語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Risk Analysis of the Discoverability...
~
ProQuest Information and Learning Co.
Risk Analysis of the Discoverability of Personal Data Used for Primary and Secondary Authentication.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Risk Analysis of the Discoverability of Personal Data Used for Primary and Secondary Authentication./
作者:
Richards, Kirsten Esther.
面頁冊數:
1 online resource (284 pages)
附註:
Source: Dissertation Abstracts International, Volume: 78-10(E), Section: A.
Contained By:
Dissertation Abstracts International78-10A(E).
標題:
Information science. -
電子資源:
click for full text (PQDT)
ISBN:
9781369807530
Risk Analysis of the Discoverability of Personal Data Used for Primary and Secondary Authentication.
Richards, Kirsten Esther.
Risk Analysis of the Discoverability of Personal Data Used for Primary and Secondary Authentication.
- 1 online resource (284 pages)
Source: Dissertation Abstracts International, Volume: 78-10(E), Section: A.
Thesis (Ph.D.)
Includes bibliographical references
Personal data are frequently leveraged to create passwords for password based authentication systems. Personal data are also used in secondary authentication systems, particularly those based around a question and answer format. The use of personal data in authenticators is believed to be driven, to some degree, by usability. The antinomic proposition of usable system authentication, an easily remembered and usable scheme for the proper user which is simultaneously unknown and unusable to any other entity, historically proves to be an elusive goal. While alternative propositions for authentication protocols are numerous, lacking in literature is foundational work directly relating potential authenticators with the discoverability of personal data online. This dissertation investigates the discoverability of personal data, particularly whether another human is able to purposefully find particular personal data commonly used in authentication protocols. Between fifty and sixty participants provide search results for specific personal data regarding four additional participants. The four participants acted as a source for the personal data, consented to the web search and validated the accuracy of data supplied by the data seeking participants. Analyses of the results reveals consistent patterns in the personal data discovered. The results lay a foundation for the improvement of current authentication systems and provide a significant step in both methodology and recommendations to guide the development of alternatives with a goal towards the creation of usable, secure authentication systems. Furthermore, the results provide insight into the nature of privacy, user control of data and the availability of personal data on Web sources.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369807530Subjects--Topical Terms:
561178
Information science.
Index Terms--Genre/Form:
554714
Electronic books.
Risk Analysis of the Discoverability of Personal Data Used for Primary and Secondary Authentication.
LDR
:03065ntm a2200337Ki 4500
001
908957
005
20180419104822.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9781369807530
035
$a
(MiAaPQ)AAI10272781
035
$a
(MiAaPQ)umbc:11612
035
$a
AAI10272781
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Richards, Kirsten Esther.
$3
1179393
245
1 0
$a
Risk Analysis of the Discoverability of Personal Data Used for Primary and Secondary Authentication.
264
0
$c
2017
300
$a
1 online resource (284 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 78-10(E), Section: A.
500
$a
Adviser: Anthony F. Norcio.
502
$a
Thesis (Ph.D.)
$c
University of Maryland, Baltimore County
$d
2017.
504
$a
Includes bibliographical references
520
$a
Personal data are frequently leveraged to create passwords for password based authentication systems. Personal data are also used in secondary authentication systems, particularly those based around a question and answer format. The use of personal data in authenticators is believed to be driven, to some degree, by usability. The antinomic proposition of usable system authentication, an easily remembered and usable scheme for the proper user which is simultaneously unknown and unusable to any other entity, historically proves to be an elusive goal. While alternative propositions for authentication protocols are numerous, lacking in literature is foundational work directly relating potential authenticators with the discoverability of personal data online. This dissertation investigates the discoverability of personal data, particularly whether another human is able to purposefully find particular personal data commonly used in authentication protocols. Between fifty and sixty participants provide search results for specific personal data regarding four additional participants. The four participants acted as a source for the personal data, consented to the web search and validated the accuracy of data supplied by the data seeking participants. Analyses of the results reveals consistent patterns in the personal data discovered. The results lay a foundation for the improvement of current authentication systems and provide a significant step in both methodology and recommendations to guide the development of alternatives with a goal towards the creation of usable, secure authentication systems. Furthermore, the results provide insight into the nature of privacy, user control of data and the availability of personal data on Web sources.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information science.
$3
561178
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0723
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of Maryland, Baltimore County.
$b
Information Systems.
$3
1179394
773
0
$t
Dissertation Abstracts International
$g
78-10A(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10272781
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入