skip to main content
10.1145/2702123.2702586acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open Access

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior

Published:18 April 2015Publication History

ABSTRACT

Users often struggle to create passwords under strict requirements. To make this process easier, some providers present real-time feedback during password creation, indicating which requirements are not yet met. Other providers guide users through a multi-step password-creation process. Our 6,435-participant online study examines how feedback and guidance affect password security and usability. We find that real-time password-creation feedback can help users create strong passwords with fewer errors. We also find that although guiding participants through a three-step password-creation process can make creation easier, it may result in weaker passwords. Our results suggest that service providers should present password requirements with feedback to increase usability. However, the presentation of feedback and guidance must be carefully considered, since identical requirements can have different security and usability effects depending on presentation.

References

  1. Brantz, T., and Franz, A. The Google Web 1T 5-gram corpus. Tech. Rep. LDC2006T13, Linguistic Data Consortium, 2006.Google ScholarGoogle Scholar
  2. Chiasson, S., Forget, A., Stobert, E., Biddle, R., and P.C. van Oorschot. Multiple password interference in text and click-based graphical passwords. In CCS (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Egelman, S., Sotirakopoulos, A., Muslukhov, I., Beznosov, K., and Herley, C. Does my password go up to eleven?: The impact of password meters on password selection. In CHI (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Fahl, S., Harbach, M., Acar, Y., and Smith, M. On the ecological validity of a password study. In SOUPS (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Forget, A., Chiasson, S., van Oorschot, P. C., and Biddle, R. Improving text passwords through persuasion. In SOUPS (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Furnell, S. An assessment of website password practices. Computers & Security 26, 7 (2007), 445--451. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Furnell, S. Assessing password guidance and enforcement on leading websites. Computer Fraud & Security 2011, 12 (2011), 10--18.Google ScholarGoogle ScholarCross RefCross Ref
  8. Furnell, S., and Bär, N. Essential lessons still not learned? Examining the password practices of end-users and service providers. In Human Aspects of Information Security, Privacy, and Trust (2013), 217--225.Google ScholarGoogle ScholarCross RefCross Ref
  9. Kelley, P. G., Komanduri, S., Mazurek, M. L., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., and Lopez, J. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In IEEE SP (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kerby, D. S. The simple difference formula: An approach to teaching nonparametric correlation. In Innovative Teaching. 2014.Google ScholarGoogle Scholar
  11. Mazurek, M. L., Komanduri, S., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., Kelley, P. G., Shay, R., and Ur, B. Measuring password guessability for an entire university. In CCS (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Moshfeghian, S., and Ryu, Y. S. A passport to password best practices. Ergonomics in Design: The Quarterly of Human Factors Applications 20, 2 (2012), 23--29.Google ScholarGoogle ScholarCross RefCross Ref
  13. Schneier, B. Myspace passwords aren't so dumb. http://www.wired.com/politics/security/ commentary/securitymatters/2006/12/72300, 2006.Google ScholarGoogle Scholar
  14. Shay, R., Ion, I., Reeder, R. W., and Consolvo, S. "My religious aunt asked why I was trying to sell her viagra": Experiences with account hijacking. In CHI (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Shay, R., Komanduri, S., Durity, A. L., Huh, P. S., Mazurek, M. L., Segreti, S. M., Ur, B., Bauer, L., Christin, N., and Cranor, L. F. Can long passwords be secure and usable? In CHI (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Shay, R., Komanduri, S., Kelley, P. G., Leon, P. G., Mazurek, M. L., Bauer, L., Christin, N., and Cranor, L. F. Encountering stronger password requirements: user attitudes and behaviors. In SOUPS (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Ur, B., Kelley, P. G., Komanduri, S., Lee, J., Maass, M., Mazurek, M., Passaro, T., Shay, R., Vidas, T., Bauer, L., Christin, N., and Cranor, L. F. How does your password measure up? The effect of strength meters on password creation. In USENIX Security (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Vance, A. If your password is 123456, just make it HackMe. The New York Times, http://www.nytimes. com/2010/01/21/technology/21password.html, January 2010.Google ScholarGoogle Scholar
  19. Weir, M., Aggarwal, S., Collins, M., and Stern, H. Testing metrics for password creation policies by attacking large sets of revealed passwords. In CCS (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Weir, M., Aggarwal, S., de Medeiros, B., and Glodek, B. Password cracking using probabilistic context-free grammars. In IEEE SP (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
        April 2015
        4290 pages
        ISBN:9781450331456
        DOI:10.1145/2702123

        Copyright © 2015 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 April 2015

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CHI '15 Paper Acceptance Rate486of2,120submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

        Upcoming Conference

        CHI '24
        CHI Conference on Human Factors in Computing Systems
        May 11 - 16, 2024
        Honolulu , HI , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader