Keywords:-

Keywords: Password management, digital security, authentication, cybersecurity, password tools, user behavior

Article Content:-

Abstract

As digital security concerns escalate, password management remains critical to safeguarding personal and organizational information. This review article explores current practices and tools in password management, evaluating their efficacy and user adoption. The article aims to provide recommendations for improving password security and usability by analyzing recent advancements and common pitfalls.

References:-

References

Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Proceedings of the 1999 CHI Conference on Human Factors in Computing Systems, 481-488. doi:10.1145/302979.303162

Bonneau, J., Herley, C., Oorschot, P. C., & Stajano, F. (2015). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. 2015 IEEE Symposium on Security and Privacy, 553-567. doi:10.1109/SP.2015.44

Florêncio, D., & Herley, C. (2010). Where do security policies come from? Proceedings of the 2010 Workshop on New Security Paradigms, 7-14. doi:10.1145/2046660.2046663

Katz, J. R., & Schneier, B. (2017). Password Security: What Users Know and What They Actually Do. Springer. doi:10.1007/978-3-319-32368-8

Kumar, K., & Sanghavi, A. (2022). Evaluating the effectiveness of password managers in improving user security. Journal of Cyber Security Technology, 6(2), 129-145. doi:10.1080/23742917.2022.2046671

Li, X., & Zhao, J. (2020). An empirical study on password management practices and their impact on security. International Journal of Information Security, 19(4), 375-388. doi:10.1007/s10207-020-05183-w

Morris, A. D., & Thompson, K. (1979). Password security: A case history. Communications of the ACM, 22(11), 594-597. doi:10.1145/359230.359257

O’Neill, M. (2021). The role of two-factor authentication in securing user accounts. Cybersecurity Review, 14(3), 201-215. doi:10.1016/j.csr.2021.05.001

Schneier, B. (2018). Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World. Norton & Company. ISBN: 978-0393608895

Van Oorschot, P. C., & Stajano, F. (2018). Security and Privacy in the Age of Cloud Computing. Wiley. doi:10.1002/9781119340681

Verizon Business (2023). Data Breach Investigations Report. Verizon. Available at:

https://enterprise.verizon.com/resources/reports/dbir/

Weir, M. D., & Aggarwal, K. (2020). Exploring the usability of passwordless authentication methods. ACM Transactions on Privacy and Security, 23(2), 8-26. doi:10.1145/3372297

Wright, J., & Haines, M. (2022). Password management: Tools and techniques for improving security. Journal of Information Privacy and Security, 18(1), 45-60. doi:10.1080/15536548.2022.1985431

Yang, J., & Wu, J. (2021). The impact of biometric authentication on password management. IEEE Access, 9, 75809-75818.

doi:10.1109/ACCESS.2021.3086662

Zhou, X., & Zhang, L. (2019). User behavior in password management: An analysis of empirical data. Journal of Computer Security, 27(5), 555-570. doi:10.3233/JCS-192007

Downloads

Citation Tools

How to Cite
Adewale A., S., & Adeniyi, D. A. (2025). Enhancing Digital Security: A Comprehensive Review of Password Management Practices and Tools. International Journal Of Mathematics And Computer Research, 13(2), 4878-4883. https://doi.org/10.47191/ijmcr/v13i2.12