[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3283458.3283530acmotherconferencesArticle/Chapter ViewAbstractPublication PagesafrichiConference Proceedingsconference-collections
poster

Personality, culture and password behavior: a relationship study

Published: 03 December 2018 Publication History

Abstract

Culture - an aggregation of people's location, language, tribe and economic activities might have a role to play in the security decisions of users. Culture in this context is even more relevant in most African societies as there are many ethnic groups. Studies on users' password behavior have seen some advances, but little is known of the relationship between people's password behaviors, their personality and cultural backgrounds. In this paper, we report a study of the relationship between passwords and personality of the users. We also analyzed culture (via ethnic grouping) to determine its relationship with password strength. The results of the study of 230 participants indicate that although there exists a relationship between personality of users and their passwords behavior, it is quite weak and mainly negatively related except for participants high in agreeableness (cooperative) traits, hence might create stronger passwords. In addition, most participants (93%) created weak passwords, notwithstanding, participants who have defined themselves as belonging to Hausa tend to create better passwords than Nupe and Gbagyi ethnic group participants.

References

[1]
Adams, A. and Sasse, M.A., 1999. Users are not the enemy. Communications of the ACM, 42(12), pp.40--46.2
[2]
Bryant, K., and Campbell, J. 2006. User behaviours associated with password security and Management. Australasian Journal of Information Systems, 14(1).
[3]
Chiasson, S., Oorschot P. Van, and Biddle R. 2006. A Usability study and critique of Two Password Managers. 15th USENIX Security Symposium, pages 1--16, 2006.7
[4]
Florencio, D. and Herlye C. A large scale study of web password habits. In proceedings of the 16th International Conference on World Wide Web (2007), ACM pp 657 -- 666.8
[5]
Govender, S., Kritzinger, E. and Loock, M., 2016, May. The influence of national culture on information security culture. In IST-Africa Week Conference, 2016 (pp. 1--9). IEEE.14
[6]
Gollmann, D., 2006. Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), pp.544--554.6
[7]
Greene, G. and D'Arcy, J., 2010, June. Assessing the impact of security culture and the employee-organization relationship on IS security compliance. In 5th Annual Symposium on Information Assurance (ASIA'10) (p. 1).13
[8]
Gross, T., Coopamootoo, K.P. and Al-Jabri, A., 2016, June. Effect of Cognitive Effort on Password Choice. In WAY@ SOUPS.3
[9]
John, O. P., & Srivastava, S. 1999. The Big-Five trait taxonomy: History, measurement, and theoretical perspectives. In L. A. Pervin & O. P. John (Eds.), Handbook of personality: Theory and research (Vol. 2, pp. 102--138). New York: Guilford Press.16
[10]
Kawu, A. A, Muhammad, I, Awal A, and Abdullah, M. B 2018. Effect of mental state on password selection among mobile phone users. In Proceedings of the 2nd International Conference on Information and Communication Technology and its Application (ICTA), FUT Minna, Minna, Nigeria.5
[11]
Keepass. 2018. KeePass Help Center: Password Quality Estimation. Retrieved 29 August 2018 from http://keepass.info/help/kb/pw_quality_est.html.19
[12]
Kroeber, A.L. and Kluckhohn, C., 1952. Culture: A critical review of concepts and definitions. Papers. Peabody Museum of Archaeology & Ethnology, Harvard University.11
[13]
Orji, R., 2016. Persuasion and Culture: Individualism-Collectivism and Susceptibility to Influence Strategies. In PPT@ PERSUASIVE (pp. 30--39).10
[14]
Oxford Dictionaries. 2018. "Ethnicity: definition of ethnicity". Oxford University Press. Retrieved August 2, 2018 from https://en.oxforddictionaries.com/definition/ethnicity.12
[15]
Oyibo, K., Orji, R. and Vassileva, J., 2017, July. The Influence of Personality on mobile Web Credibility. In Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization (pp. 53--58). ACM.9
[16]
Passwordmeter 2018. Password Strength Checker. Retrieved from http://www.passwordmeter.com/ 20.
[17]
Rammstedt, B. & John, O. P. 2007. Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German. Journal of Research in Personality, 41, 203--212.17
[18]
Sawaya, Y., Sharif, M., Christin, N., Kubota, A., Nakarai, A. and Yamada, A., 2017. Self-confidence trumps knowledge: A cross-cultural study of security behavior. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 2202--2214).15
[19]
Stobert E. and Biddle R. 2014. The password life cycle: user behavior in managing passwords. In Proc. SOUPS, 2014. pp 243 -- 255.4
[20]
Wheeler, D.L., 2016. zxcvbn: Low-Budget Password Strength Estimation. In USENIX Security Symposium (pp. 157--173).18

Cited By

View all
  • (2024)Usable Security: Cultural Impacts on Graphical Passwords UsabilityAdvances in Information and Communication10.1007/978-3-031-53960-2_2(10-20)Online publication date: 21-Mar-2024
  • (2023)Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 WebsitesSustainability10.3390/su15141104315:14(11043)Online publication date: 14-Jul-2023
  • (2023)Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children’s Password PracticesHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-35822-7_3(29-48)Online publication date: 23-Jul-2023
  • Show More Cited By

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
AfriCHI '18: Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities
December 2018
373 pages
ISBN:9781450365581
DOI:10.1145/3283458
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 December 2018

Check for updates

Author Tags

  1. big five
  2. culture
  3. ethnicity
  4. password
  5. personality

Qualifiers

  • Poster

Conference

AfriCHI '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)3
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Usable Security: Cultural Impacts on Graphical Passwords UsabilityAdvances in Information and Communication10.1007/978-3-031-53960-2_2(10-20)Online publication date: 21-Mar-2024
  • (2023)Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 WebsitesSustainability10.3390/su15141104315:14(11043)Online publication date: 14-Jul-2023
  • (2023)Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children’s Password PracticesHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-35822-7_3(29-48)Online publication date: 23-Jul-2023
  • (2022)Your Behaviors Reveal What You NeedComputers and Security10.1016/j.cose.2022.102891122:COnline publication date: 1-Nov-2022
  • (2021)Challenges and Paradoxes in Decolonising HCI: A Critical DiscussionComputer Supported Cooperative Work (CSCW)10.1007/s10606-021-09398-031:2(159-196)Online publication date: 24-Jul-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media