{"id":15383,"date":"2019-02-16T03:17:52","date_gmt":"2019-02-16T03:17:52","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=15383"},"modified":"2019-02-18T06:38:22","modified_gmt":"2019-02-18T06:38:22","slug":"a-secure-relationship-with-passwords-means-not-being-attached-to-how-you-pick-them","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/a-secure-relationship-with-passwords-means-not-being-attached-to-how-you-pick-them\/","title":{"rendered":"A secure relationship with passwords means not being attached to how you pick them"},"content":{"rendered":"<p><a href=\"https:\/\/theconversation.com\/profiles\/merrill-warkentin-570030\">Merrill Warkentin<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/mississippi-state-university-1970\">Mississippi State University<\/a><\/em>; <a href=\"https:\/\/theconversation.com\/profiles\/karen-renaud-517005\">Karen Renaud<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/abertay-university-1525\">Abertay University<\/a><\/em>, and <a href=\"https:\/\/theconversation.com\/profiles\/robert-otondo-677452\">Robert Otondo<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/mississippi-state-university-1970\">Mississippi State University<\/a><\/em><\/p>\n<p>When you are asked to create a password \u2013 either for a new online account or resetting login information for an existing account \u2013 you\u2019re <a href=\"https:\/\/doi.org\/10.4018\/joeuc.2004070103\">likely to choose a password you know you can remember<\/a>. Many people use <a href=\"https:\/\/www.theverge.com\/2018\/12\/13\/18139431\/donald-trump-2018-worst-password-splashdata\">extremely basic passwords<\/a>, or a more obscure <a href=\"https:\/\/pixelprivacy.com\/resources\/reusing-passwords\/\">one they reuse across many sites<\/a>. <a href=\"https:\/\/doi.org\/10.1016\/j.cose.2018.12.018\">Our research<\/a> has found that others \u2013 even ones who use different passwords for each site \u2013 have a method of devising them, for instance basing them all on <a href=\"https:\/\/www.troyhunt.com\/science-of-password-selection\/\">a familiar phrase and making site-specific tweaks<\/a>.<\/p>\n<p>In all those cases, the people are creating weak passwords that are easily guessed \u2013 especially when up against automated password-cracking software that can test <a href=\"https:\/\/arstechnica.com\/information-technology\/2012\/12\/25-gpu-cluster-cracks-every-standard-windows-password-in-6-hours\/\">thousands of possibilities a second<\/a>. One reason for this weakness might well be their users\u2019 emotional connection to their preexisting password creation routine.<\/p>\n<p>Cybersecurity efforts often encourage people to choose stronger passwords, but rarely acknowledge the idea that people have this feeling of attachment. They focus on the measurable improvement in security without realizing they\u2019re trying to persuade people to switch to a <a href=\"https:\/\/theconversation.com\/choose-better-passwords-with-the-help-of-science-82361\">less personal method<\/a>.<\/p>\n<figure class=\"align-center zoomable\"><a href=\"https:\/\/images.theconversation.com\/files\/258244\/original\/file-20190211-174864-1esxtyw.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/258244\/original\/file-20190211-174864-1esxtyw.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/258244\/original\/file-20190211-174864-1esxtyw.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=487&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/258244\/original\/file-20190211-174864-1esxtyw.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=487&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/258244\/original\/file-20190211-174864-1esxtyw.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=487&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/258244\/original\/file-20190211-174864-1esxtyw.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=612&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/258244\/original\/file-20190211-174864-1esxtyw.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=612&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/258244\/original\/file-20190211-174864-1esxtyw.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=612&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><\/a><figcaption><span class=\"caption\">There\u2019s a better way to choose a secure password.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/xkcd.com\/936\/\">XKCD<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA<\/a><\/span><\/figcaption><\/figure>\n<h2>Insecure tendencies<\/h2>\n<p><a href=\"https:\/\/www.veridiumid.com\/blog\/new-study-confirms-passwords-are-weakest-link-in-security\/\">Passwords are key to cybersecurity<\/a> for people and companies. A single bad password can grant a hacker access to an <a href=\"https:\/\/www.nopsec.com\/weak-passwords-exploit\/\">entire network of computers and data-storage servers<\/a>.<\/p>\n<p>As a result, many computer systems <a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-002\">force users to create new passwords regularly<\/a> \u2013 say, every 30 or 45 days \u2013 and require every password to contain capital letters, numbers and punctuation characters even though <a href=\"https:\/\/nakedsecurity.sophos.com\/2016\/08\/18\/nists-new-password-rules-what-you-need-to-know\/\">federal experts advise against<\/a> both of these practices. Regularly requiring people to choose new passwords that are hard to remember leads to unfortunate side effects. People could <a href=\"https:\/\/www.pandasecurity.com\/mediacenter\/security\/password-reuse\/\">reuse a strong password<\/a> on several sites, or they could write down the new password \u2013 which is <a href=\"https:\/\/theconversation.com\/clean-up-your-cyber-hygiene-6-changes-to-make-in-the-new-year-108565\">safe only if you trust the other people<\/a> who have access where you store the record.<\/p>\n<p>Training people to create secure passwords <a href=\"https:\/\/www.cscan.org\/?page=openaccess&amp;eid=17&amp;id=289\">hasn\u2019t made much of a difference<\/a> to overall password security on the internet. People may <a href=\"https:\/\/www.pcworld.com\/article\/260453\/users_are_still_the_weakest_link.html\">not understand the risks<\/a> related to weak passwords \u2013 though some experts blame <a href=\"https:\/\/www.information-age.com\/employees-businesses-weakest-link-123470435\/\">character flaws<\/a>, <a href=\"https:\/\/www.cio.com\/article\/2372868\/enterprise-software\/stupid-users-are-so-stupid.html\">stupidity<\/a> or <a href=\"https:\/\/www.ghacks.net\/2018\/12\/16\/weak-passwords-2\/\">just plain indifference<\/a>.<\/p>\n<h2>The endowment effect<\/h2>\n<p><a href=\"https:\/\/doi.org\/10.1016\/j.cose.2018.12.018\">Our research<\/a> has identified another explanation for why people choose weak passwords: People feel that they own, and are emotionally attached to, the way they usually create passwords. In behavioral economics, this kind of response is called the <a href=\"https:\/\/dictionary.apa.org\/endowment-effect\">endowment effect<\/a>, in which people so <a href=\"https:\/\/www.businessinsider.com\/endowment-effect-why-people-overvalue-things-2016-4?r=US&amp;IR=T\">overvalue their existing possessions<\/a> that they <a href=\"http:\/\/doi.org\/10.1257\/jep.5.1.193\">don\u2019t want to exchange them for other items<\/a> \u2013 even if the new item is better or more valuable.<\/p>\n<figure class=\"align-right zoomable\"><a href=\"https:\/\/images.theconversation.com\/files\/258023\/original\/file-20190208-174864-11dkij6.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/258023\/original\/file-20190208-174864-11dkij6.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/258023\/original\/file-20190208-174864-11dkij6.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=873&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/258023\/original\/file-20190208-174864-11dkij6.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=873&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/258023\/original\/file-20190208-174864-11dkij6.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=873&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/258023\/original\/file-20190208-174864-11dkij6.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=1097&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/258023\/original\/file-20190208-174864-11dkij6.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=1097&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/258023\/original\/file-20190208-174864-11dkij6.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=1097&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><\/a><figcaption><span class=\"caption\">Seriously, it\u2019s time to replace this old clothes washer.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.shutterstock.com\/image-photo\/old-washing-machine-isolated-on-white-158573060\">Dja65\/Shutterstock.com<\/a><\/span><\/figcaption><\/figure>\n<p>The endowment effect is usually applied to physical goods \u2013 and may help explain why your grandmother doesn\u2019t want to get a new washing machine to replace her decades-old one. Our research suggests that the same psychological process influences how people contemplate their password creation routines.<\/p>\n<p>In our study, we asked 419 participants how they created their passwords. Many used something they already knew, such as a pet name or their own birthday. Others had developed a personal system. They might have a root password and then personalize it for every different site, use a pattern on the keyboard or make up a silly sentence.<\/p>\n<p>When we probed more deeply, we found that people felt a sense of ownership and personal pride about their password creation routine. One said \u201cI think my way is a good system.\u201d In addition, we found that they overvalued their own method and felt threatened by suggestions that it was flawed.<\/p>\n<p>We provided a scenario where \u201cTerry\u201d derides \u201cPat\u2019s\u201d password creation routine, and then asked people how they thought Pat would react. The most popular responses were: becoming defensive, avoiding the conversation or withdrawing from it. All of these suggest that a critique of a personal password routine was perceived as an attack or a threat.<\/p>\n<p>These answers we found lined up perfectly with the endowment effect, including finding that the participants labored under the illusion that their passwords provided more protection than they actually did.<\/p>\n<h2>More than just a habit<\/h2>\n<p>The attachment people feel to their password-choosing method is more than just a habit. Psychologically speaking, a habit is a <a href=\"https:\/\/charlesduhigg.com\/the-power-of-habit\/\">behavior cued by an event<\/a> or an item in the environment \u2013 like brushing teeth before bed, washing hands before meals or switching off lights when leaving a room. They\u2019re often nearly automatic, and don\u2019t require a deliberate decision or much thought. Something that\u2019s a habit seems to occur naturally, without any deliberate decision triggering its activation.<\/p>\n<p>Choosing a password is different. It always requires deliberate and effortful cognition. That\u2019s what brings the endowment effect into play. Cybersecurity training programs should include information not only about <a href=\"https:\/\/theintercept.com\/2015\/03\/26\/passphrases-can-memorize-attackers-cant-guess\/\">how to choose<\/a> more secure passwords, but also should acknowledge that users may feel a sense of loss about the change.<\/p>\n<p>People won\u2019t pick stronger passwords just because they\u2019re asked to. If they feel their existing methods are being treated with disdain, they might perceive that as a personal attack, and become even less likely to adopt more secure practices.<\/p>\n<p>Instead, security experts should find ways to minimize users\u2019 sense of loss \u2013 and perhaps even encourage them to find a new emotional connection to a more secure method of choosing.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;\" src=\"https:\/\/counter.theconversation.com\/content\/110557\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: http:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><a href=\"https:\/\/theconversation.com\/profiles\/merrill-warkentin-570030\">Merrill Warkentin<\/a>, James J. Rouse Endowed Professor of Information Systems, <em><a href=\"http:\/\/theconversation.com\/institutions\/mississippi-state-university-1970\">Mississippi State University<\/a><\/em>; <a href=\"https:\/\/theconversation.com\/profiles\/karen-renaud-517005\">Karen Renaud<\/a>, Professor of Cybersecurity, <em><a href=\"http:\/\/theconversation.com\/institutions\/abertay-university-1525\">Abertay University<\/a><\/em>, and <a href=\"https:\/\/theconversation.com\/profiles\/robert-otondo-677452\">Robert Otondo<\/a>, Associate Professor of Information Systems, <em><a href=\"http:\/\/theconversation.com\/institutions\/mississippi-state-university-1970\">Mississippi State University<\/a><\/em><\/p>\n<p>This article is republished from <a href=\"http:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/a-secure-relationship-with-passwords-means-not-being-attached-to-how-you-pick-them-110557\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Merrill Warkentin, Mississippi State University; Karen Renaud, Abertay University, and Robert Otondo, Mississippi State University When you are asked to create a password \u2013 either for a new online account or resetting login information for an existing account \u2013 you\u2019re likely to choose a password you know you can remember. Many people use extremely basic [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":15377,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3410],"tags":[4327,612,5898,793,5795,2288],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/15383"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=15383"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/15383\/revisions"}],"predecessor-version":[{"id":15397,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/15383\/revisions\/15397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/15377"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=15383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=15383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=15383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}