Skip to main content

The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords

  • Conference paper
  • First Online:
Human Aspects of Information Security and Assurance (HAISA 2021)

Abstract

Passwords remains the standard mechanism by which organisations protect their data from unauthorised entities accessing, changing or misusing their information. Organisations go to great lengths to educate their workers on the importance of creating and maintaining secure passwords.

Extensive research has been conducted on how users create and manage their passwords. To date, there is limited insight on how the behaviour of IT workers may differ from that of non-IT workers. It is generally assumed that IT workers have a greater understanding of what a secure password entails and how insecure password behaviour may put an organisation’s resources at risk by the nature of their roles. Consequently, they are expected to have a positive influence on non-IT workers’ password behaviour.

This research sets out to test this assumption. The findings suggest significant differences between the password practices applied when IT and non-IT workers create and manage their passwords. However, poor security behaviour by both IT and non-IT workers was evident.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kävrestad, J., Lennartsson, M., Birath, M., Nohlberg, M.: Constructing secure and memorable passwords. Inf. Comput. Secur. 28(5), 701–717 (2020). https://doi.org/10.1108/ICS-07-2019-0077

    Article  Google Scholar 

  2. Gehringer, E.F.: Choosing passwords: security and human factors. In: IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293), pp. 369–373 (2002). https://doi.org/10.1109/ISTAS.2002.1013839

  3. Butler, R., Butler, M.: Some password users are more equal than others: towards customisation of online security initiatives. SA J. Inf. Manag. 20(1), 1 (2018). https://doi.org/10.4102/sajim.v20i1.920

    Article  Google Scholar 

  4. Al Awawdeh, S., Tubaishat, A.: An information security awareness program to address common security concerns in IT unit. In: Proceedings of 11th International Conference on Information Technology: New Generation – ITNG 2014, pp. 273–278 (2014). https://doi.org/10.1109/ITNG.2014.67

  5. Guo, K.H.: Security-related behavior in using information systems in the workplace: a review and synthesis. Comput. Secur. 32(1), 242–251 (2013). https://doi.org/10.1016/j.cose.2012.10.003

    Article  Google Scholar 

  6. Kothari, V., Blythe, J., Smith, S.W., Koppel, R.: Measuring the security impacts of password policies using cognitive behavioral agent-based modeling. In: ACM International Conference Proceedings, pp. 1–9, 21–22 April 2015. https://doi.org/10.1145/2746194.2746207

  7. Loutfi, I., Jøsang, A.: Passwords are not always stronger on the other side of the fence. In: Proceedings Networks and Distributed Systems Security Conference USEC Work, no. February, pp. 1–10 (2015). https://doi.org/10.14722/usec.2015.23005

  8. Kumar, A., Singh, P.: Information technology as facilitator of workforce. Bus. Manag. Dyn. 3(12), 15–20 (2014)

    Google Scholar 

  9. Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: Passwords and the evolution of imperfect authentication. Commun. ACM 58(7), 78–87 (2015)

    Article  Google Scholar 

  10. Bishop, M., Klein, D.V.: Improving system security via proactive password checking. Comput. Secur. 14(3), 233–249 (1995). https://doi.org/10.1016/0167-4048(95)00003-Q

    Article  Google Scholar 

  11. Florêncio, D., Herley, C.: Where do security policies come from? In: Proceedings of the Sixth Symposium on Usable Privacy and Security – SOUPS 2010, p. 1 (2010). https://doi.org/10.1145/1837110.1837124

  12. Zhang-Kennedy, L., Chiasson, S., Van Oorschot, P.: Revisiting password rules: facilitating human management of passwords. In: eCrime Researchers Summit, eCrime 2016, vol. 2016-June, pp. 81–90 (2016). https://doi.org/10.1109/ECRIME.2016.7487945

  13. Hussain, T.: Passwords and user behavior. J. Comput. 13(6), 692–704 (2018). https://doi.org/10.17706/jcp.13.6.692-704

    Article  Google Scholar 

  14. Kevin, B.: Hacking For Dummies, 4th edn (2013)

    Google Scholar 

  15. Obedur, S.R.: Strategies for password management Master thesis Shazia Rahman Obedur. University of Oslo (2013)

    Google Scholar 

  16. Kaplan-Leiserson, E.: People and plans: training’s role in homeland security. T+D 57(9), 66–74 (2003)

    Google Scholar 

  17. Nathan, A.J., Scobell, A.: 2020 Data Breach Investigations Report (2020). https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf, https://bfy.tw/HJvH

  18. Davidson, A., King, S.: Data breaches continue to rise: how financial institutions can prepare & respond. In: Risk Webinar, pp. 2–3 (2016)

    Google Scholar 

  19. Butler, R., Butler, M.: The password practices applied by South African online consumers: perception versus reality. SA J. Inf. Manag. 17(1), 1–11 (2015). https://doi.org/10.4102/sajim.v17i1.638

    Article  Google Scholar 

  20. Florêncio, D., Herley, C., Van Oorschot, P.: An administrator’s guide to internet password research. In: 28th Large Installation System Administration Conference (LISA 2014), pp. 35–52 (2014)

    Google Scholar 

  21. Kelley, P.G., et al.: Guess again (and again and again): measuring password strength by simulating password-cracking algorithms. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 523–537 (2012). https://doi.org/10.1109/SP.2012.38

  22. Komanduri, S., Shay, R., Cranor, L.F., Herley, C., Schechter, S.: Telepathwords: preventing weak passwords by reading users’ minds. In: Proceedings of 23rd USENIX Security Symposium, pp. 591–606 (2014)

    Google Scholar 

  23. Hicock, R.: Microsoft Password Guidance (2016)

    Google Scholar 

  24. Julisch, K.: Understanding and overcoming cyber security anti-patterns. Comput. Net. 57(10), 2206–2211 (2013). https://doi.org/10.1016/j.comnet.2012.11.023

    Article  Google Scholar 

  25. Toulouse, S.: On changing password guidance: a good first step from Microsoft. Leviathan Security Group (2017)

    Google Scholar 

  26. Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users (2009)

    Google Scholar 

  27. Stajano, F., Mjølsnes, S.F., Jenkinson, G., Thorsheim, P. (eds.): PASSWORDS 2015. LNCS, vol. 9551. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29938-9

    Book  Google Scholar 

  28. Tam, L., Glassman, M., Vandenwauver, M.: The psychology of password management: a tradeoff between security and convenience. Behav. Inf. Technol. 29(3), 233–244 (2010). https://doi.org/10.1080/01449290903121386

    Article  Google Scholar 

  29. Veras, R., Collins, C., Veras, R., Thorpe, J., Collins, C.: Visualizing semantics in passwords : the role of dates. In: Proceedings of 9th International Symposium on Visualization for Cyber Security, pp. 88–95 (2012). https://doi.org/10.1145/2379690.2379702

  30. Adams, A., Sasse, M.A., Lunt, P.: Making passwords secure and usable. People Comput. 34(1), 1–15 (1997). https://doi.org/10.1145/99977.99993

    Article  Google Scholar 

  31. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999). https://doi.org/10.1145/322796.322806

    Article  Google Scholar 

  32. Stobertm E., Biddle, R.: The password life cycle: user behaviour in managing passwords. In: Proceedings of 10th Symposium on Usable Privacy and Security – (SOUPS 2014), pp. 243–255 (2014)

    Google Scholar 

  33. Weirich, D., Sasse, M.A.: Pretty good persuasion: a first step towards effective password security in the real world. In: Proceedings of the New Security Paradigms Workshops – NSPW 2001, pp. 137–143 (2001). https://doi.org/10.1145/508171.508195

  34. Porter, S.N.: A password extension for improved human factors. Comput. Secur. 1(1), 54–56 (1982)

    Article  Google Scholar 

  35. Khatib, R., Barki, H.: An activity theory approach to information security non-compliance. Inf. Comput. Secur. 28(4), 485–501 (2020). https://doi.org/10.1108/ICS-11-2018-0128

    Article  Google Scholar 

  36. Joudaki, Z., Thorpe, J., Vargas Martin, M.: Enhanced tacit secrets: system-assigned passwords you can’t write down, but don’t need to. Int. J. Inf. Secur. 18(2), 239–255 (2019). https://doi.org/10.1007/s10207-018-0408-2

    Article  Google Scholar 

  37. Grawemeyer, B., Johnson, H.: Using and managing multiple passwords: a week to a view. Interact. Comput. 23(3), 256–267 (2011). https://doi.org/10.1016/j.intcom.2011.03.007

    Article  Google Scholar 

  38. Notoatmodjo, G., Thomborson, C.: Passwords and perceptions. Conf. Res. Pract. Inf. Technol. Ser. 98, 71–78 (2009)

    Google Scholar 

  39. Ives, B.B., Walsh, K.R.: The domino effect of password reuse. Commun. ACM 47(4), 75–78 (2004)

    Google Scholar 

  40. Rainer, R.K., Jr., Marshall, T.E., Knapp, K.J., Montgomery, G.H.: Do information security professionals and business managers view information security issues differently? Inf. Syst. Secur. 16, 100–108 (2007). https://doi.org/10.1080/10658980701260579

    Article  Google Scholar 

  41. Shay, R., et al.: Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, 1–20 July 2010. https://doi.org/10.1145/1837110.1837113

  42. Koppell, R., Blythe, J., Kothari, V., Smith, S.: Beliefs about cybersecurity rules and passwords: a comparison of two survey samples of cybersecurity professionals versus regular users. In: Proceedings of 12th Symposium on Usable Privacy and Security (SOUPS 2016) (2016). https://www.usenix.org/conference/soups2016/workshop-program/wsf/presentation/koppel

  43. Kothari, V., Blythe, J., Smith, S., Koppell, R.: Measuring the security impacts of password policies using cognitive behavioral agent-based modeling. In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, pp. 1–9 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin J. Butler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Brockbanks, P., Butler, M.J. (2021). The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords. In: Furnell, S., Clarke, N. (eds) Human Aspects of Information Security and Assurance. HAISA 2021. IFIP Advances in Information and Communication Technology, vol 613. Springer, Cham. https://doi.org/10.1007/978-3-030-81111-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-81111-2_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-81110-5

  • Online ISBN: 978-3-030-81111-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics