skip to main content
10.1145/634067.634152acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Persuasive password security

Published:31 March 2001Publication History

ABSTRACT

Users of password-protected systems have to be persuaded to follow certain regulations to keep systems secure. This paper describes the results of a first study of the mental models, metaphors, attitudes and skills users hold with respect to password mechanisms. It shows that users are currently not motivated to adopt proper password practices. They do not believe that they ultimately can stop somebody from getting into the system, or that somebody getting in could cause them any serious personal harm. We recommend a novel approach to the design of training and online support, which is based on an appropriate use of fear appeals.

References

  1. Schneier, B. Secrets and Lies. John Wiley & Sons (2000)..]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Adams, A. and Sasse, M. A. Users are not the enemy. Communications of the ACM, Vol. 42, No. 12 (December, 1999).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Whitten, A. and Tygar, J. D. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. 8th USENIX security composium (Washington, August 1999).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Potter, J. and Wetherell, M. Discourse and social psychology. Sage Publications Ltd (London, 1987).]]Google ScholarGoogle Scholar
  5. Rimmer, J., Wakeman, I., Sheeran, L.,Sasse, M. A. Examining users' repertoire of Internet applications. In Sasse, M. A. and Johnson, C. (Eds.): Human-Computer Interaction - INTERACT '99(1999).]]Google ScholarGoogle Scholar
  6. Rogers, R. W. Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In Cacioppo, J. and Petty, R. (Eds.): Social Psychophysiology. Guilford Press (NY, 1983).]]Google ScholarGoogle Scholar

Index Terms

  1. Persuasive password security

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CHI EA '01: CHI '01 Extended Abstracts on Human Factors in Computing Systems
              March 2001
              544 pages
              ISBN:1581133405
              DOI:10.1145/634067

              Copyright © 2001 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 31 March 2001

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate4,785of17,176submissions,28%

              Upcoming Conference

              CHI '24
              CHI Conference on Human Factors in Computing Systems
              May 11 - 16, 2024
              Honolulu , HI , USA

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader