Password Logbooks and What Their Amazon Reviews Reveal About Their Users’ Motivations, Beliefs, and Behaviors

نویسندگان

  • Vijay Kothari
  • Jim Blythe
  • Ross Koppel
چکیده

The existence of and market for notebooks designed for users to write down passwords illuminates a sharp contrast: what is often prescribed as proper password behavior—e.g., never write down passwords—differs from what many users actually do. These password logbooks and their reviews provide many unique and surprising insights into their users’ beliefs, motivations, and behaviors. We examine the password logbooks and analyze, using grounded theory, their reviews, to better understand how these users think and behave with respect to password authentication. Several themes emerge including: previous password management strategies, gifting, organizational strategies, password sharing, and dubious security advice. Some users argue these books enhance security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice

Usable security researchers have long been interested in what users do to keep their devices and data safe and how that compares to recommendations. Additionally, experts have long debated and studied the psychological underpinnings and motivations for users to do what they do, especially when such behavior is seen as risky, at least to experts. This study investigates user motivations through ...

متن کامل

Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment

Encouraging users to create stronger passwords is one of the key issues in password-based authentication. It is particularly important as prior works have highlighted that most passwords are weak. Yet, passwords are still the most commonly used authentication method. This paper seeks to mitigate the issue of weak passwords by proposing a context-based password strength meter. We conduct a rando...

متن کامل

The Relationship between Religious Beliefs and Behaviors and the Intention of Premarital Sexual Abstinence among Iranian Youths

Background and objectives : Relatively little is known about the relationship between religion and abstinence. The aim of this study was to examine the correlation between religious beliefs and behaviors and the intention of premarital sexual abstinence among Iranian youths. Methods: The current study was a cross-sectional one carried out among youths of five universities in Shiraz, Iran. 577 p...

متن کامل

A Comparative Usability Study of Two-Factor Authentication

Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires users to carry out additional actions during the authentication process. In this paper, we present an explorato...

متن کامل

Location-Based Social Network Users Through a Lense: Examining Temporal User Patterns

There has been a rapid proliferation of location-based social networks (LBSNs) during the last years. The spatial component of these systems provides a rich source of information that can be exploited by a number of novel services. However, to better design such services, it is important to understand the way people make use of these platforms and how this usage changes over time. While there e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017