PASSWORD USE Rational Security : Modelling Everyday Password Use
نویسندگان
چکیده
To inform the design of security policy, task models of password behaviour were constructed for different user groups – Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password security positively correlated with the sensitivity of the task, differences in frequency of password use were related to password security and patterns of password reuse were related to knowledge of security. Modelling revealed Computer Scientists viewed information security as part of their tasks and passwords provided a way of completing their work. By contrast, Admin and Student groups viewed passwords as a cost incurred when accessing the primary task. Differences between the models were related to differences in password security and used to suggest six recommendations for security officers to consider when setting password policy.
منابع مشابه
Running head : MODELLING PASSWORD USE Rational Security : Modelling Everyday Password Use
To inform the design of security policy, task models of password behaviour were constructed for different user groups – Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password securi...
متن کاملSystematic Decision Making in Security Management Modelling Password Usage and Support
Systematic Decision Making in Security Management Modelling Password Usage and Support Simon Arnell, Adam Beautement, Philip Inglesant, Brian Monahan, David Pym, Angela Sasse
متن کاملSocial Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets
As security technologies become more embedded into people’s everyday lives, it becomes more challenging for researchers to understand the contexts in which those technologies are situated. The need to develop research methods that provide a lens on personal experiences has driven much recent work in human-computer interaction, but has so far received little focus in usable security. In this pap...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملOne - time - password - authenticated key exchange ( full version ) Kenneth
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time password...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012