Skip to main content

2018 | OriginalPaper | Buchkapitel

The Effect of Simulation in Large-Scale Data Collection—An Example of Password Policy Development

verfasst von : J. Chakraborty, N. Nguyen

Erschienen in: Breaking Down Barriers

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Computer networks across the world are increasingly vulnerable to hackers. Network administrators have countered this threat with stronger password policies. However, this has resulted in potential usability challenges for all users. Research has shown that users of these new security requirements would typically do the minimum possible to adhere to these policies. End users have become wary of the potential security risks posed by hackers. Privacy laws and the need to protect user data have further added to the difficulties that researchers must overcome in order to better understand user needs. As a result, large sets of data containing password patterns are very difficult to collect and analyse. In this article, we present a possible solution to this data collection challenge by using simulation. This offers us the ability to generate large amounts of user data that can be used to illustrate different trends of password use. Our simulations of a scenario in an academic setting consist of four types of users—undergraduate and graduate students, faculty and staff. By making conservative assumptions of user behaviours based on literature, our findings show that while users of different education and technical backgrounds face different levels of challenges in setting up passwords, nearly all users displayed similar characteristics when updating passwords. These findings from our simulation illustrate the ability to overcome data collection challenges in this field and could potentially allow us to design more inclusive password policies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Anderson CL, Agarwal R (2010) Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q 34:613–643 Anderson CL, Agarwal R (2010) Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q 34:613–643
Zurück zum Zitat Besnard D, Arief B (2004) Computer security impaired by legitimate users. Comput Secur 23:253–264CrossRef Besnard D, Arief B (2004) Computer security impaired by legitimate users. Comput Secur 23:253–264CrossRef
Zurück zum Zitat Brown AS, Bracken E, Zoccoli S, Douglas K (2004) Generating and remembering passwords. Appl Cogn Psychol 18:641–651CrossRef Brown AS, Bracken E, Zoccoli S, Douglas K (2004) Generating and remembering passwords. Appl Cogn Psychol 18:641–651CrossRef
Zurück zum Zitat Dice LR (1945) Measures of the amount of ecologic association between species. Ecology 26:297–302CrossRef Dice LR (1945) Measures of the amount of ecologic association between species. Ecology 26:297–302CrossRef
Zurück zum Zitat Duggan GB, Johnson H, Grawemeyer B (2012) Rational security: modelling everyday password use. Int J Hum Comput Stud 70:415–431CrossRef Duggan GB, Johnson H, Grawemeyer B (2012) Rational security: modelling everyday password use. Int J Hum Comput Stud 70:415–431CrossRef
Zurück zum Zitat Flechais I, Mascolo C, Sasse MA (2007) Integrating security and usability into the requirements and design process. Int J Electron Secur Digit Forensics 1:12–26CrossRef Flechais I, Mascolo C, Sasse MA (2007) Integrating security and usability into the requirements and design process. Int J Electron Secur Digit Forensics 1:12–26CrossRef
Zurück zum Zitat González RM, Martin MV, Arteaga JM, Rodríguez FÁ, Zezzatti CAOO (2009) Web service-security specification based on usability criteria and pattern approach. JCP 4:705–712CrossRef González RM, Martin MV, Arteaga JM, Rodríguez FÁ, Zezzatti CAOO (2009) Web service-security specification based on usability criteria and pattern approach. JCP 4:705–712CrossRef
Zurück zum Zitat Gulenko I (2014) Improving passwords: influence of emotions on security behaviour information. Manag Comput Secur 22:167–178CrossRef Gulenko I (2014) Improving passwords: influence of emotions on security behaviour information. Manag Comput Secur 22:167–178CrossRef
Zurück zum Zitat Keates S, Clarkson PJ, Harrison L-A, Robinson P (2000) Towards a practical inclusive design approach. In: Proceedings on the 2000 conference on universal usability, ACM, pp 45–52 Keates S, Clarkson PJ, Harrison L-A, Robinson P (2000) Towards a practical inclusive design approach. In: Proceedings on the 2000 conference on universal usability, ACM, pp 45–52
Zurück zum Zitat Keith M, Shao B, Steinbart PJ (2007) The usability of passphrases for authentication: an empirical field study. Int J Hum Comput Stud 65:17–28CrossRef Keith M, Shao B, Steinbart PJ (2007) The usability of passphrases for authentication: an empirical field study. Int J Hum Comput Stud 65:17–28CrossRef
Zurück zum Zitat Mohamed MA, Chakraborty J, Dehlinger J (2017) Trading off usability and security in user interface design through mental models. Behav Inf Technol 36:493–516CrossRef Mohamed MA, Chakraborty J, Dehlinger J (2017) Trading off usability and security in user interface design through mental models. Behav Inf Technol 36:493–516CrossRef
Zurück zum Zitat Persad U, Langdon P, Clarkson J (2007) Characterising user capabilities to support inclusive design evaluation. Univ Access Inf Soc 6:119–135CrossRef Persad U, Langdon P, Clarkson J (2007) Characterising user capabilities to support inclusive design evaluation. Univ Access Inf Soc 6:119–135CrossRef
Zurück zum Zitat Richards KE (2017) Risk analysis of the discoverability of personal data used for primary and secondary authentication. University of Maryland Baltimore County, MD, US Richards KE (2017) Risk analysis of the discoverability of personal data used for primary and secondary authentication. University of Maryland Baltimore County, MD, US
Zurück zum Zitat Schultz EE, Proctor RW, Lien M-C, Salvendy G (2001) Usability and security an appraisal of usability issues in information security methods. Comput Secur 20:620–634CrossRef Schultz EE, Proctor RW, Lien M-C, Salvendy G (2001) Usability and security an appraisal of usability issues in information security methods. Comput Secur 20:620–634CrossRef
Metadaten
Titel
The Effect of Simulation in Large-Scale Data Collection—An Example of Password Policy Development
verfasst von
J. Chakraborty
N. Nguyen
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-75028-6_23

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.