IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Music is the Key: Using our Enduring Memory for Songs to Help Users Log On

Music is the Key: Using our Enduring Memory for Songs to Help Users Log On
View Sample PDF
Author(s): Marcia Gibson (Institute for Research in Applicable Computing, University of Bedfordshire, UK), Karen Renaud (University of Glasgow, UK), Marc Conrad (Institute for Research in Applicable Computing, University of Bedfordshire, UK)and Carsten Maple (Institute for Research in Applicable Computing, University of Bedfordshire, UK)
Copyright: 2013
Pages: 20
Source title: IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-2919-6.ch046

Purchase

View Music is the Key: Using our Enduring Memory for Songs to Help Users Log On on the publisher's website for pricing and purchasing information.

Abstract

Devising access control systems to support needs and capabilities of users, as well as the security requirements of organisations, is a key challenge faced in many of today’s business environments. If users are to behave securely, they must not be overburdened with unworkable authentication policies and methods. Yet the prevailing alphanumeric password can be a double-edged sword: secure passwords are inherently difficult to recall and vice-versa. Consequentially, a growing number of alternatives are emerging. In this chapter, the authors describe one novel scheme - a musical password. Musipass was designed with the user in mind and is tailored toward the task of authentication on the Web, where biometric and token-based systems have proved unsuccessful in replacing the flawed, yet prevalent traditional password. This chapter, which includes discussion on current thinking in the field of authentication, will be of interest to information managers, security practitioners, and HCI professionals.

Related Content

Jeff Mangers, Christof Oberhausen, Meysam Minoufekr, Peter Plapper. © 2020. 26 pages.
Sylvain Maechler, Jean-Christophe Graz. © 2020. 27 pages.
Sabrina Petersohn, Sophie Biesenbender, Christoph Thiedig. © 2020. 41 pages.
Jonas Lundsten, Jesper Mayntz Paasch. © 2020. 21 pages.
Justus Alexander Baron. © 2020. 31 pages.
Vasileios Mavroeidis, Petros E. Maravelakis, Katarzyna Tarnawska. © 2020. 19 pages.
Hiam Serhan, Doudja Saïdi-Kabeche. © 2020. 30 pages.
Body Bottom