Prospects for Improving Password Selection

01/04/2022
by   Eryn Ma, et al.
0

User-chosen passwords remain essential to online security, and yet people continue to choose weak, insecure passwords. In this work, we investigate whether prospect theory, a behavioral model of how people evaluate risk, can provide insights into how users choose passwords and whether it can motivate new designs for password selection mechanisms that will nudge users to select stronger passwords. We ran a user study with 762 participants, and we found that an intervention guided by prospect theory – which leverages the reference-dependence effect by framing selecting weak passwords as a loss relative to choosing a stronger password – causes approximately 25 to improve the strength of their password (significantly more than alternative interventions) and reduced the final number of weak passwords by approximately 25 models of hacking and password attacks. These results provide guidance for designing and implementing account registration mechanisms that will significantly improve the strength of user-selected passwords, thereby leveraging insights from prospect theory to improve the security of systems that use password-based authentication.

READ FULL TEXT

page 3

page 5

page 6

page 7

page 8

research
08/15/2021

How we browse: Measurement and analysis of digital behavior

Accurately analyzing and modeling online browsing behavior play a key ro...
research
08/24/2018

"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response

Digital security technology is able to identify and prevent many threats...
research
01/05/2021

Theory-based Habit Modeling for Enhancing Behavior Prediction

Psychological theories of habit posit that when a strong habit is formed...
research
01/14/2020

Shades of Perception- User Factors in Identifying Password Strength

The purpose of this study was to measure whether participant education, ...
research
09/09/2023

The Effectiveness of Security Interventions on GitHub

In 2017, GitHub was the first online open source platform to show securi...
research
09/09/2020

Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale

In this paper we provide evidence of an emerging criminal infrastructure...
research
10/19/2020

(How) Do people change their passwords after a breach?

To protect against misuse of passwords compromised in a breach, consumer...

Please sign up or login with your details

Forgot password? Click here to reset