05: Introduction to the Humanities

    Get PDF

    Reevaluating the Computer Fraud and Abuse Act: Amending the Statute to Explicitly Address the Cloud

    Get PDF
    Under the current interpretations of authorization, instances where an individual harmlessly accesses the cloud data of another user could be classified as hacking and a violation of this federal statute. As such, this Note demonstrates that all of the current interpretations of the CFAA are too broad because they could result in this nonsensical outcome. This Note accordingly proposes an amendment to the CFAA specifically addressing user access to data on the cloud. Such an amendment would eliminate the unusual result of innocuous cloud-computing users being deemed hackers under federal law

    LS 152L.09: Introduction to the Humanities

    Get PDF

    LS 152L.05: Introduction to the Humanities

    Get PDF

    Daily Announcements November 2004

    Get PDF

    The Lived Experiences of Nurses Caring for Pediatric Behavioral Health Patients in the Emergency Department

    Get PDF
    Obtaining behavioral health evaluation and care for the pediatric population is particularly difficult. In recent years, emergency departments (EDs) have become a customary location for patients to seek behavioral health treatment. This spike has created unforeseen problems and caring for this vulnerable population presents ED nurses with many challenges. The purpose of the study was to understand the lived experience of nurses caring for pediatric behavioral health patients in the ED. A qualitative, descriptive phenomenological research design was utilized. Participants (N = 15) engaged in semi-structured interviews and Colaizzi’s (1978) method was used to identify themes. The data analysis resulted in 355 significant statements, which formed five overarching themes: (a) Caring on Empty: The Result of Negative Emotions and Feelings, (b) A Fraying Rope: Does Anyone Care About Us?, (c) Children in Purgatory: Waiting in Limbo, (d) Mirroring a Prison: Are We Doing More Harm Than Good, and (e) Creating a Larger Tool Belt: Incorporating Behavioral Health Into the ED. Nurses often expressed frustration, anger, sadness, hopelessness, and feelings of being overwhelmed. Many either experienced or witnessed physical violence and feared working with this population. The physical and emotional abuse led nurses to wonder if hospital organizations cared about their well-being. Nurses discussed excessive utilization of the ED, excessive lengths of stay, and the lack of resources in the ED. Caring for pediatric behavioral health patients in the ED was described as “working on a sinking ship.” Nurses can utilize the results of this study to provide safe, therapeutic care to pediatric behavioral health patients in the ED. The results make clear the importance of putting pediatric behavioral health at the forefront of ED care in order to increase patient outcomes as well as to increase nurse satisfaction
    • …
    corecore