The Decoy Effect for Passwords – A First Exploration

نویسنده

  • Tobias Seitz
چکیده

This paper reports on an online survey eliciting effects of a decoy choice architecture for passwords. The survey measured preference for a given set of passwords and was conducted as a pre-study to a more interactive online-study to give us a feeling about the constraints of decoy passwords. The survey revealed that in some scenarios it is possible to influence the preference for a target password by introducing an unfavorable decoy password. However, the preference for our target password was generally high, which leads us to believe that the choice architecture needs to be evolved further.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Influencing Self-Selected Passwords Through Suggestions and the Decoy Effect

We present results from an online experiment with the goal of nudging users towards stronger passwords. We explored the effect of suggesting different variations and constellations of passwords during password selection. In particular, we investigated whether the decoy effect can be applied here: When people face a choice between two options, adding a third, unfavorable option can influence the...

متن کامل

Anti-cancer effects of the combined treatment of trastuzumab and decoy oligodeoxynucleotides to target STAT3 transcription factor on SK-BR-3 breast cancer cell line

Introduction: Breast cancer is the most common malignancy in the female population and is the leading cause of death. Surgery, chemotherapy, radiotherapy, and monoclonal antibody (trastuzumab) therapy are common and standard treatments for this cancer. However, there are significant limitations in the treatment of this disease by using regular methods. Given the role of transcription factors (T...

متن کامل

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

Active Authentication using File System Decoys and User Behavior Modeling: Results of a Large Scale Study

We propose methods to enhance existing user authentication paradigms (such as passwords) with continuous active authentication. Our system adds additional levels of security without burdening the user with more credentials to manage. We utilize two complementary authentication modalities to validate user-identity: 1) behavior profiling for user-system interaction, and 2) baiting adversaries usi...

متن کامل

Urine Cytology: Useful Screening Method for Polyoma Virus Nephropathy in Renal Transplant Patients

Polyoma virus nephropathy occurs in 3% to 4% of renal transplant recipients, causing graft loss in 50% of cases. The objective of the present study was to explore the effects of age, sex, post-transplantation period and plasma creatinine levels on the polyoma virus infection in kidney transplanted patients. Urine samples were collected from 362 patients, centrifuged and microscopic slides prepa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016