1,559
views
0
recommends
+1 Recommend
1 collections
    12
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Perceptions of the risks of password related activities

      Published
      proceedings-article
      ,
      Electronic Visualisation and the Arts (EVA 2017) (EVA)
      Electronic Visualisation and the Arts
      11 – 13 July 2017
      Passwords, password management activities, risk perception
      Bookmark

            Abstract

            Many studies have investigated people’s risky password related activities such as writing down passwords, sharing them with other people and re-using them across accounts, but few studies have investigated people’s perceptions of the risks of these activities. This paper reports on an online survey with 129 people rating the risks of 11 different password related activities in four domains (social networking, email, eBanking and eCommerce). There were fewer differences between the perceived riskiness of activities due to domain than expected, but differences between the activities and the numbers of respondents who said they would engage in the different activities. There were interesting patterns of differences in the ratings of the riskiness, severity of the consequences, usefulness and likelihood of encountering the different activities, which may help explain why people undertake risky password activities.

            Content

            Author and article information

            Contributors
            Conference
            July 2017
            July 2017
            : 1-10
            Affiliations
            [0001]Human Computer Interaction Research Group

            Department of Computer Science

            University of York

            York YO10 5GH UK
            Article
            10.14236/ewic/HCI2017.54
            186768b7-005e-4c69-af2c-5d35235e7846
            © Merdenyan et al. Published by BCS Learning and Development. Proceedings of British HCI 2017 – Digital Make-Believe, Sunderland, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Electronic Visualisation and the Arts (EVA 2017)
            EVA
            London, UK
            11 – 13 July 2017
            Electronic Workshops in Computing (eWiC)
            Electronic Visualisation and the Arts
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2017.54
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            password management activities,Passwords,risk perception

            References

            1. 1999 Users are not the enemy Communications of the ACM 42 12 40 46

            2. 1997 Making passwords secure and usable People and Computers XII 1 19 Springer London

            3. 2015 Passwords and the evolution of imperfect authentication Communications of the ACM 58 7 78 87

            4. 2013 July Writing down your password: Does it help Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference 267 274 IEEE

            5. 2014 The psychology of risk Cambridge University Press

            6. 2004 Generating and remembering passwords Applied Cognitive Psychology 18 6 641 651

            7. 2006 User behaviours associated with password security and management Australasian Journal of Information Systems 14 1

            8. 2013 July Relationships between password choices, perceptions of risk and security expertise International Conference on Human Aspects of Information Security, Privacy, and Trust 80 89 Springer Berlin Heidelberg

            9. 2013 April Does my password go up to eleven?: the impact of password meters on password selection Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2379 2388 ACM

            10. 1978 How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits Policy sciences 9 2 127 152

            11. 2007 May A large-scale study of web password habits Proceedings of the 16th international conference on World Wide Web 657 666 ACM

            12. 2006 July Password management strategies for online accounts Proceedings of the second symposium on Usable privacy and security 44 55 ACM

            13. 2011 Using and managing multiple passwords: A week to a view Interacting with Computers 23 3 256 267

            14. 2010 April The true cost of unusable password policies: password use in the wild Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 383 392 ACM

            15. 2011 May Self-reported password sharing strategies Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2619 2622 ACM

            16. 2011 May Of passwords and people: measuring the effect of password-composition policies Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2595 2604 ACM

            17. 2011 Password in practice: An usability survey Journal of Global Research in Computer Science 2 5 107 112

            18. 1975 The illusion of control Journal of Personality and Social Psychology 32 2 311

            19. 2013 November Measuring password guessability for an entire university Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security 173 186 ACM

            20. 2015 When sharing is a bad idea: the effects of online social network engagement and sharing passwords with friends on cyberbullying involvement Cyberpsychology, Behavior, and Social Networking 18 8 437 442

            21. 1979 Password security: A case history Communications of the ACM 22 11 594 597

            22. 2016 October Cultural and Gender Differences in Password Behaviors: Evidence from China, Turkey and the UK Proceedings of the 9th Nordic Conference on Human-Computer Interaction 9 ACM

            23. 2002 Improving computer security for authentication of users: Influence of proactive password restrictions Behavior Research Methods, Instruments, & Computers 34 2 163 169

            24. 2001 Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security BT Technology Journal, 19 3 122 131

            25. 2010 July Encountering stronger password requirements: user attitudes and behaviors Proceedings of the Sixth Symposium on Usable Privacy and Security 2 ACM

            26. 2007 April Password sharing: implications for security design based on social practice Proceedings of the SIGCHI conference on Human factors in computing systems 895 904 ACM

            27. 2004 Explaining risk perception An evaluation of the psychometric paradigm in risk perception research 33

            28. 1986 Informing and educating the public about risk Risk analysis 6 4 403 415

            29. 2016 The perception of risk Routledge

            30. 1965 Radiation and Other Risks Health Physics 11 9 879 887

            31. 1969 Social benefit versus technological risk. Readings in Risk 183 194

            32. 2014 July The password life cycle: user behaviour in managing passwords Proc. SOUPS

            33. 2016 May Do Users' Perceptions of Password Security Match Reality Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems 3748 3760 ACM

            34. 2012 August How does your password measure up? The effect of strength meters on password creation USENIX Security Symposium 65 80

            35. 2011 September An empirical study on the web password strength in greece Informatics (PCI), 2011 15th Panhellenic Conference on 212 216 IEEE

            36. 2007 Improving password security and memorability to protect personal and organizational information International Journal of HumanComputer Studies 65 8 744 757

            37. 2015 Individual differences in cyber security behaviors: an examination of who is sharing passwords Cyberpsychology, Behavior, and Social Networking 18 1 3 7

            38. 2004 Password memorability and security: Empirical results IEEE Security &Pprivacy 2 5 25 31

            39. 1999 Password security: an empirical study Journal of Management Information Systems 15 4 161 185

            Comments

            Comment on this article