On password behaviours and attitudes in different populations

被引:18
作者
Alomari, Ruba [1 ]
Thorpe, Julie [1 ]
机构
[1] Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Empirical studies; Passwords; Authentication; User behaviour; User studies;
D O I
10.1016/j.jisa.2018.12.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We explore the differences in password behaviours and attitudes of samples of university students, IT professionals, and the general population (non-student and non-IT professional). Currently, text-based password authentication is the most commonly deployed user authentication mechanism, despite numerous alternatives. Passwords are thus a popular research topic, where many password studies are done in universities where the majority of participants are students. Many studies also do not differentiate between IT professionals and others. Thus, we aim to gain insights about the effect of focusing on samples from university students and/or IT professionals. We conducted a 100-participant online user study involving three sessions over 8 - 10 days. The study tasks involved password creation and password recall. We also surveyed participant's password-related behaviours and preferences for different authentication methods. Our results provide insights about the effect of using a large proportion of university students and/or IT professionals in password studies. Our findings should be of interest to the research community and also provide useful data to authentication system designers regarding user preferences and attitudes. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:79 / 89
页数:11
相关论文
共 29 条
[1]  
[Anonymous], P 9 S US PRIV SEC SO
[2]  
[Anonymous], 2015, INT C PASSW CAMBR UK
[3]  
[Anonymous], 2007, P WWW C 2007, DOI DOI 10.1145/1242572.1242661
[4]  
[Anonymous], NDSS
[5]  
Atkinson R.C., 1968, PSYCHOL LEARNING MOT, V2, P89, DOI [10.1016/S0079-7421(08)60422-3, DOI 10.1016/S0079-7421(08)60422-3]
[6]   Graphical Passwords: Learning from the First Twelve Years [J].
Biddle, Robert ;
Chiasson, Sonia ;
Van Oorschot, P. C. .
ACM COMPUTING SURVEYS, 2012, 44 (04)
[7]   The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes [J].
Bonneau, Joseph ;
Herley, Cormac ;
van Oorschot, Paul C. ;
Stajano, Frank .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :553-567
[8]   Amazon's Mechanical Turk: A New Source of Inexpensive, Yet High-Quality, Data? [J].
Buhrmester, Michael ;
Kwang, Tracy ;
Gosling, Samuel D. .
PERSPECTIVES ON PSYCHOLOGICAL SCIENCE, 2011, 6 (01) :3-5
[9]  
Dirik AhmetEmir., 2007, Proceedings of the 3rd symposium on Usable privacy and security, P20
[10]  
Florencio D., 2014, 28 LARGE INSTALLATIO, P44