Rational security: modelling everyday password use

Geoffrey B Duggan, Hilary Johnson, Beate Grawemeyer

Research output: Contribution to journalArticle

31 Citations (Scopus)
200 Downloads (Pure)

Abstract

To inform the design of security policy, task models of password behaviour were constructed for different user groups—Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password security positively correlated with the sensitivity of the task, differences in frequency of password use were related to password security and patterns of password reuse were related to knowledge of security. Modelling revealed Computer Scientists viewed information security as part of their tasks and passwords provided a way of completing their work. By contrast, Admin and Student groups viewed passwords as a cost incurred when accessing the primary task. Differences between the models were related to differences in password security and used to suggest six recommendations for security officers to consider when setting password policy.
Original languageEnglish
Pages (from-to)415-431
Number of pages18
JournalInternational Journal of Human-Computer Studies
Volume70
Issue number6
Early online date3 Mar 2012
DOIs
Publication statusPublished - Jun 2012

Fingerprint Dive into the research topics of 'Rational security: modelling everyday password use'. Together they form a unique fingerprint.

  • Cite this