Check-Off Password System (COPS)

Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security provided by such a password (because they are more difficult to violate or “crack”). However, such passwords tend to be more difficult for end users to remember, particularly when the password does not spell a recognizable word (or includes non-alphanumeric characters such as punctuation marks or other symbols). Conversely, when end users select their own more easily remembered passwords, the passwords may also be easier to crack. This study presents a new approach to entering passwords, which combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords as well as high-protection, assigned-password procedures. The present study investigates trade-offs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all password procedures tested to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared with that high-security password. Further research will be conducted to investigate long-term benefits.

2008 ◽  
pp. 81-97
Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security provided by such a password (because they are more difficult to violate or “crack”). However, such passwords tend to be more difficult for end users to remember, particularly when the password does not spell a recognizable word (or includes non-alphanumeric characters such as punctuation marks or other symbols). Conversely, when end users select their own more easily remembered passwords, the passwords may also be easier to crack. This study presents a new approach to entering passwords, which combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords as well as high-protection, assigned-password procedures. The present study investigates trade-offs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all password procedures tested to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared with that high-security password. Further research will be conducted to investigate long-term benefits.


2008 ◽  
pp. 2114-2129
Author(s):  
Merrill Warkentin

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


Author(s):  
Fiona F. Nah ◽  
Xin Tan ◽  
Soon E. Teh

Despite huge investments made by organizations in ERP implementation, maintenance, and user training, ERP implementation failures and less than expected productivity improvements are not uncommon. End users’ reluctance to use newly implemented ERP systems is often cited as one of the main reasons for ERP failures. To understand the lack of end-user acceptance of ERP systems, we examined end users’ attitude toward system use and symbolic adoption; the latter refers to users’ voluntary mental acceptance of a system. Four instrumental beliefs—perceived usefulness,perceived ease of use, perceived compatibility, and perceived fit—were modeled as the antecedents. The research model was tested using a survey on end users’ perceptions in adopting and using a newly implemented ERP system. The findings show that perceived compatibility and perceived ease of use have both direct and indirect effects (mediated by attitude) on symbolic adoption, while perceived fit and perceived usefulness influence symbolic adoption via attitude. The study provides managerial implications for organizations in engendering positive user acceptance of enterprise systems and applications.


JAICT ◽  
2018 ◽  
Vol 3 (2) ◽  
Author(s):  
Roy Sari Milda Siregar

Evaluation of information system performance is needed to get an overview of the ease of end-users in utilizing a new technology. This study aims to evaluate the performance of information systems in a state-owned company (PT PLN Madya Langsa) based on an end-user perspective that is separated into two categories: employees and managers. The level of employee satisfaction (primary user) is measured using EUCS (aspect of: content, accuracy, format, ease of use, timeliness, and satisfaction). The manager's satisfaction level (secondary user) is measured by using IT BSC (aspect of: company contribution, user, operational excellence, and future orientation). The evaluation on the primary user showed that it was low at 25.6%, moderate at 56.64% and high at 18%. The percentage of user satisfaction with the information systems is 72.9% of the results expected by users. Meanwhile, evaluation on the secondary user obtained the following results: low at 10.5%, moderate 84.2% and high at 5.3%. The percentage of user satisfaction with the information system was 92.8% of the results that is expected by users. This study also discusses why there are differences in the percentage of primary user satisfaction compare to the secondary user and provides suggestions how to improve the level of satisfaction of the end users in the future.


2016 ◽  
Vol 29 (2) ◽  
pp. 59-80 ◽  
Author(s):  
Richard J. Goeke ◽  
Robert H. Faley ◽  
Alan A. Brandyberry ◽  
Kevin E. Dow

As end-users work with increasingly complex technologies, it is important that these technologies be used to the fullest extent possible. Time is needed to learn how to use these new technologies and fit them to user tasks, but the fact that a user has gained experience does not mean that expertise has also been gained. Using survey data collected from 187 data warehouse end-users, we found that experience and expertise have a significant positive correlation (r = 0.35, p < 0.001), but expertise has a significantly greater effect on ease-of-use perceptions (t=10.2, p < 0.0001) and the use of a technology (t=21.08, p < 0.0001) than experience. Therefore, it is critical that researchers properly delineate which construct – end-user expertise or experience – is being assessed, when measuring the effect that individual differences have on the perceptions and use of technology.


Author(s):  
Santhanamery T. ◽  
T. Ramayah

Continuance usage intention is important for any businesses to accentuate the long-term growth of the organization. In the case of e-filing system, the continuance usage intention is vital as it not only can reduce the operation and management cost, also it can ensure that the heavy investments invested in developing the e-filing portals will be worthwhile. The focus in this study is to determine the effect of two main central construct; satisfaction and attitude, on the continuance usage intention of e-filing system among taxpayers. The result of the study reveals that perceived usefulness and attitude has a significant relationship towards continuance usage intention with attitude as the major predictors. However, satisfaction was found to be insignificantly related to continuance usage intention. Apart from that confirmation was found to be the major predictor of satisfaction and perceived ease of use as the major predictor of perceived usefulness.


Author(s):  
Santhanamery T. ◽  
T. Ramayah

Continuance usage intention is important for any business to accentuate the long-term growth of the organization. In the case of e-filing systems, the continuance usage intention is vital as it not only can reduce the operation and management cost, but it can also ensure that the heavy investments invested in developing the e-filing portals will be worthwhile. The focus in this study is to determine the effect of two main central constructs, satisfaction and attitude, on the continuance usage intention of e-filing systems among taxpayers. The result of the study reveals that perceived usefulness and attitude has a significant relationship towards continuance usage intention with attitude as the major predictor. However, satisfaction was found to be insignificantly related to continuance usage intention. Apart from that, confirmation was found to be the major predictor of satisfaction and perceived ease of use as the major predictor of perceived usefulness.


2016 ◽  
pp. 483-502
Author(s):  
Chang Liu ◽  
Ying Zhong

Multi-level adaptation in end-user development (EUD) is an effective way to enable non-technical end users such as educators to gradually introduce more functionality with increasing complexity to 3D virtual learning environments developed by themselves using EUD approaches. Parameterization, integration, and extension are three levels of adaptation ranging from straightforward to complex in terms of what end users have to understand in order to develop functional software applications, all within reach of end users without special training on programming. A 3D educational application EUD system prototype, iVirtualWorld, has been expanded to support 3D virtual chemistry experiments generation using these three levels of EUD adaptation. An evaluation has been conducted on 18 participants from the education domain, and the results confirmed ease-of-learn, ease-of-use, and usefulness of this solution. Contributions of this paper are 1) a paradigm for applying EUD technologies in 3D virtual learning environment creation; 2) an easy-to-use tool for educators to build customized virtual chemistry experiments; and 3) empirical assessment data for the multi-level adaptation solution.


Sign in / Sign up

Export Citation Format

Share Document