TY - JOUR
T1 - Rational security: modelling everyday password use
AU - Duggan, Geoffrey B
AU - Johnson, Hilary
AU - Grawemeyer, Beate
PY - 2012/6
Y1 - 2012/6
N2 - To inform the design of security policy, task models of password behaviour were constructed for different user groups—Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password security positively correlated with the sensitivity of the task, differences in frequency of password use were related to password security and patterns of password reuse were related to knowledge of security. Modelling revealed Computer Scientists viewed information security as part of their tasks and passwords provided a way of completing their work. By contrast, Admin and Student groups viewed passwords as a cost incurred when accessing the primary task. Differences between the models were related to differences in password security and used to suggest six recommendations for security officers to consider when setting password policy.
AB - To inform the design of security policy, task models of password behaviour were constructed for different user groups—Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password security positively correlated with the sensitivity of the task, differences in frequency of password use were related to password security and patterns of password reuse were related to knowledge of security. Modelling revealed Computer Scientists viewed information security as part of their tasks and passwords provided a way of completing their work. By contrast, Admin and Student groups viewed passwords as a cost incurred when accessing the primary task. Differences between the models were related to differences in password security and used to suggest six recommendations for security officers to consider when setting password policy.
UR - http://www.scopus.com/inward/record.url?scp=84858182438&partnerID=8YFLogxK
UR - http://dx.doi.org/10.1016/j.ijhcs.2012.02.008
U2 - 10.1016/j.ijhcs.2012.02.008
DO - 10.1016/j.ijhcs.2012.02.008
M3 - Article
SN - 1071-5819
VL - 70
SP - 415
EP - 431
JO - International Journal of Human-Computer Studies
JF - International Journal of Human-Computer Studies
IS - 6
ER -