DOI QR코드

DOI QR Code

그림자노동 차원에서 본 IT 사용자의 비밀번호 변경행동 연구

User Behavior on Changing the Password from the Shadow Work View

  • 투고 : 2019.05.30
  • 심사 : 2019.06.19
  • 발행 : 2019.06.30

초록

Purpose The purpose of this study is to explain the mechanism of user behaviors in password reset context based on descriptive data from conducting interviews. Specifically, this study attempted to describe the process of changing password from the shadow work perspective. Design/methodology/approach This study has interviewed 8 participants who can freely use numerous online web-sites. This study also employed the grounded theory methodology to analyze interview manuscripts. After conducting analyzing the manuscripts, this study has extracted 46 codes in the coding steps and ultimately presented 8 categories by combining similar concepts from those codes. Findings According to the results, this study provides new viewpoints to explain unique user behavior in the password reset context by capturing the shadow work based on the results. This study further offers practical implications to numerous practitioners by finding various codes, which related to users' reaction and behavior.

키워드

JBSTB0_2019_v28n2_93_f0001.png 이미지

<그림 1> Strauss and Corbin (1990)의 패러다임 모형

JBSTB0_2019_v28n2_93_f0002.png 이미지

<그림 2> 패러다임 모형

<표 1> 참여자의 일반적 특성

JBSTB0_2019_v28n2_93_t0001.png 이미지

<표 2> 코드 범주화

JBSTB0_2019_v28n2_93_t0002.png 이미지

참고문헌

  1. 강한나, 김보름, 마이크로 트렌드 심리학, 미래의 창, 2016.
  2. 박상철, 이웅규, "근거이론을 활용한 멀티채널 사용자의 크로스오버 쇼핑행동이해," Information Systems Review, 제19권, 제2호, 2017, pp. 179-199. https://doi.org/10.14329/isr.2017.19.3.179
  3. 이웅규, "<튜토리얼> 비사용의 연구 주제와 연구 방법론," 정보시스템연구, 제24권, 제3호, 2015, pp.155-169.
  4. 이웅규, "정보기술 비사용의 결정요인과 동태적 성격의 규명: 근거이론방법론에 의한 질적연구," 정보시스템연구, 제27권, 제1호, 2018, pp. 1-20.
  5. 한국인터넷진흥원, 패스워드 선택 및 이용안내서, 2010.
  6. Akhawe, D., and Felt, A.P., "Alice in Warning Land: A Large-Scale Field Study of Browser Security Warning Effectiveness," Proceedings of USENIX Security Symposium, 2013, pp.257-272.
  7. Bravo-Lillo, C., Cranor, L.F., Komanduri, S., Schechter, S., and Sleeper, M., "Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It," Proceedings of Symposium on Usable Privacy and Security, 2014, pp.105-111.
  8. Bravo-Lillo, C., Cranor, L.F., Downs, J.S., and Komanduri, S., "Bridging the Gap in Computer Security Warnings: A Mental Model Approach," IEEE Security & Privacy Magazine, Vol.9, No.2, 2011, pp.18-26.
  9. Gaw, S., and Felten, E. W., "Password Management Strategies for Online Accounts," Proceedings of Symposium on Usable Privacy and Security, 2006, pp. 44-55.
  10. Ivan, I., Shadow Work, Salem, New Hampshire and London: Marion Boyars, 1981.
  11. Komanduri, S. Shay, R., Kelley, P.G., Mazurek, M.L., Bauer, L., Christin, N., Cranor, L.F., and Egelman, S., "Of Passwords and People: Measuring the Effect of Password-Composition Policies," Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2011, pp. 2595-2604.
  12. Lambert, C., Shadow Work: The Unpaid, Unseen Jobs That Fill Your Day, Counterpoint Press, 2015.
  13. Liu, Z., Hong, Y., and Pi, D., "A Large-Scale Study of Web Password Habits of Chinese Network Users," Journal of Software, Vol. 9, No. 2, 2014, pp. 293-297.
  14. Shay, R., Komanduri, S., Kelley, P.G., Leon, P.G., Mazurek, M.L., Bauer, L., Christin, N., and Cranor, L. F., "Encountering Stronger Password Requirements: User Attitudes and Behaviors", Proceedings of Symposium on Usable Privacy and Security, 2010, pp. 1-20.
  15. Stobert, E., and Biddle, R., "The Password Life Cycle: User Behavior in Managing Passwords," Proceedings of Symposium on Usable Privacy and Security, 2014, pp. 243-255.
  16. Strauss, A. and Corbin, J., Basics of Qualitative Research: Grounded Theory Procedures and Techniques, CA: Sage Publications, Inc., 1990.
  17. Strauss, A. L. and Corbin, J. M., Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, Thousand Oaks, CA: Sage., 1998.
  18. Wash, R., Rader, E., Berman, R., and Wellmer, Z., "Understanding Password Choices: How Frequently Entered Passwords Are Re-Used Across Websites," Proceedings of Symposium on Usable Privacy and Security, 2016, pp. 175-188.