Assessing the Value of Formal Control Mechanisms on Strong Password Selection

Assessing the Value of Formal Control Mechanisms on Strong Password Selection

Jeff Crawford
Copyright: © 2013 |Volume: 4 |Issue: 3 |Pages: 17
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466633919|DOI: 10.4018/jsse.2013070101
Cite Article Cite Article

MLA

Crawford, Jeff. "Assessing the Value of Formal Control Mechanisms on Strong Password Selection." IJSSE vol.4, no.3 2013: pp.1-17. http://doi.org/10.4018/jsse.2013070101

APA

Crawford, J. (2013). Assessing the Value of Formal Control Mechanisms on Strong Password Selection. International Journal of Secure Software Engineering (IJSSE), 4(3), 1-17. http://doi.org/10.4018/jsse.2013070101

Chicago

Crawford, Jeff. "Assessing the Value of Formal Control Mechanisms on Strong Password Selection," International Journal of Secure Software Engineering (IJSSE) 4, no.3: 1-17. http://doi.org/10.4018/jsse.2013070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Applications often use behavior control mechanisms in order to ensure that individuals create sufficiently strong passwords. Behavior controls, which force individuals to utilize specific password characteristics, are assumed to be the best mechanism to encourage strong password creation. However, an over reliance on them could lead to counterproductive security behaviors. This study examines the efficacy of formal controls in the password creation process to determine if their use does indeed result in meaningfully stronger passwords than informal control techniques. Findings demonstrate that controls used during the password creation process do indeed shape password strength, but that behavior controls do not produce significantly stronger passwords than informal controls. Using an Agency Theory perspective, control techniques are considered in their ability to align principal-agent goal and risk perceptions. Findings illustrate the importance of using both informal and formal controls as a means of creating strong and effective passwords.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.