Skip to main content

Convenience or Strength? Aiding Optimal Strategies in Password Generation

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity (AHFE 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 782))

Included in the following conference series:

Abstract

Passwords are a wide-spread authentication method used almost unanimously. Though the topic of passwords security may seem old, it is more relevant than ever. This study examines current user-password interactions and classifies them in terms of convenience and security. Findings show that users are aware of what constitutes a secure password but may forgo these security measures in terms of more convenient passwords, largely depending on account type. Additionally, responses show that users are very motivated to reuse or create similar passwords, making them easy to remember and including something meaningful to them. Finally, researchers provide discussion of the results along with a conclusion and recommendations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657–666. ACM (2007)

    Google Scholar 

  2. Tam, L., Glassman, M., Vandenwauver, M.: The psychology of password management: a tradeoff between security and convenience. Behav. Inf. Technol. 29(3), 233–244 (2010). https://doi.org/10.1080/01449290903121386

    Article  Google Scholar 

  3. Bonneau, J., Herley, C., Van Oorschoto, P.C., Stajano, F.: Passwords and the evolution of imperfect authentication. Commun. ACM 58(7), 78–87 (2015). https://doi.org/10.1145/2699390

    Article  Google Scholar 

  4. Korbar, B., Blythe, J., Koppel, R., Kothari, V., Smith, S.: Validating an agent-based model of human password behavior. In: The Workshops of the Thirtieth AAAI Conference on Artificial Intelligence, pp. 167–174 (2016)

    Google Scholar 

  5. Shay, R., Bauer, L., Christin, N., Cranor, L.F., Forget, A., Komanduri, S., Mazurek, M.L., Melicher, W., Segreti, S., Ur, B.: A spoonful of sugar?: The impact of guidance and feedback on password-creation behavior. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2903–2912. ACM, April 2015

    Google Scholar 

  6. Scott, C., Wynne, D., Boonthum-Denecke, C.: Examining the privacy of login credentials using web-based single sign-on – are we giving up security and privacy for convenience? In: Symposium Conducted at the IEEE Cybersecurity Symposium (CYBERSEC 2016), Coeur d’Alene, Idaho (2017). https://doi.org/10.1109/cybersec.2016.019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Stainbrook .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Stainbrook, M., Caporusso, N. (2019). Convenience or Strength? Aiding Optimal Strategies in Password Generation. In: Ahram, T., Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2018. Advances in Intelligent Systems and Computing, vol 782. Springer, Cham. https://doi.org/10.1007/978-3-319-94782-2_3

Download citation

Publish with us

Policies and ethics