ASEP D 22 00341 R1 Reviewer
ASEP D 22 00341 R1 Reviewer
Abstract: Password-based authentication is still the most widely used authentication method
today. Unfortunately, passwords are the main culprit for the cause of cyberattacks. This
paper, therefore, examines the behaviors towards password generation and usage of
young people, who will ultimately become the future generation in the society. An
online survey with a sample of 265 respondents at the ages of 10 - 24 together with
those who are older than 24 years old was conducted between April and August 2021.
The research applied descriptive statistical analyses and compared the responses
from young people and those from the older group. The results suggest that although
the survey participants seemed to have some knowledge of creating complex
passwords, they still illustrated some aspects which could lead to being a target of
cyberattacks. Since this is a preliminary study of the behaviors of young people
towards password management, the number of participants is limited. This preliminary
study provides information and increases awareness for policy makers and
educationists in such a way that it could be used to create an educational program on
the importance of managing passwords securely. In addition, the study provides an
insight for how young people aged between 10 and 24 years old behaved towards
password management.
Powered by Editorial Manager® and ProduXion Manager® from Aries Systems Corporation
Anonymous Manuscript Click here to access/download;Anonymous
Manuscript;Preliminary Study of Password
Sirapat Boonkrong*
Institute of Digital Arts and Science, Suranaree University of Technology, Nakhon Ratchasima, Thailand
Abstract
Password-based authentication is still the most widely used authentication method today. Unfortunately,
passwords are the main culprit for the cause of cyberattacks. This paper, therefore, examines the behaviors
towards password generation and usage of young people, who will ultimately become the future generation in
the society. An online survey with a sample of 265 respondents at the ages of 10 - 24 together with those who
are older than 24 years old was conducted between April and August 2021. The research applied descriptive
statistical analyses and compared the responses from young people and those from the older group. The results
suggest that although the survey participants seemed to have some knowledge of creating complex passwords,
they still illustrated some aspects which could lead to being a target of cyberattacks. Since this is a preliminary
study of the behaviors of young people towards password management, the number of participants is limited.
This preliminary study provides information and increases awareness for policy makers and educationists in
such a way that it could be used to create an educational program on the importance of managing passwords
securely. In addition, the study provides an insight for how young people aged between 10 and 24 years old
behaved towards password management.
Keywords: Computer security, Password, Password behaviors, Password management, Young people
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
Many organizations and researches have password generation and usage of young people.
attempted to help users generate stronger passwords Finally, we conclude our study.
through their password composition policies [7, 8],
which not only specify the minimum length but also 1.1 Literature review and related work
require users to include specific types of characters
and numbers in their passwords. Some have suggested There is a large amount of literature regarding various
the use of a password manager [9], whose purpose is aspects of password-based authentication. In this
to help users generate stronger passwords and section, however, only those that are relevant to our
eliminate password reuse. study, such as password security, password
While these policies may help improve the management [12] and those looking at perceptions
security of passwords, they make it more difficult and related to passwords are discussed [13-15]. The
more complex for users to memorize their passwords. objective of this work is to build upon the existing
Moreover, nowadays many users are overwhelmed work by looking specifically at the generation of
with the number of accounts and passwords they need young people and what their perspectives are towards
to use on a daily basis, which is largely true for adults password generation and usage.
and older people whose personal data are subject to
adversarial behaviors [10]. This has led to a question
Password security
of trying to understand the attitudes and behaviors of
users, especially those in the younger generations,
towards their password generation and usage. Passwords are the most used method of authentication
World Health Organization or WHO defines the due to their convenience and low cost. Unfortunately,
term “young people” as those who are between 10 and the strength of password-based authentication
24 years old [11]. From this range, young people are mechanisms relies heavily on the strength of the
students in school and higher education as well as passwords themselves. Weak or easy-to-crack
newly graduated. They were the focus of this research passwords have presented us with security problems
because we thought that these people would be the over the years. Having seen the opportunity, attackers
main workforce in the future. It is consequently have created and applied several techniques [1] to
necessary to study and understand what their attitudes crack passwords. Some of the more popular ones are
and behaviors towards password generation and usage as follows.
are so that proper awareness, education and even The first is known as a brute force attack, which
technologies can be designed and put in place to is when an attacker attempts all possible passwords
complement the results of this research. until the correct one is found. The second is called
In this research, as a preliminary study, a survey password dictionary attack. This occurs when a list of
was carried out with over two hundred and fifty commonly used passwords is created and stored in a
participants, two hundred of which were in the young database. Only the passwords in that database or
people category as defined by WHO. The rest were in dictionary are tried and used when an attacker
the older category, which as a byproduct was used for attempts to log into a system as someone else.
a comparison analysis. In general, our participants Consequently, a couple of approaches have been
reported that they had more than one accounts with the proposed to help measure the quality and strength of
number of passwords not matching the number of passwords. The first was password entropy, which was
accounts. Many appeared to have adapted to the first introduced by Shannon [16]. Password entropy
advice of generating more complex passwords. A few was defined as the statistical distribution of
said they were aware of how to ensure their password information, which measured the randomness of the
security through multi-factor authentication and content. This led to the research by Ma et al. [17] who
password managers, while many had never even heard suggested that a password should be composed of
of them before. upper case letters, lower case letters, numbers and
In the remainder of this paper, literature relevant special characters.
to our study is first discussed. We then describe the Ma et al. [17] also proposed another approach for
research design and methodology used in data evaluating the strength of passwords known as the
collection and analysis. Next, we present our findings effective length. The effective length was an extension
regarding the attitudes and behaviors towards to the basic counting of the number of characters in a
password. It was suggested that a password
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
complexity index (or a specified value for each that using the same password for many accounts was
character) should be applied to the password so that like having one key that can unlock many doors.
the effective length, rather than the actual length, Although not agreed by some [24], many
could be computed. organizations’ password policy forces users [18] to
The two password security metrics in password change their passwords every thirty to sixty days. It
entropy (components within a password) and was believed over a period in the past that by changing
password length have, therefore, become parts of our passwords, attackers would find it more difficult to
survey, specifically in the password composition compromise them. However, many have had counter
stage. arguments since then by suggesting that changing
passwords often could lower the security of the
Password management already-strong passwords [24]. Regarding this issue, a
study observed that users tended not to change their
Passwords are considered the first line of defense to passwords based on their own decisions. They would
computer and information systems [1]. They help only do so when they were forced to in the case of a
reduce the risk of unauthorized access. That means by breach or forgetting their passwords [25].
generating strong passwords and adopting good In the context of password recall and
password practices, it is possible to lower the chances memorability, users applied different approaches
of being compromised. The problem is that users are ranging from relying on their memory to writing down
now facing a lot of burdens in managing their on either pieces of paper or in a note application on
passwords, namely password creation and usage. their computing device. It was also found that the use
Previous studies [18, 19] have found that some of password managers was not common, even though
people possess over twenty accounts and hold as many it was a recommended approach [9][12].
if not almost as many passwords. Some of these people The existing literatures studied various aspects of
even use all these accounts and password everyday. user behaviors towards passwords, but there had not
One research suggested that almost half the people been many that specifically looked at how young
participating in the study logged in their accounts over people worked on password management [26]. In
forty times a week [20]. 2021, however, there was one study that provided an
According to some research [12, 21], people attempt to understand what children thought about
appeared to have varying methods for creating their passwords [27]. This article appeared to be the first to
passwords. They showed that although many conduct a survey of third to twelve graders from
organizations and Web sites had password policies schools across the USA. The authors found that
that required users’ passwords to meet some specific children had fewer passwords than adults and had
criteria, people still tended to create their password by mixed perceptions about passwords. Moreover, their
choosing something that was easy for them to study showed that there were some behaviors that
remember, which usually made them vulnerable and would lead to the insecurity of passwords. Having
easy to guess. Having said that there were people still said that, our work is different from Theofanos et al.’s
conforming to a better password creation strategy by work in three folds. The first is that our participants
combining various types of characters and numbers in were from different parts of the world. Secondly,
their passwords (Shay, et al., 2016). although the main group of our participants was also
Another research [22] was conducted to study young, the participants were from a broader range of
the password usage behaviors of users. It was found age groups, namely those who were aged between 10
that users frequently reused their passwords across and 24 years old, as defined by WHO. Third, our
multiple accounts. The more passwords users had to coverage of perceptions towards passwords is
generate and the more accounts they possessed, the different. That is, the work of Theofanos et al.’s put an
more likely they would reuse the passwords. This emphasis on the understanding of passwords and
behavior is worrying, because it is the main cause of a password creation whereas our study focused on more
password-related attack known as credential stuffing. aspects, namely password creation, password usage
This occurs when a user’s password is known by an and password security improvement strategies.
attacker, who will then try to use the same password
to log into other accounts belonging to the same user
[1]. Some researchers [23] have gone so far in saying
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
number of password generation methods acquired participants’ passwords. Habib et al. [12] found that
from our study appeared to be bigger than that from approximately 41% of all participants used English
the research by Habib et al. [12], which indicated that words in their passwords. However, the percentage in
there were three main techniques for password our research was not as high. On average
creation. They were using English words, using approximately 31.03% of the young participants (10 -
names, and adding either numbers or symbols. Our 24 years old) reported that they would include words
study looked at a different angle from the work of from English dictionary in their passwords. The
Theofanos et al. [27] where the correspondents’ number was even lower in the older age group with
passwords were given by school, made by parents or only 20.34%. Having said that, this is another method
with parents’ help, or made by the correspondents that showed a statistically significant difference (α =
themselves. No other details were given in their study. .05) between young people and their older
There are a few things worth pointing out from counterparts.
the obtained results. First of all, creating a password The least popular password creation method was
by including a person’s name was popular among when passwords were created by including names of
young people with 50% of 10 - 14 year old participants places. Only 16.08% of the 10 - 24 year olds and only
admitted to use this technique. In addition, 39% and 12% of the older age group reported to have adopted
38% of participants who were between 15 - 19 years this method. The practice of including names of
old and 20 - 24 years old, respectively, would include places in passwords was something that had only been
either their own or someone else’s names in their acquired in our study and never been mentioned in any
passwords. The obtained percentages appeared to be previous studies.
aligned with the results from Habib et al. and Ur et al. Moreover, there were also other practices
[28] in that using names was the most common reported by some of our participants. It had to be
password creation technique. Moreover, 34% of the pointed out that the percentage of the older age group
25 years old and over used this method to generate (20.34%) that had used other methods for creating
their passwords. passwords was significantly higher (α = .05) than the
Secondly, including someone’s date of birth in a younger age groups (3.13%) from which only those
password was another popular method. From Figure between 20 and 24 years old reported to have used
1, it can be seen that 53% of the 15 - 19 year old other techniques. Some of the methods mentioned by
participants used either their own or other people’s the participants that fell into this category included the
dates of birth as a part of their passwords. This was use of student or national ID numbers and words from
followed by the 20 - 24 and 10 - 14 age groups with other foreign languages (using English keyboard).
39% and 38% of participants, respectively. In
contrast, this method was only used by 27% of the Password components
older participants. Hence there is a statistically
significant difference (α = .05) between the young
people (10 - 24 years old) and the older ones (25 and The second part of the password creation section
over). reported what components the participants had
Another password creation technique was the included or would choose to include in their
inclusion of phone numbers. Compared with the older passwords. From the obtained data, there were fifteen
age group of over 25 years old, the percentage of possible ways or combinations of components that
young participants who chose this technique for were chosen by the participants. These fifteen
password generation was significantly higher (α = different combinations can be seen in Figure 2, which
.05). In other words, 32.70% of the young also shows the distribution of the participants’ chosen
correspondents reported that they had included either components in their passwords.
their own or someone else's phone numbers in their
passwords. In contrast, only 17% of the older age
group reported to have done the same.
The next password generation strategy obtained
from our survey was also the results of the research by
Habib et al. [12], Ur et al. [28] and Bryant and
Campbell [15]. This was the technique of using words
from an English dictionary as a part of the
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
who also found that 59% of their participants would having their passwords of this size. That was an
add numbers to their passwords, and 32% would add obvious dissimilarity to the young people (10 - 24
special characters to increase the complexity. years old), with approximately 27.29% choosing this
However, Habib et al. [12] did not provide any details password size. That is, there is a clear statistically
of how the results distributed among different age significant difference (α = .05) between these two age
groups. groups.
The passwords of the size between 10 and 12
Password size characters provided a very noticeable point to be
discussed. Figure 3 shows that approximately 75% of
The final part of the password creation section is the the 10 - 14 year old participants had created passwords
password size. This part reports the average password of this size, which was significantly higher (α = .05)
size that our research participants had created and than any other age groups. However, on average,
used. In general, the responses from the participants 47.90% of the young participants (10 - 24 years old)
were grouped into five size ranges. They were the had created their passwords whose sizes were between
passwords whose size were 4 - 6 characters, 7 - 9 10 to 12 characters long, compared with only 30.51%
characters, 10 - 12 characters, 13 - 15 characters and of the older participants.
over 15 characters. Figure 3 shows the distribution of Finally, the 13 - 15 character passwords were
our participants’ reported password sizes. created by 13.42% of young participants. The number
for the 25 years old and older was not significantly
different with 11.86% of them having created and used
passwords of this size.
On the whole, those between 10 and 24 years old
tended to create their passwords of the size between
10 and 12 characters, compared with the older
participants almost half of whom suggested that their
passwords were between 7 and 9 characters long.
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
Figure 6 shows the distribution of our participants’ participants using the note-taking method, our
password recall methods. numbers were not as high as the survey done by NIST
[29] who found that over 80% of their survey
respondents stored their passwords either on paper or
electronically. However, the results from [27]
suggested that only 38.83% of their participants wrote
down passwords.
There were two other recall techniques used by
the participants. One was using a password manager.
Overall, password managers were used less by the
young participants (11.46%) compared with 23.73%
of the 25 and over age group. By looking at the data
we can see that the amount of password manager
usage had the upward trend as the age increased.
Making use of the Web browser’s ability to
remember passwords was a choice of a few of our
participants, where the percentages from the young
Figure 6: Percentage distribution of participants’ correspondents and older age group were not
password recall methods. significantly different. Furthermore, the use of Web
browser’s password remembering function had a
It is clear from Figure 6 that the most popular downward trend as the participants became older.
password recall method among our participants was
memorising the passwords. The survey data revealed Password update
that on average 70% of the young participants chose
to adopt this method for their password recall. This This part describes how often, if at all, our participants
was to compare with 55.93% of the 25 and over age changed or updated their passwords. Figure 7 shows
group who chose the same method. What we can say the distribution of the participants’ password update
is that more than half of the participants from all age frequency.
groups reported to recall their passwords from their
memory. However, the pattern shown in Figure 6
revealed that as the participants got older, it became
less likely that same number of people would still use
their memory as their password recall method.
This particular result of our survey appeared to
be aligned with that of Habib et al. [12] and Theofanos
et al. [27] who also suggested that the most common
password recall technique used by more than half of
their research participants was memorising the
passwords. However, our research provided more
insight in that we showed that a significantly higher (α
= .05) number (70%) of those aged between 10 and 24
years old memorised their passwords rather than using
other methods.
We combined the survey results of methods
(methods 1 - 3 from Figure 6) for writing down Figure 7: Percentage distribution of participants’
passwords to obtain the following. The note-taking password update frequency.
method was on the whole used by 56.92% of the
young participants and 57.63% of the 25 and over age Our data revealed a similar behaviour pattern for
group. This means that on average there was no both young participants who were between 10 and 24
significant difference between the young people and years old and older participants aged 25 and over.
those who were older in adopting this password recall That is, there were more participants who admitted to
strategy. Although our study recorded over half the
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
In addition, we believe that the results of the more aware of the problems that exist in the younger
survey and analyses provide the current data about the generation. Consequently, it is hoped that the data
perceptions and behaviours of young people towards obtained from this study would form the basis for
password management. Our study obtained reasons to create proper educational programs
information from a broad group of participants, focusing on adopting better password and
including those who were between 10 - 14 years old, authentication practices, so that the risk for
15 - 19 years old, 20 - 24 years old, and over 25 years cyberattacks could be reduced in the future.
old. The data collected provide some evidence about
how the participants, especially the younger ones, Acknowledgments
perceived their password management as well as how
plausible vulnerabilities could be caused by their We extend our sincere thanks to all who participated
behaviours. in the survey.
While we feel that the obtained results are useful,
they should admittedly be viewed with caution due to Author Contributions
the no-so-high number of response rate. However, to
increase the level of validity of the study, we C.T.: questionairre generation, research design,
computed and provided the values of 95% confidence reviewing and editing the manuscript; S.B.: research
interval of the seemingly top response for each design, data cleansing, data analysis, writing an
password management category in Table 2. Despite original draft. All authors have read and agreed to the
the limitation of the number of participants, we still published version of the manuscript.
believe that the data obtained in this study offer new
insight and valuable information. Conflict of Interest
On our final point, we would like to emphasise
that our research was anchored in three main aspects The authors declare no conflict of interest.
of password perceptions and behaviours of young
people, namely password creation, password usage
and password security improvement. As such, the
obtained results are intended for policy makers,
educationists, and practitioners so that they become
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Applied Science and Engineering Progress, Vol. x, No. x, (Year), xxxx
References
[1] S. Boonkrong, "Methods and Threats of [10] H. Y. Huang and M. Bashir, "Surfing
Authentication," in Practical safely: Examining older adults’ online
Cryptography Methods and Tools. privacy protection behaviors," in The
Berkeley(CA): Apress, 2021, pp. 45-70. Association for Information Science and
[2] NordPass. "Top 200 most common Technology, 2018, vol. 15, pp. 188-197.
passwords of the year 2020." [11] World Health Organisation (WHO),
https://nordpass.com/most-common- "Young people’s health - a challenge for
passwords-list/ (accessed October, 2021). society," Geneva, Switzerland: World
[3] D. Malone and K. Maher, "Investigating Health Organisation, 1986.
the Distribution of Password Choices," in [12] H. Habib, P. Emani-Naeini, S. Devlin, M.
The 21st International Conference on Oates, C. Swoopes, L. Bauer, N. Christin,
World Wide Web, Lyon, France, 2012: and L. F. Cranor, "User Behaviors and
ACM, pp. 301-310. Attitudes Under Password Expiration
[4] Computer Emergency Response Team Policies," in The Fourteenth USENIX
(CERT), "IN98.03: Password cracking Conference on Usable Privacy and
activity," USA: Software Engineering Security, Baltimore, MD, USA, 2018:
Institute, Carnegie Mellon University, USENIX, pp. 13-30.
1998. [13] T. Hussain, K. Atta, N. Z. Bawany, and T.
[5] Imperva, "Consumer password worst Qamar, "Password and User Behavior,"
practices," USA: The Imperva Application Journal of Computers, vol. 13, no. 6, pp.
Defence Center (ADC), 2014. 692-704, 2017.
[6] C. Shu. "Passwords for 32M twitter [14] D. T. Fredericks, L. A. Futcher, and K. L.
accounts may have been hacked and Thomson, "Comparing Student Password
leaked." Knowledge and Behaviour: A Case Study,"
https://techcrunch.com/2016/06/08/twitter- in The Tenth International Symposium on
hack/ (accessed October, 2021). Human Aspects of Information Security &
[7] R. Shay, S. Komanduri, A. Suriti, P. Huh, Assurance (HAISA 2016), Frankfurt,
M. L. Mazurek, S. Segreti, B. Ur, L. Bauer, Germany, 2016, pp. 167-178.
N. Christin, and L. F. Cranor, "Designing [15] K. Bryant and J. Campbell, "User
Password Policies for Strength and Behaviours Associated with Password
Usability," ACM Transactions on Security and Managemen," Australasian
Information and System Security, vol. 18, Journal of Information Systems, vol. 14,
no. 4, pp. 1-34, 2016. no. 1, pp. 80-100, 2006.
[8] S. Komanduri, R. Shay, P. G. Kelly, M. L. [16] C. E. Shannon, "A Mathematical Theory of
Mazurek, L. Bauer, N. Christin, L. F. Communication," The Bell System
Cranor, and S. Egelman, "Of passwords Technical Journal, vol. 27, no. 3, pp. 379-
and people: measuring the effect of 423, 1948.
password-composition policies," in The [17] W. Ma, J. Campbell, D. Tran, and D.
SIGCHI Conference on Human Factors in Kleeman, "Password Entropy and
Computing Systems, Vancouver, Canada, Password Quality," in The Fourth
2011: ACM, pp. 2595-2604. International Conference on Network and
[9] H. Ray, F. Wolf, R. Kuber, and A. J. Aviv, System Security, Melbourne, Australia,
"Why Older Adults (Don't) Use Password 2010: IEEE.
Managers," in The USENIX Security [18] D. Florêncio and C. Herley, "Where do
Symposium, Virtual Event, 2021: USENIX, security policies come from?," in The Sixth
pp. 73-90. Symposium on Usable Privacy and
C. Titiakarawongse and S. Boonkrong, “Preliminary Study of Password Management Behaviors of Young People.”
Security, Redmond, WA, USA, 2010: [27] M. Theofanos, Y. Y. Choong, and O.
ACM, pp. 1-14. Murphy, "Passwords Keep Me Safe’ –
[19] S. Pearman, J. Thomas, P. Emani-Naeini, Understanding What Children Think about
H. Habib, L. Bauer, N. Christin, L. F. Passwords," in The Thirtieth USENIX
Cranor, S. Egelman, and A. Forget, "Let's Security Symposium, Virtual event 2021:
Go in for a Closer Look: Observing USENIX, pp. 19-35.
Passwords in Their Natural Habitat," in The [28] B. Ur, F. Noma, J. Bees, S. M. Segreti, R.
2017 ACM SIGSAC Conference on Shay, L. Bauer, N. Christin, and L. F.
Computer and Communications Security, Cranor, "I Added ‘!’ at the End to Make It
Dallas, TX, USA: ACM, pp. 295-310, Secure: Observing Password Creation in
2017. the Lab," in The Eleventh USENIX
[20] B. Grawemeyer and H. Johnson, "Using Conference on Usable Privacy and
and Managing Multiple Passwords: A Security, Ottawa, Canada, 2015: USENIX,
Week to a View," Interacting with pp. 123-140.
Computers, vol. 23, no. 3, pp. 256-267, [29] Y. Y. Choong, M. F. Theofanos, and H. K.
2011. Liu, "NISTIR 7991: United States Federal
[21] E. Stobert and R. Biddle, "The Password Employees’ Password Management
Life Cycle: User Behaviour in Managing Behaviors - A Department of Commerce,"
Passwords," in The Tenth USENIX USA: National Institute of Standards and
Conference on Usable Privacy and Technology (NIST), 2014.
Security, Melo Park, CA, USA, 2014: [30] L. Ion, R. Reeder, and S. Consolvo, "No
USENIX, pp. 243-255. one Can Hack My Mind: Comparing
[22] A. Das, J. Bonneau, M. Caesar, N. Borisov, Expert and Non-Expert Security Practices,"
and X. Wang, "The Tangled Web of in The Eleventh USENIX Conference on
Password Reuse," in 2014 Network and Usable Privacy and Security, Ottawa,
Distributed System Security (NDSS) Canada, 2015: USENIX, pp. 327-346.
Symposium, San Diego, CA, USA, 2014, [31] A. Barron, Inference for Categorical Data,
pp. 23-26. Introduction to Statistics. USA: Yale
[23] University of Illinois., "Why you should University., 1997.
use different passwords."
https://security.illinois.edu/content/why-
you-should-use-different-passwords
(accessed October, 2021).
[24] S. Bellovin, "Unconventional Wisdom,"
IEEE Security & Privacy, vol. 4, no. 1, p.
88, 2006.
[25] P. A. Grassi, J. L. Penton, E. M. Newton,
R. A. Perlner, A. R. Regenscheid, W. E.
Burr, J. P. Richer, N. B. Lefkovitz, J. M.
Danker, Y. Y. Choong, K. K. Greene, and
M. F. Theofanos, "NIST Special
Publication 800-63B: Digital
Authentication Guideline," USA: National
Institute of Standards and Technology
(NIST), 2017.
[26] K. Helkala and T. H. Bakås, "Extended
Results of Norwegian Password Security
Survey," Information Management &
Computer Security, vol. 22, no. 4, pp. 346-
357, 2014.
Response to Reviewers Click here to access/download;Response to
Reviewers;Response.docx
Dear Editor-in-Chief,
Response to Comments:
Comment Response
1. Please reformat the manuscript to follow The manuscript has been reformatted to
the journal template which includes sections contain the following 4 sections: (1)
as follows 1) Introduction 2) Materials and Introduction, (2) Materials and methods, (3)
methods 3) Results and discussion 4) Results and discussion, and (4) Conclusion
Conclusion as suggested.
We hope that we have answered all the comments and addressed what were required.
We can again confirm that this manuscript has not been published elsewhere and is not under
consideration by any other journals.
Yours faithfully,
Sirapat Boonkrong
Highlight
Graphical Abstract
Method Findings
SURVEY DATA
ANALYSIS