The password practices applied by South African online consumers: Perception versus reality
Background: The ability to identify and authenticate users is regarded as the foundation of computer security. Although new authentication technologies are evolving, passwords are the most common method used to control access in most computer systems. Research suggests that a large portion of comput...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
AOSIS
2015-07-01
|
Series: | South African Journal of Information Management |
Online Access: | https://sajim.co.za/index.php/sajim/article/view/638 |