Password Logbooks and What Their Amazon Reviews Reveal About Their Users’ Motivations, Beliefs, and Behaviors
نویسندگان
چکیده
The existence of and market for notebooks designed for users to write down passwords illuminates a sharp contrast: what is often prescribed as proper password behavior—e.g., never write down passwords—differs from what many users actually do. These password logbooks and their reviews provide many unique and surprising insights into their users’ beliefs, motivations, and behaviors. We examine the password logbooks and analyze, using grounded theory, their reviews, to better understand how these users think and behave with respect to password authentication. Several themes emerge including: previous password management strategies, gifting, organizational strategies, password sharing, and dubious security advice. Some users argue these books enhance security.
منابع مشابه
Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice
Usable security researchers have long been interested in what users do to keep their devices and data safe and how that compares to recommendations. Additionally, experts have long debated and studied the psychological underpinnings and motivations for users to do what they do, especially when such behavior is seen as risky, at least to experts. This study investigates user motivations through ...
متن کاملUsing Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment
Encouraging users to create stronger passwords is one of the key issues in password-based authentication. It is particularly important as prior works have highlighted that most passwords are weak. Yet, passwords are still the most commonly used authentication method. This paper seeks to mitigate the issue of weak passwords by proposing a context-based password strength meter. We conduct a rando...
متن کاملThe Relationship between Religious Beliefs and Behaviors and the Intention of Premarital Sexual Abstinence among Iranian Youths
Background and objectives : Relatively little is known about the relationship between religion and abstinence. The aim of this study was to examine the correlation between religious beliefs and behaviors and the intention of premarital sexual abstinence among Iranian youths. Methods: The current study was a cross-sectional one carried out among youths of five universities in Shiraz, Iran. 577 p...
متن کاملA Comparative Usability Study of Two-Factor Authentication
Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires users to carry out additional actions during the authentication process. In this paper, we present an explorato...
متن کاملLocation-Based Social Network Users Through a Lense: Examining Temporal User Patterns
There has been a rapid proliferation of location-based social networks (LBSNs) during the last years. The spatial component of these systems provides a rich source of information that can be exploited by a number of novel services. However, to better design such services, it is important to understand the way people make use of these platforms and how this usage changes over time. While there e...
متن کامل