Password usage, management, and perceptions of expert users

Ihmisten tietoturva kautta maailman riippuu salasanojen varassa, mutta salasana todennusmenetelmänä toimii tarkoitetulla tavalla vain, jos käyttäjät noudattavat turvallisia salasanakäytänteitä. Siitä huolimatta tietoturvan kannalta heikot salasanat ovat yleisiä, koska salasanojen uudelleenkäyttö ja...

Full description

Bibliographic Details
Main Author: Temonen, Saku
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2020
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/72940
_version_ 1826225753216253952
author Temonen, Saku
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Temonen, Saku Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Temonen, Saku Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Temonen, Saku
datasource_str_mv jyx
description Ihmisten tietoturva kautta maailman riippuu salasanojen varassa, mutta salasana todennusmenetelmänä toimii tarkoitetulla tavalla vain, jos käyttäjät noudattavat turvallisia salasanakäytänteitä. Siitä huolimatta tietoturvan kannalta heikot salasanat ovat yleisiä, koska salasanojen uudelleenkäyttö ja turvallisten käytänteiden kiertäminen on helpompaa kuin lukuisien monimutkaisten salasanojen muistaminen. Tämän käytettävyyden ja tietoturvan välisen ristiriidan ymmärtäminen on tärkeää, jotta salasanasta voidaan kehittää tietoturvan kannalta tehokkaampi todennusmenetelmä. Salasanojen laajasta tieteellisestä tutkimuksesta huolimatta on vielä epäselvää, mitkä kaikki tekijät vaikuttavat käyttäjien salasanojen käyttöön, hallintaan ja niihin liittyviin asenteisiin. Tämän tutkimuksen tavoitteena on tutkia tätä aukkoa tieteellisessä kirjallisuudessa tarkastelemalla asiantuntijakäyttäjien salasanojen käyttöä. Toteutetun empiirisen kyselytutkimuksen tarkoitus oli selvittää, onko kahden eri osaamisalueen omaavan asiantuntijakäyttäjäryhmän välillä merkittävää eroa salasanojen käytön, hallinnan ja asenteiden suhteen. Kyselytutkimuksen tulosten analyysin pohjalta vaikuttaa siltä, että tarkasteltujen ryhmien välillä on eroa eri tilityyppien tärkeyden tulkinnassa sekä salasanojen muistiinkirjoittamisessa. Information security of people around the world is reliant on password authentication, an imperfect security mechanism which is effective only when users follow guidelines and secure practices. Yet insecure practices are widespread among users, as reusing passwords and circumventing guidelines is easier than memorizing a wide array of unique and complex passwords. Understanding this conflict between usability and security is vital for designing better password guidelines and thus improving the effectiveness of password authentication as a security mechanism. While password usage has been subject to much research, there remains a clear research gap on which factors affect user’s password usage, management, and perceptions. The purpose of this study is to explore this research gap by studying password behaviour of expert users, particularly if having a different area of expertise within the field of information technology results in a difference in password behaviour. An empirical study was conducted using a survey study, with participants from two different groups of expert users with different areas of expertise participating in the survey. Analysis of the survey responses suggests there are differences between the groups, particularly when it comes to the perceived importance of account types and writing down one’s passwords.
first_indexed 2020-12-03T21:01:38Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Woods, Naomi", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Temonen, Saku", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-03T08:40:08Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-03T08:40:08Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/72940", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ihmisten tietoturva kautta maailman riippuu salasanojen varassa, mutta salasana todennusmenetelm\u00e4n\u00e4 toimii tarkoitetulla tavalla vain, jos k\u00e4ytt\u00e4j\u00e4t noudattavat turvallisia salasanak\u00e4yt\u00e4nteit\u00e4. Siit\u00e4 huolimatta tietoturvan kannalta heikot salasanat ovat yleisi\u00e4, koska salasanojen uudelleenk\u00e4ytt\u00f6 ja turvallisten k\u00e4yt\u00e4nteiden kiert\u00e4minen on helpompaa kuin lukuisien monimutkaisten salasanojen muistaminen. T\u00e4m\u00e4n k\u00e4ytett\u00e4vyyden ja tietoturvan v\u00e4lisen ristiriidan ymm\u00e4rt\u00e4minen on t\u00e4rke\u00e4\u00e4, jotta salasanasta voidaan kehitt\u00e4\u00e4 tietoturvan kannalta tehokkaampi todennusmenetelm\u00e4. Salasanojen laajasta tieteellisest\u00e4 tutkimuksesta huolimatta on viel\u00e4 ep\u00e4selv\u00e4\u00e4, mitk\u00e4 kaikki tekij\u00e4t vaikuttavat k\u00e4ytt\u00e4jien salasanojen k\u00e4ytt\u00f6\u00f6n, hallintaan ja niihin liittyviin asenteisiin. T\u00e4m\u00e4n tutkimuksen tavoitteena on tutkia t\u00e4t\u00e4 aukkoa tieteellisess\u00e4 kirjallisuudessa tarkastelemalla asiantuntijak\u00e4ytt\u00e4jien salasanojen k\u00e4ytt\u00f6\u00e4. Toteutetun empiirisen kyselytutkimuksen tarkoitus oli selvitt\u00e4\u00e4, onko kahden eri osaamisalueen omaavan asiantuntijak\u00e4ytt\u00e4j\u00e4ryhm\u00e4n v\u00e4lill\u00e4 merkitt\u00e4v\u00e4\u00e4 eroa salasanojen k\u00e4yt\u00f6n, hallinnan ja asenteiden suhteen. Kyselytutkimuksen tulosten analyysin pohjalta vaikuttaa silt\u00e4, ett\u00e4 tarkasteltujen ryhmien v\u00e4lill\u00e4 on eroa eri tilityyppien t\u00e4rkeyden tulkinnassa sek\u00e4 salasanojen muistiinkirjoittamisessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Information security of people around the world is reliant on password authentication, an imperfect security mechanism which is effective only when users follow guidelines and secure practices. Yet insecure practices are widespread among users, as reusing passwords and circumventing guidelines is easier than memorizing a wide array of unique and complex passwords. Understanding this conflict between usability and security is vital for designing better password guidelines and thus improving the effectiveness of password authentication as a security mechanism. While password usage has been subject to much research, there remains a clear research gap on which factors affect user\u2019s password usage, management, and perceptions. The purpose of this study is to explore this research gap by studying password behaviour of expert users, particularly if having a different area of expertise within the field of information technology results in a difference in password behaviour. An empirical study was conducted using a survey study, with participants from two different groups of expert users with different areas of expertise participating in the survey. Analysis of the survey responses suggests there are differences between the groups, particularly when it comes to the perceived importance of account types and writing down one\u2019s passwords.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-12-03T08:40:08Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-03T08:40:08Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "72", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "memorability", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "muistettavuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Password usage, management, and perceptions of expert users", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012036897", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytett\u00e4vyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salasanat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "usability", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "passwords", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_72940
language eng
last_indexed 2025-02-18T10:54:29Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/fc7611d4-9674-4fa4-bf6f-4d9da9b08cbb\/download","text":"URN:NBN:fi:jyu-202012036897.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Temonen, Saku Password usage, management, and perceptions of expert users memorability muistettavuus Tietojärjestelmätiede Information Systems Science 601 tietoturva käytettävyys salasanat data security usability passwords
title Password usage, management, and perceptions of expert users
title_full Password usage, management, and perceptions of expert users
title_fullStr Password usage, management, and perceptions of expert users Password usage, management, and perceptions of expert users
title_full_unstemmed Password usage, management, and perceptions of expert users Password usage, management, and perceptions of expert users
title_short Password usage, management, and perceptions of expert users
title_sort password usage management and perceptions of expert users
title_txtP Password usage, management, and perceptions of expert users
topic memorability muistettavuus Tietojärjestelmätiede Information Systems Science 601 tietoturva käytettävyys salasanat data security usability passwords
topic_facet 601 Information Systems Science Tietojärjestelmätiede data security käytettävyys memorability muistettavuus passwords salasanat tietoturva usability
url https://jyx.jyu.fi/handle/123456789/72940 http://www.urn.fi/URN:NBN:fi:jyu-202012036897
work_keys_str_mv AT temonensaku passwordusagemanagementandperceptionsofexpertusers