NotesFAQContact Us
Collection
Advanced
Search Tips
Peer reviewed Peer reviewed
PDF on ERIC Download full text
ERIC Number: EJ1140803
Record Type: Journal
Publication Date: 2014-Aug
Pages: 7
Abstractor: As Provided
ISBN: N/A
ISSN: EISSN-1545-679X
EISSN: N/A
Employing Two Factor Authentication Mechanisms: A Case Study
Lawrence, Cameron; Fulton, Eric; Evans, Gerald; Firth, David
Information Systems Education Journal, v12 n5 p16-22 Aug 2014
This case study examines the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Facebook. Part one of the case study examines how the hack was perpetrated and the fallout of losing control of one's digital identity. Part two of the case study details how the main character recovered her accounts, simultaneously providing readers with the tools necessary to protect their own digital identities. Specifically, this case focuses on the use of two-step authentication schemes along with the generation, use and management of complex passwords. We then provide a set of discussion questions along with suggested lab activities that will show students how to implement the technologies discussed in the case. This case is intended to be used at both the undergraduate and graduate levels. This case complements the model curriculum objectives in IS 2010.1 and IS 2010.7.
Information Systems and Computing Academic Professionals. Box 488, Wrightsville Beach, NC 28480. e-mail: publisher@isedj.org; Web site: http://isedj.org
Publication Type: Journal Articles; Reports - Research; Tests/Questionnaires
Education Level: Higher Education; Postsecondary Education
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A
Grant or Contract Numbers: N/A