Improving passwords: influence of emotions on security behaviour
نویسنده
چکیده
Purpose – This paper aims to study the influence of emotions on security behaviour by reviewing Information Systems Security (ISS) topics in Information Systems (IS) literature. Researchers in ISS study how tomotivate people to adhere to security policies; theymainly focus on cognitive models such as the technology acceptance model (Davis, 1985), innovation diffusion theory (Brancheau and Wetherbe, 1990), theory of planned behaviour (Mathieson, 1991) and social cognitive theory (Compeau andHiggins, 1995). Applying positive emotions such as joy and interest is feasible by adding emoticons and positive messages; we use this approach to improve password choosing. Design/methodology/approach – We apply differential emotional theory (Izard 2002) from psychology to the context of ISS. Twenty-two participants took part in an experiment with the task of choosing strong but memorable passphrases. The dependent variable is the strength of the chosen passphrase. The task for the user is to come up with a passphrase that is both strong and memorable. We choose a between-subject design. The independent variable is the emotional interface that the user is confronted with. Findings – We found that 5.35 words was the mean when participants were shown positive smiley faces and messages. When exposed to negative emoticons, the mean was only 4.35 words. Through ANOVA, we find the differences to be statistically significant (F1; 20 3.16; p 0.1). We derive from the experiment that positive emotions should be used in ISS when making users start a habit (e.g. developing a new, individual password strategy), and we conclude from our literature review that negative emotions should be used when reinforcing a habit (e.g. taking care of shoulder surfing). Originality/value – We contribute to practice by developing a user script that can be installed in all established Internet browsers. The script supports the user to choose a good passphrase strategy when registering for a new service. We find that trainings should not rely on facts only but must make use of emotions, which are crucial for human motivation.
منابع مشابه
An assessment of the human factors affecting the password performance of South African online consumers
User identification and authentication is regarded as the basis of computer security. In spite of many new technologies to assist with authentication, passwords remain central to access control systems in most computer systems. The password practices that online consumers apply have a direct effect on the level of security and are often the target of an array of attacks. Research suggests that ...
متن کاملHow Do Experts Manage Their Passwords?
Passwords pose a variety of problems for users: random passwords are difficult to create and hard to remember, and keeping track of passwords can be difficult for users who have many accounts. These problems can lead users to adopt sometimes insecure coping strategies [1] such as reusing passwords [2]. Little work exists on the security habits of experts, who must be affected by the same proble...
متن کاملExpert Password Management
Experts are often asked for advice about password management, but how do they manage their own passwords? We conducted interviews with researchers and practitioners in computer security, asking them about their password management behaviour. We conducted a thematic analysis of our data, and found that experts described a dichotomy of behaviour where they employed more secure behaviour on import...
متن کاملThe Effect of Educating Users on Passwords: a Preliminary Study
Passwords are a basic authentication method for most information systems. Despite their widespread use, passwords still suffer from a number of problems. Users and their passwords are the Achille’s heel (the weakest link) of security, because they still tend to create passwords that are weak, easy to remember and contain words that a familiar to them. They also tend to trade security for memora...
متن کاملImproving computer security for authentication of users: influence of proactive password restrictions.
Entering a username-password combination is a widely used procedure for identification and authentication in computer systems. However, it is a notoriously weak method, in that the passwords adopted by many users are easy to crack. In an attempt to improve security, proactive password checking may be used, in which passwords must meet several criteria to be more resistant to cracking. In two ex...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Manag. Comput. Security
دوره 22 شماره
صفحات -
تاریخ انتشار 2014