Browse > Article
http://dx.doi.org/10.30693/SMJ.2020.9.4.52

A Study on Domestic Password Reuse Reasoning by Analysing Four-digit Passcodes in the Second Survey  

Moon, Suk Kyung (목원대학교 마케팅빅데이터학과)
Publication Information
Smart Media Journal / v.9, no.4, 2020 , pp. 52-59 More about this Journal
Abstract
This second survey, which collected 2392 disclosing grades data for 2012~ 2017, nearly twice the first survey, was conducted to supplement the result of the first survey on the reuse of 4-digit passcodes(PCs) data. In addition of second survey, we found that the more number of used PCs, the higher reuse rate, up to 4 numbers of PCs were used for reusing and there may be personal differences even on the single site. The results of this paper that were not available in the first survey were close to the those of foreign research on the reuse of passwords using a mixture of numbers, letters and special characters. This second survey provided an inference that an opportunity to indirectly approach the domestic situation of re-using password, where data collection is impossible and that domestic regulation such as periodic change of password may increase the re-using password.
Keywords
Data for disclosing grades; Reusing rate; Exact match PCs; Passcodes;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 D. Florencio, & C. Herley. "A large scale study of web password habits," In Proceedings of the 16th International Conference on World Wide Web, pp. 657-666, 2007.
2 S. K. Moon. "An Empirical study on the analysis of the re-using of four-digit personal identification numbers -A university case," Journal of Digital Policy & Management, vol. 11, no. 10, pp. 737-746, 2013.
3 R. Shay, S. Komanduri, P. G. Kelley, L. Bauer, P. G. Leon, N. Christin, M. L. Mazur & L. F. Cranor, "Encountering stronger password requirements: User attitudes and behaviors," Symposium on Usable Privacy and Security (SOUPS), July, pp. 14-16, 2010.
4 A. S. Brown, E. Bracken, S. Zoccoli & K. Douglas, "Generating and remembering passwords," Applied Cognitive Psychology, 18, pp. 641-651, 2004.   DOI
5 G. Beate & J. Hilary, "Using and managing multiple passwords : A Week to a View," Interacting with Computers, 23, pp. 256-267, 2011.   DOI
6 Bersch, C. Outdated, "insecure passwords are losing money for Internet businesses," Communications News, 37, pp. 10-11, 2000.
7 R. Dhamija & A. Perrig, "Deja vu: a user study. Using images for authentication," Proceedings of the 9th USENIX Security Symposium, Denver, Colorado. 2000.
8 S. Komanduri, et al., "Of passwords and people: Measuring the effect of password composition policies," In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2595-2604, 2011.
9 A. Adams & M. A. Sasse, "Users are not the enemy," Communications of the ACM, vol. 42, no. 12, pp. 40-46, 1999.   DOI
10 Most common iPhone passcodes(2011), http://amitay.us/blog/files/most_common_iphone_passcodes.php (accessed Apr., 24, 2013).
11 S. K. Moon, "A case study on comparative analysis of four-digit passwords usage type before and after using smart phone," Journal of Convergence for Information Technology, vol. 8, no. 7, pp. 615-622, 2018.   DOI
12 L.T. Ha and D.J. Choi, "Biometrics-based Key Generation Research: Accomplishments and Challenges," Smart Media Journal, vol. 6, no. 2, pp. 15-25, 2017.
13 H.T. Tran, I.S. Na, Y.C. Kim and S.H. Kim, "Human Face Tracking and Modeling using Active Appearance Model with Motion Estimation," Smart Media Journal, vol. 6, no. 3, pp. 49-56, 2017.
14 D.N. Tai, S.H. Kim, G.S. Lee, H.J. Yang, I.S. Na and A.R. Oh, "Tracking by Detection of Multiple Faces using SSD and CNN Features," Smart Media Journal, vol. 7, no. 4, pp. 61-69, 2018.   DOI
15 B. Bostjan, T. Viktor, "Moore's curse on textual passwords," 38th International Convention on Information and Communication Technology, Electronics and Microelectronics(MIPRO), pp. 25-29, 2015.
16 P. G. Inglesant & M. A. Sasse. "The true cost of unusable password policies: Password use in the wild," In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 383-392, 2010.