3,475
Views
89
CrossRef citations to date
0
Altmetric
Information security

The psychology of password management: a tradeoff between security and convenience

, &
Pages 233-244 | Received 15 Oct 2008, Accepted 12 Jun 2009, Published online: 31 Jul 2009

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (10)

Naomi Woods & Johanna Silvennoinen. (2023) Enhancing the user authentication process with colour memory cues. Behaviour & Information Technology 42:10, pages 1548-1567.
Read now
Burak Merdenyan & Helen Petrie. (2022) Two studies of the perceptions of risk, benefits and likelihood of undertaking password management behaviours. Behaviour & Information Technology 41:12, pages 2514-2527.
Read now
Mahdi Nasrullah Al-Ameen, Sonali T. Marne, Kanis Fatema, Matthew Wright & Shannon Scielzo. (2022) On improving the memorability of system-assigned recognition-based passwords. Behaviour & Information Technology 41:5, pages 1115-1131.
Read now
Jiaxin Zhang & Yan Luximon. (2021) A quantitative diary study of perceptions of security in mobile payment transactions. Behaviour & Information Technology 40:15, pages 1579-1602.
Read now
Mingchuan Gong, Lingling Yu & Adeel Luqman. (2020) Understanding the formation mechanism of mobile social networking site addiction: evidence from WeChat users. Behaviour & Information Technology 39:11, pages 1176-1191.
Read now
Tatyana Ryutov, Nicole Sintov, Mengtian Zhao & Richard S. John. (2017) Predicting information security policy compliance intentions and behavior for six employee-based risks. Journal of Information Privacy and Security 13:4, pages 260-281.
Read now
Mona A. Mohamed, Joyram Chakraborty & Josh Dehlinger. (2017) Trading off usability and security in user interface design through mental models. Behaviour & Information Technology 36:5, pages 493-516.
Read now
Jeffrey L. Jenkins, Mark Grimes, Jeffrey Gainer Proudfoot & Paul Benjamin Lowry. (2014) Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals. Information Technology for Development 20:2, pages 196-213.
Read now
M. Sadiq Sohail & Ibrahim M. Al-Jabri. (2014) Attitudes towards mobile banking: are there any differences between users and non-users?. Behaviour & Information Technology 33:4, pages 335-344.
Read now
John Campbell, Wanli Ma & Dale Kleeman. (2011) Impact of restrictive composition policy on user password choices. Behaviour & Information Technology 30:3, pages 379-388.
Read now

Articles from other publishers (79)

Naomi Woods & Mikko Siponen. (2024) How memory anxiety can influence password security behavior. Computers & Security 137, pages 103589.
Crossref
Assumpta Ezugwu, Elochukwu Ukwandu, Celestine Ugwu, Modesta Ezema, Comfort Olebara, Juliana Ndunagu, Lizzy Ofusori & Uchenna Ome. (2023) Password-based authentication and the experiences of end users. Scientific African 21, pages e01743.
Crossref
Ashraf Mady, Saurabh Gupta & Merrill Warkentin. (2023) The effects of knowledge mechanisms on employees' information security threat construal. Information Systems Journal 33:4, pages 790-841.
Crossref
Timothy McIntosh, A.S.M. Kayes, Yi-Ping Phoebe Chen, Alex Ng & Paul Watters. (2023) Applying staged event-driven access control to combat ransomware. Computers & Security 128, pages 103160.
Crossref
Saqib Saeed. (2023) Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia. Sustainability 15:7, pages 6019.
Crossref
Javaid Iqbal, Saira Hanif Soroya & Khalid Mahmood. (2023) Financial information security behavior in online banking. Information Development, pages 026666692211493.
Crossref
Yee-Yin Choong, Kerrianne Buchanan & Olivia Williams. 2023. HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust 29 48 .
Joshua Stassen, Ali Pirannejad & Kenny Meesters. 2023. Information Technology in Disaster Risk Reduction. Information Technology in Disaster Risk Reduction 215 229 .
Mohammed Aziz Al Kabir & Wael Elmedany. (2022) An Overview of the Present and Future of User Authentication. An Overview of the Present and Future of User Authentication.
Dedipyaman Das, Sibi Chakkaravarthy Sethuraman & Suresh Chandra Satapathy. (2022) A decentralized open web cryptographic standard. Computers and Electrical Engineering 99, pages 107751.
Crossref
Carlos Tam, Carolina de Matos Conceição & Tiago Oliveira. (2022) What influences employees to follow security policies?. Safety Science 147, pages 105595.
Crossref
Md. Mahmudur Rahman, Shahadat Hossain, Mimun Barid & Md. Manzurul Hasan. 2022. Intelligent Computing & Optimization. Intelligent Computing & Optimization 331 340 .
Marthie Grobler, M. A. P. Chamikara, Jacob Abbott, Jongkil Jay Jeong, Surya Nepal & Cecile Paris. (2020) The importance of social identity on password formulations. Personal and Ubiquitous Computing 25:5, pages 813-827.
Crossref
Svetlana Abramova, Artemij Voskobojnikov, Konstantin Beznosov & Rainer Böhme. (2021) Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users. Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users.
Marthie Grobler, Raj Gaire & Surya Nepal. (2021) User, Usage and Usability: Redefining Human Centric Cyber Security. Frontiers in Big Data 4.
Crossref
Rah Utami Nugrahani & Nabsiah Abdul Wahid. (2021) Technology Acceptance Model and Motivation-Opportunity-Ability Theory Influences on Indonesian Dota2 Gamer Customer to Customer Online Know-How Exchange. Journal of Physics: Conference Series 1779:1, pages 012003.
Crossref
Nelson Duarte, Nuno Coelho & Teresa Guarda. 2021. Advanced Research in Technologies, Information, Innovation and Sustainability. Advanced Research in Technologies, Information, Innovation and Sustainability 474 483 .
Polina Evtimova & James Nicholson. 2021. Human-Computer Interaction – INTERACT 2021. Human-Computer Interaction – INTERACT 2021 213 222 .
Paul Brockbanks & Martin J. Butler. 2021. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance 211 222 .
Maurice Dawson & Annamaria Szakonyi. (2020) Cybersecurity Education to Create Awareness in Artificial Intelligence Applications for Developers and End Users. Scientific Bulletin 25:2, pages 85-92.
Crossref
Rock Stevens, Josiah Dykstra, Wendy Knox Everette & Michelle L. Mazurek. (2020) It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs. IEEE Security & Privacy 18:6, pages 51-58.
Crossref
Boštjan Brumen. (2020) System-Assigned Passwords: The Disadvantages of the Strict Password Management Policies. Informatica, pages 459-479.
Crossref
Michael Stainbrook & Nicholas Caporusso. 2020. Advances in Human Factors in Cybersecurity. Advances in Human Factors in Cybersecurity 87 96 .
Thaier Fandakly & Nicholas Caporusso. 2020. Advances in Human Factors in Cybersecurity. Advances in Human Factors in Cybersecurity 48 58 .
Philip Kortum & Claudia Ziegler Acemyan. (2019) An examination of the effort hypothesis for the perceived strength of passwords. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63:1, pages 1291-1295.
Crossref
Sarah Kusumastuti, Heather Rosoff & Richard S. John. (2019) Characterizing Conflicting User Values for Cyber Authentication Using a Virtual Public Values Forum. Decision Analysis 16:3, pages 157-171.
Crossref
Karlos Luna. (2019) If it is easy to remember, then it is not secure: Metacognitive beliefs affect password selection. Applied Cognitive Psychology 33:5, pages 744-758.
Crossref
Naomi Woods & Mikko Siponen. (2019) Improving password memorability, while not inconveniencing the user. International Journal of Human-Computer Studies 128, pages 61-71.
Crossref
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Cyber Law, Privacy, and Security. Cyber Law, Privacy, and Security 20 37 .
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. National Security. National Security 60 77 .
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Multigenerational Online Behavior and Media Use. Multigenerational Online Behavior and Media Use 407 424 .
Xiang Michelle Liu. 2019. Analyzing Human Behavior in Cyberspace. Analyzing Human Behavior in Cyberspace 192 208 .
Michael Stainbrook & Nicholas Caporusso. 2019. Advances in Human Factors in Cybersecurity. Advances in Human Factors in Cybersecurity 23 32 .
Zhang Min. 2019. Simulation Tools and Techniques. Simulation Tools and Techniques 353 362 .
Burak Merdenyan & Helen Petrie. 2019. Human-Computer Interaction – INTERACT 2019. Human-Computer Interaction – INTERACT 2019 549 563 .
Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto & Youki Kadobayashi. (2018) A comparative study of smartphone-user security perception and preference towards redesigned security notifications. A comparative study of smartphone-user security perception and preference towards redesigned security notifications.
Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic & Kévin Huguenin. (2018) Towards Usable Checksums. Towards Usable Checksums.
Rika Butler & Martin Butler. (2018) Some password users are more equal than others: Towards customisation of online security initiatives. SA Journal of Information Management 20:1.
Crossref
Burak Merdenyan & Helen Petrie. Generational Differences in Password Management Behaviour. Generational Differences in Password Management Behaviour.
Shipi Kankane, Carlina DiRusso & Christen Buckley. (2018) Can We Nudge Users Toward Better Password Management?. Can We Nudge Users Toward Better Password Management?.
Lila A. Loos & Martha E. Crosby. 2018. Augmented Cognition: Users and Contexts. Augmented Cognition: Users and Contexts 117 132 .
Javier Galbally, Iwen Coisel & Ignacio Sanchez. (2017) A New Multimodal Approach for Password Strength Estimation—Part II: Experimental Evaluation. IEEE Transactions on Information Forensics and Security 12:12, pages 2845-2860.
Crossref
France Bélanger, Stéphane Collignon, Kathryn Enget & Eric Negangard. (2017) Determinants of early conformance with information security policies. Information & Management 54:7, pages 887-901.
Crossref
Samantha Bordoff, Quan Chen & Zheng Yan. (2017) Cyber Attacks, Contributing Factors, and Tackling Strategies. International Journal of Cyber Behavior, Psychology and Learning 7:4, pages 68-82.
Crossref
Chongyang Chen, Kem Z.K. Zhang, Xiang Gong, Sesia J. Zhao, Matthew K.O. Lee & Liang Liang. (2017) Understanding compulsive smartphone use: An empirical test of a flow-based model. International Journal of Information Management 37:5, pages 438-454.
Crossref
Karen Renaud & Verena Zimmerman. (2017) Enriched nudges lead to stronger password replacements … but implement mindfully. Enriched nudges lead to stronger password replacements … but implement mindfully.
Václav Šimandl & Jiří Vaníček. (2017) Influences on ICT teachers knowledge and routines in a technical e-safety context. Telematics and Informatics.
Crossref
Saja Althubaiti. (2017) Improving the Design and Usability of Password Creation Systems. Improving the Design and Usability of Password Creation Systems.
Debora Jeske & Paul van Schaik. (2017) Familiarity with Internet threats: Beyond awareness. Computers & Security 66, pages 129-141.
Crossref
Mark A. Will, Jeffery Garae, Yu Shyang Tan, Craig Scoon & Ryan K.L. Ko. (2017) Returning Control of Data to Users with a Personal Information Crunch - A Position Paper. Returning Control of Data to Users with a Personal Information Crunch - A Position Paper.
Saja Althubaiti & Helen Petrie. Instructions for Creating Passwords: How do They Help in Password Creation. Instructions for Creating Passwords: How do They Help in Password Creation.
Bostjan Brumen, Renato Ivancic & Ivan Rozman. (2016) A comparison of password management policies. A comparison of password management policies.
Francois Mouton, Louise Leenen & H.S. Venter. (2016) Social engineering attack examples, templates and scenarios. Computers & Security 59, pages 186-209.
Crossref
Kenneth D. Nguyen, Heather Rosoff & Richard S. John. (2016) The effects of attacker identity and individual user characteristics on the value of information privacy. Computers in Human Behavior 55, pages 372-383.
Crossref
Helen Petrie & Burak Merdenyan. (2016) Cultural and Gender Differences in Password Behaviors. Cultural and Gender Differences in Password Behaviors.
L. Jean Camp, Jacob Abbott & Siyu Chen. (2016) CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication.
Kirsten E. Richards & Anthony F. Norcio. 2016. Advances in Human Factors in Cybersecurity. Advances in Human Factors in Cybersecurity 305 312 .
Thang Hoang, Deokjai Choi & Thuc Nguyen. (2015) Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. International Journal of Information Security 14:6, pages 549-560.
Crossref
Martin Butler & Rika Butler. (2015) Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking. Information & Computer Security 23:4, pages 421-434.
Crossref
Pam Briggs & Lisa Thomas. (2015) An Inclusive, Value Sensitive Design Perspective on Future Identity Technologies. ACM Transactions on Computer-Human Interaction 22:5, pages 1-28.
Crossref
Rika Butler & Martin Butler. (2015) The password practices applied by South African online consumers: Perception versus reality. SA Journal of Information Management 17:1.
Crossref
Kathryn Parsons, Agata McCormac, Malcolm Pattinson, Marcus Butavicius & Cate Jerram. (2015) The design of phishing studies: Challenges for researchers. Computers & Security 52, pages 194-206.
Crossref
Katharina Krombholz, Heidelinde Hobel, Markus Huber & Edgar Weippl. (2015) Advanced social engineering attacks. Journal of Information Security and Applications 22, pages 113-122.
Crossref
Bostjan Brumen & Viktor Taneski. (2015) Moore's curse on textual passwords. Moore's curse on textual passwords.
Monica WhittyJames DoodsonSadie CreeseDuncan Hodges. (2015) Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords. Cyberpsychology, Behavior, and Social Networking 18:1, pages 3-7.
Crossref
Gráinne Kirwan. 2015. The Cloud Security Ecosystem. The Cloud Security Ecosystem 269 281 .
Norliza Katuk, Hatim Mohamad Tahir, Nur Haryani Zakaria & Mohamad Subri Halim. 2015. Pattern Analysis, Intelligent Security and the Internet of Things. Pattern Analysis, Intelligent Security and the Internet of Things 85 93 .
Michael Bachmann. (2014) Passwords are Dead: Alternative Authentication Methods. Passwords are Dead: Alternative Authentication Methods.
Rob Jenkins, Jane L. McLachlan & Karen Renaud. (2014) Facelock: familiarity-based graphical authentication. PeerJ 2, pages e444.
Crossref
B. Brumen & A. Cernezel. (2014) Brute force analysis of PsychoPass-generated Passwords. Brute force analysis of PsychoPass-generated Passwords.
Viktor Taneski, Marjan Hericko & Bostjan Brumen. (2014) Password security — No change in 35 years?. Password security — No change in 35 years?.
Karen Renaud, Melanie Volkamer & Joseph Maguire. 2014. Human Aspects of Information Security, Privacy, and Trust. Human Aspects of Information Security, Privacy, and Trust 183 194 .
Katharina Krombholz, Heidelinde Hobel, Markus Huber & Edgar Weippl. (2013) Social engineering attacks on the knowledge worker. Social engineering attacks on the knowledge worker.
Shu-Chiung Lin, David C. Yen, Patrick S. Chen & Wei-Kuo Lin. (2013) Coding behavior of authentication code on the internet. Computers in Human Behavior 29:5, pages 2090-2099.
Crossref
Norliza Katuk, Mohamad Subri Halim, Hatim Mohd. Tahir, Amran Ahmad & Sharmila Mat Yusof. (2013) Behavioral Analysis of Students? Login Credentials Management in Mobile Environment. Journal of Industrial and Intelligent Information 1:3, pages 132-138.
Crossref
Sadie Creese, Duncan Hodges, Sue Jamison-Powell & Monica Whitty. 2013. Human Aspects of Information Security, Privacy, and Trust. Human Aspects of Information Security, Privacy, and Trust 80 89 .
Kathryn Parsons, Agata McCormac, Malcolm Pattinson, Marcus Butavicius & Cate Jerram. 2013. Security and Privacy Protection in Information Processing Systems. Security and Privacy Protection in Information Processing Systems 366 378 .
Gráinne Kirwan & Andrew PowerGráinne Kirwan & Andrew Power. 2012. The Psychology of Cyber Crime. The Psychology of Cyber Crime 94 112 .
Kirsi Helkala. (2011) Password Education Based on Guidelines Tailored to Different Password Categories. Journal of Computers 6:5.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.