We probably all know people who juggle 30 or more user ID/password combinations, one set for each application or server to which they need access. Some they use everyday; some they use only occasionally. Some get changed more often than they get used. Some people keep their passwords in their notebooks, some in desk drawers, some in password-protected spreadsheets. No one tries to remember them all. Each method of tracking IDs and passwords represents some sort of security compromise. Security is full of compromises. There would be no security problems if our computers held no sensitive information, or if…
You must be a member of SIGCHI, a subscriber to ACM's Digital Library, or an interactions subscriber to read the full text of this article.
GET ACCESSJoin ACM SIGCHI
In addition to all of the professional benefits of being a SIGCHI member, members get full access to interactions online content and receive the print version of the magazine bimonthly.
Subscribe to the ACM Digital Library
Get access to all interactions content online and the entire archive of ACM publications dating back to 1954. (Please check with your institution to see if it already has a subscription.)
Subscribe to interactions
Get full access to interactions online content and receive the print version of the magazine bimonthly.
No Comments Found