ABSTRACT
While past work has examined password usage on a specific computer, web site, or organization, there is little work examining overall password usage in daily life. Through a diary study, we examine all usage of passwords, and offer some new findings based on quantitative analyses regarding how often people log in, where they log in, and how frequently people use foreign computers. Our analysis also confirms or updates existing statistics about password usage patterns. We also discuss some implications for design as well as security education.
- A. Adams, M. A. Sasse. Users are not the enemy. Comm. of the ACM (1999. Google ScholarDigital Library
- K.R. Walsh, B. Ives, H. Schneider. The Domino Effect of Password Reuse. Comm. of the ACM (2004. Google ScholarDigital Library
- S. Gaw, E. W. Felten. Password management strategies for online accounts. In Proc. of SOUPS (2006. Google ScholarDigital Library
- D. Florencio, C. Herley. A large-scale study of web password habits. In Proc. of WWW (2007. Google ScholarDigital Library
- P. Inglesant and M. A. Sasse. The true cost of unusable password policies: password use in the wild. CHI (2010. Google ScholarDigital Library
- R. Shay, S. Komanduri, P. G. Kelley, P.G. Leon, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor Encountering stronger password requirements: user attitudes and behaviors. In Porc. of SOUPS (2010). Google ScholarDigital Library
- S. Singh, A. Cabraal, C. Demosthenous G. Astbrink M. Furlong. Password sharing: implications for security design based on social practice. In Proc. of CHI (2007. Google ScholarDigital Library
- E. F. Gehringer. Choosing passwords: security and human factors. In Proc. of ISTAS (2002.Google ScholarCross Ref
- J. Yan, A. Blackwell, R. Anderson, A. Grant. Password memorability and security: Empirical results. IEEE Security & Privacy (2004) vol. 2 (5) pp. 25--3. Google ScholarDigital Library
- P. Dourish, E. Grinter, J. D. Flor, M. Joseph. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing (2004) vol. 8 (6). Google ScholarCross Ref
- 1C. Kuo, S. Romanosky, L. Cranor. Human selection of mnemonic phrase-based passwords. SOUPS (2006). Google ScholarDigital Library
- D. Florencio, C. Herley, B. Coskun. Do strong web passwords accomplish anything? In Proc. USENIX Hot Topics in Security (2007). Google ScholarDigital Library
- Google, http://google.com/adplanner/static/top1000.Google Scholar
Index Terms
- A diary study of password usage in daily life
Comments