54 research outputs found

    Utilizing persuasion approach to improve compliance behaviour with password guidelines

    Get PDF
    Password based authentication remains the most commonly used authentication mechanism, in spite of the rapid introduction of several other authentication mechanisms such as smart cards, graphical passwords and biometrics.Users mainly rely on password guidelines to construct their password; nevertheless existing password guidelines seem inadequate especially from the perspective of influencing the users’ security compliance behavior.Thus, this study intended to investigate ways to improve the content of password guidelines through persuasion approach to increase the likelihood of compliance behavior. A control laboratory experiment was carried out and the results were critically discussed.The outcomes indicate promising findings that users can be persuaded to improve their security compliance behavior by including more persuasive elements in the password guidelines

    Information security awareness: Preliminary studies amongst academicians at Universiti Utara Malaysia

    Get PDF
    Information security is vital to any organization.It holds the reputation as well as the image carried by the organization.Information security does not come in a package.It takes a culmination of people, process and technology.However, people are often overlooked as part of security components.Focus is more given towards implementing the latest technologies and products, such as firewalls, intrusion detection systems and the toughest encryption techniques.Having in mind that all these are able to provide strong protection, leaving people (employees of the organization) behind is not a good idea. There are many researchers who recognized the significance of information security awareness area.However, only few scientific studies have considered this area in depth.It is due to the fact that it falls outside the scope of traditional “hard” computer science.Taking this as a point of departure, this research focused on the human factor as one of the important security component.Current works related to information security awareness are presented together with selected models and frameworks.Survey and interviews was chosen as a method to obtain data and analysis was done from the compilation of the data gathered.Findings of the study revealed an interesting scenario of the perceptions and common practices of respondents in the case study.Conclusions are derived at the end of the research suggests the level of respondents’ awareness towards information security issues

    Social engineering awareness game (SEAG): an empirical evaluation of using game towards improving information security awareness

    Get PDF
    The sharp rise of social engineering attacks in recent years poses serious threats to technology consumers.This is due to the degree of damage that can be done through social engineering. This paper seeks to elaborate on the use of a Social Engineering Awareness Game (SEAG) to improve the rate of awareness of social engineering.This game was tailored towards the needs of technology consumers that are intended to make use of it by ensuring that not only it is knowledgeable but also attractive and fun. In this paper we highlighted the objectives of this study and how it was done.A control laboratory experiment involving participants randomly assigned to either the experimental group or control group (using paper-based) to evaluate the outcome. The impact that the game had on the participants was recorded with an average of 71% improvement in their knowledge and awareness of social engineering, this made them to find the game beneficial and informative.The major drawback of the game is it needs to be more user-friendly and centered.We conclude by showing the need for more research to be put in place pertaining to the aspect of using games in the educational field especially in the network security field that has more threats growing rapidly

    Exploring human factors issues & possible countermeasures in password authentication

    Get PDF
    PhD ThesisThis thesis is concerned with usable security. It describes a series of experiments to understand users’ behaviour in the domain of password authentication. The thesis is comprised of two parts. Part 1 reports on experiments into how different persuasion strategies can be used to increase the strength of users’ password. Existing research indicates that the lack of persuasive elements in password guidelines may lead to a lack of motivation to produce strong passwords. Thus, an experimental study involving seventy-five participants was conducted to evaluate the effectiveness of a range of persuasion strategies on password strength. In addition this experiment explores how personality variables affect the susceptibility of users to persuasion. The results showed that passwords created by users who received password guidelines that include a persuasion strategy produce stronger passwords than a control group. In terms of the personality variables, the result shows that there are certain personality types that tend to produce slightly better passwords than others; but it is difficult to draw a firm conclusion about how personality affects susceptibility to persuasion. The second part of this thesis presents an innovative alternative to text-based passwords, namely, graphical password schemes. Graphical passwords take advantage of the superior ability of humans to remember graphics and pictures over text and numbers. Research shows that graphical password schemes are a promising alternative, but that they are susceptible to shoulder surfing attacks, resulting in scepticism about adoption. Thus in part 2 of the thesis, three innovative shoulder surfing defence techniques are proposed and implemented in a small-scale prototype with a specific focus given to one type of graphical password; The Draw-A-Secret (DAS) scheme. The results of two separate experimental studies involving sixty-five and thirty participants respectively to evaluate the proposed defence techniques from the perspectives of security and usability are presented. The results show that the technique which, on theoretical grounds, was expected to be quite effective, provides little protection. A second technique which did provide the best overall shoulder surfing defence; created usability problems. But a third technique provided a reasonable shoulder surfing defence and good usability simultaneously; a good balance which the other two techniques did not achieve. The proposed defence techniques and experimental results are directly relevant to other graphical password schemes of the same category with slight modification to suit the requirements of the scheme intended. In summary, the thesis contributes to the discussion of some key usability problems which exist around password authentication domains. All the proposed countermeasures are evaluated through a series of experimental studies which present several intriguing discussions and promising findings

    Exploring the role of social media credentials in mobile learning: The engagement perspective

    Get PDF
    This paper presents a study on social media credentials as an authentication mechanism for accessing a mobile learning application.The aim of the study is to investigate whether the use of social network credentials would have effect on mobile learning activities particularly learners’ engagement.An experimental study was conducted on forty students from a higher learning institution in Malaysia using a mobile learning application named LANGKAWI APPS and a learning engagement questionnaire.The mobile application was developed in two versions, one with the social network login facility and the other one with traditional authentication method.The results of the statistical tests demonstrate that social network credentials was rated higher by the learners in terms of attention in mobile learning compared to the traditional method.The results are discussed in terms of applicability of social network credential as an authentication mechanism for mobile learning

    Towards designing effective security messages: Persuasive password guidelines

    Get PDF
    The current state of information security compliance in workplaces is deteriorating. In many cases human factors were attributed as the cause of the problem.Humans are well known as the weakest link in the security chain.Commonly, end-users will depend on security messages when confronted with security-related decision making. Most of the time, end-users will try their best to make sense of unclear instructions in order to cope with situations.This indicates the way security messages are presented is of utmost importance. However, research focusing on designing effective security messages is quite limited.This paper presents research in progress, towards designing effective security messages focusing on passwords guidelines.Our initial review indicated the lack of persuasive elements in the current password guidelines may lead to unmotivated behaviour of producing good (strong) passwords.This paper also includes initial results obtained from pilot study which reveal promising results supporting the usage of persuasion strategies to improve the current state information security compliance

    Linear and non-linear navigations of learning content

    Get PDF
    This paper reports a study concerning linear and non-linear navigations in WBI.The effects of the two navigations on students’ engagement aspects namely; control, focus, curiosity, and intrinsic interests were investigated. The study aimed to identify whether the linear and the non-linear navigations could be the factors that influence students’ engagement while learning in WBI environment.An exploratory experimental study was conducted on seventy-two students from a university in Malaysia using a web-based system for learning Basic Computer Networks.The study suggested that the types of navigations had affected the control aspect, but not the focus, curiosity, and intrinsic interests.Students’ engagement from the context of focus, intrinsic interests and curiosity was similar in both linear and non-linear.These findings are further discussed from cultural perspectives of Malaysian students

    An Overview to Pre-fetching Techniques for Content Caching of Mobile Applications

    Get PDF
    The Internet and web have been the main resource for various types of information for majority of people in the world since a decade ago. With the emerging of smartphone technology, the web content is also available for mobile users that connect to the Internet through cellular network. Although mobile users are able to access content from the web; nevertheless, they always experience long access latency due to the speed of the network. Many research and developments have been implemented to help users to access content faster when using mobile devices with cellular network. Caching is one of them; a commonly used method for storing recently-accessed contents so that they can be used in the future. Content caching (CC) can reduce latency, which in return guarantees faster access to the content. Recently, there is a growing interest among researchers and developers in studying a more proactive technique to improve CC called pre-fetching (PF). PF is a method that caches selected content before it is actually needed. By embedding PF in CC, it is believed that latency could be reduced significantly. By looking at this promising approach, this paper introduces the PF techniques that could be suitable for CC in mobile environment. The paper aims to assist researchers by providing a better understanding on the existing PF techniques so that improvements can be proposed where possible

    Enhancing the security of RCIA ultra-lightweight authentication protocol by using Random Number Generator (RNG) technique

    Get PDF
    This study is an attempt to enhance the security of Robust Confidentiality, Integrity, and Authentication (RCIA) ultra-lightweight authentication protocols.In the RCIA protocol, IDs value is sent between reader and tag as a constant value.This makes RCIA susceptible to traceability attack which lead to the privacy issue. In order to overcome this problem, Random Number Generator (RNG) technique based on Bitwise operations has been used in the tag side.The idea of this technique is to change the IDs of a tag on every query session so that it will not stay as a constant value.The implementation of Enhanced RCIA has been conducted by using a simulation.The simulation provided the ability to show that the operations of RCIA protocol as to compare with the enhanced RCIA.The outcome shows that the enhanced RCIA outperforms existing one in terms of privacy

    Enhancing the Security of RCIA Ultra-Lightweight Authentication Protocol by Using Random Number Generator (RNG) Technique

    Get PDF
    This study is an attempt to enhance the security of Robust Confidentiality, Integrity, and Authentication (RCIA) ultra-lightweight authentication protocols. In the RCIA protocol, IDs value is sent between reader and tag as a constant value. This makes RCIA susceptible to traceability attack which lead to the privacy issue. In order to overcome this problem, Random Number Generator (RNG) technique based on Bitwise operations has been used in the tag side. The idea of this technique is to change the IDs of a tag on every query session so that it will not stay as a constant value. The implementation of Enhanced RCIA has been conducted by using a simulation. The simulation provided the ability to show that the operations of RCIA protocol as to compare with the enhanced RCIA. The outcome shows that the enhanced RCIA outperforms existing one in terms of privacy
    • …
    corecore