scispace - formally typeset
W

William J. Haga

Researcher at Naval Postgraduate School

Publications -  15
Citations -  3692

William J. Haga is an academic researcher from Naval Postgraduate School. The author has contributed to research in topics: Password & Cognitive password. The author has an hindex of 10, co-authored 15 publications receiving 3485 citations.

Papers
More filters
Journal ArticleDOI

A vertical dyad linkage approach to leadership within formal organizations: A longitudinal investigation of the role making process

TL;DR: The authors found that the degree of latitude that a superior granted to a member to negotiate his role was predictive of subsequent behavior on the part of both superior and member, and that superiors typically employed both leadership and supervision techniques within their units.
Journal ArticleDOI

Password security: an empirical study

TL;DR: The core characteristics of user-generated passwords and associations among those characteristics are investigated to address the gap in evaluating the characteristics of real-life passwords and present the results of an empirical study on password usage.
Journal ArticleDOI

Organizational understructure and leadership: A longitudinal investigation of the managerial role-making process

TL;DR: In this paper, a longitudinal investigation of the processes by which a formal organization is almost entirely transfused with new reporting relationships reveal the operation of organizational understructures, which appear to differentiate not only the lowly organizational unit but also hierarchical hierarchies of vertical relationships.
Journal ArticleDOI

A Comparison of Password Techniques for Multilevel Authentication Mechanisms

TL;DR: In this article, the authors report on the results of an empirically based study of passwords characteristics and provide a comparative evaluation on the memorability and users'subjective preferences of the various passwords mechanims, and suggest that cognitive passwords and associative passwords seem the most appropriate for secondary passwords.

A Comparison of Password Techniques for Multilevel Authentication Mechanisms

TL;DR: A comparative evaluation on the memorability and users'subjective preferences of the various passwords mechanims is provided, and it suggests that cognitive passwords and associative passwords seem the most appropriate for secondary passwords.