Browse > Article
http://dx.doi.org/10.5391/JKIIS.2015.25.3.229

Comparisons of Pattern Analysis in using the Four-digit Personal Identification Numbers according to Sensitivity -A University Case  

Moon, Soog-Kyung (Dept. of Marketing & Information Consulting, Mokwon University)
Publication Information
Journal of the Korean Institute of Intelligent Systems / v.25, no.3, 2015 , pp. 229-235 More about this Journal
Abstract
This study is investigated the effect of sensitivity upon pattern of the four-digit personal identification numbers(PINs) of A-university students. Under survey 2, PINs were collected after each student had information about his PINs were used in disclose his test scores, But Under survey 1, each student didn't have. Survey 2 is viewed more sensitive situation than survey 1 to students. The rate of occurrences of most common PINs which were created by the reason of easiness to remember or to use without caution, in survey 2 is five times less than survey 1 and using rate of girl students are considerably less than that of boys. By comparing frequencies of digits used at each position, it is found that significant differences exist between two surveys in the first, second and forth position except third. PINs are represented by the polygonal graph with that X-axis shows position and Y-axis shows digits from 0 to 9 used at each position. There are many different figures between two surveys. This study shows that students are more anxious about using the PINs in survey 2 which is viewed more sensitive than survey 1.
Keywords
Survey 1; Survey 2; Digits of each position; Frequency; Disclosing the test scores;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Gaw S., Felten E.W., "Password management strategies for online accounts", Proc Scoups, pp 44-55, 2006.
2 Bonneau, Preibusch, "The password thicket: Technical and Markey failures in human authentication on the web", Proceedings of WEIS, Boston, MA, USA. 2010.
3 Y. N. Shin, Y. J. Lee, M. G. Chun, "Biometric Template Security for Personal Information Protection", Journal of Korean Intelligence and Information Systems, Vol.18, No. 4, pp 437-444, 2008.   DOI
4 Y. N. Shin, M. J. Kwon, Y. J. Lee, J. I. Park, M. G. Chun, "Biometric and Identity Reference Protection", Journal of Korean Intelligence and Information Systems, Vol. 19, No. 2, pp. 160-167, 2009.   DOI
5 M. K. You, M. J. Kwon, S. H. Lee, M. G. Chun, "Secure Binding of Identity Reference and Biometric Reference", Journal of Korean Intelligence and Information Systems, Vol. 20, No. 5, pp. 610-616, 2010.   DOI
6 Y. N. Shin, M. G. Chun, "Personal Information Protection for Biometric Verification Based", Journal of Korean Intelligence and Information Systems, Vol. 20, No. 5, pp. 659-664, 2010.   DOI   ScienceOn
7 J. M. Seung, B. N. Noh, S. H. Ahn, "A damage trend and responses to cope with the latest principal hacking", Korea Institute of Information Security & Cryptology, Vol 16, No. 1, pp. 80-83, 2006.
8 Harreld, H., "Security: an uneasy alliance", Infoworld 23, pp. 42-44, 2001.
9 Shay R., Komanduri S., Kelley P.G., Bauer L, Leon P.G., Christin N., Mazur M.L., Cranor L.F.,"Encountering Stronger Password Requirements: User Attitudes and Behaviors", Symposium on Usable Privacy and Security(SOUPS), July 14-16 Remond, WA, USA. 2010.
10 Beate G., Hilary J., "Using and Managing Multiple Passwords : A Week to a View", Interacting with Computers, 23, pp. 256-267, 2011.   DOI
11 Zviran, M., Haga, W.J., "Password security: an empirical study", Journal of Management Information Systems Vol 15, No. 4, pp. 161-185, 1999.   DOI
12 Brown, A.S., Brackener, Pro,E., Zoccoli S., and Douglas, K., "Generating and Remembering Passwords", Applied Cognitive Psychology, Vol. 18, pp. 641-651, 2004.   DOI
13 Dhamija. R., Perrig, A., "A user study: Using images for authentication", Proceedings of the 9th USENIX Security Symposium, August, 2000.
14 S. K. Moon, "An Empirical study on the analysis of the re-using of four-digit personal identification numbers -A university case", Journal of Digital Policy & Management, Vol 11, No. 10, pp. 737-746, 2013.
15 S. K. Moon, "A study on the using pattern analysis of four-digit personal identification numbers -A university case", Journal of Digital Policy & Management, Vol 10, No. 10, pp. 529-538, 2012.
16 E. J. Kim, "Comparision study of the culture of digits habit between korean and Chinese", Journal of Jejoo-Hanra University, Vol 34, 2010.
17 D. Amitay, "Most Common iPhone Passcodes", Available : http://amitay.us/blog/files/most_common_iphone_passcodes.php, 2011, [Accessed : March 15, 2015]