The password practices applied by South African online consumers: Perception versus reality

Background: The ability to identify and authenticate users is regarded as the foundation of computer security. Although new authentication technologies are evolving, passwords are the most common method used to control access in most computer systems. Research suggests that a large portion of comput...

Full description

Bibliographic Details
Main Authors: Rika Butler, Martin Butler
Format: Article
Language:English
Published: AOSIS 2015-07-01
Series:South African Journal of Information Management
Online Access:https://sajim.co.za/index.php/sajim/article/view/638