Effect of Mental State and Personality on Password Selection Among Mobile Phone Users: A Case Study of IBB University Lapai Students

Abdullahi Abubakar Kawu*, Idris Muhammad**, Aisha Awal***, Muhammad Bashir Abdullahi****
*,*** Lecturer, Department of Computer Science, Ibrahim Badamasi Babangida University, Lapai, Nigeria.
** Undergraduate Student, Computer Science, Ibrahim Badamasi Babangida University, Lapai, Nigeria.
**** Lectures, Department of Computer Science, Federal University of Technology, Minna.
Periodicity:July - December'2018
DOI : https://doi.org/10.26634/jmt.5.2.15630

Abstract

There is a paucity of research that examine the psychological state of mobile phone users while creating passwords, and how it affects the choice of strong and weak passwords. In this paper, we examine how a user’s mental state and personality affects choice of user’s password. Therefore, we use two groups: experimental and control, each of 16 subjects, who were asked to generate a password. At the beginning, all participants used the BMIS and the BFI tools to self-report their mental state of mind and personality, respectively. Then, we exert mental fatigue on participants in the experimental group while those of other group were not. At the end of the experiment, we measure and compare password strength across groups. Our findings reveal that the effect of the different mental states on password over our limited sample size is not so different, although more mentally fatigued users tend to create weaker passwords than others do. Further, we demonstrate that a relationship exists, nonetheless, as indicated by our regression model. We also investigated personality and its implication on password strength, the study reveals that participants who report as agreeable are more likely to create better passwords than conscientious participants or extraverts.

Keywords

password; ubiquitious security; personality trait; HCI

How to Cite this Article?

Kawu, A. A., Muhammad, I., Awal, A., & Abdullahi, M. B. (2018). Effect of Mental State and Personality on Password Selection Among Mobile Phone Users: A Case Study of IBB University Lapai Students. i-manager’s Journal on Mobile Applications and Technologies, 5(2), 29-36. https://doi.org/10.26634/jmt.5.2.15630

References

[1]. Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46.
[2]. Baumeister, R. F., Vohs, K. D., & Tice, D. M. (2007). The strength model of self-control. Current Directions in Psychological Science, 16(6), 351-355.
[3]. Brady,W & Bavel, J. V. (2018). Inducing Emotions. In Social Psychology. Retrieved from https://www.jove.com/ science-education-library/30/ social-psychology.
[4]. Bryant, K., & Campbell, J. (2006). User behaviours associated with password security and management. Australasian Journal of Information Systems, 14(1), 81-100.
[5]. Chiasson, S., van Oorschot, P. C., & Biddle, R. (2006). A Usability Study and Critique of Two Password Managers. In USENIX Security Symposium (Vol. 15, pp. 1-16).
[6]. Florencio, D., & Herley, C. (2007). A large-scale study of web password habits. In Proceedings of the 16 international conference on World Wide Web (pp. 657- 666).
[7]. Gollmann, D. (2010). Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), 544-554.
[8]. Gross, T., Coopamootoo, K. P., Al-Jabri, A.(2016). Effect of Cognitive Effort on Password Choice. In Twelfth Symposium on Usable Privacy and Security (pp. 55-66).
[9]. Hartley, L. R., Penna, F., Corry, A., & Feyer, A. M. (1997). Comprehensive Review of Fatigue Research. Murdoch University, Institute for Research in Safety & Transport.
[10]. John, O. P., & Srivastava, S. (1999). The Big Five trait taxonomy: History, measurement, and theoretical perspectives. Handbook of Personality: Theory and Research, 2(1999), 102-138. New York: Guilford Press.
[11]. Lerner, J. S., Small, D. A., & Loewenstein, G. (2004). Heart strings and purse strings: Carryover effects of emotions on economic decisions. Psychological Science, 15(5), 337-341.
[12]. MacLeod, C. M. (2015). The stroop effect. Encyclopedia of Color Science and Technology. Berlin: Springer.
[13]. Muraven, M., Tice, D. M., & Baumeister, R. F. (1998). Self-control as a limited resource: Regulatory depletion patterns. Journal of Personality and Social Psychology, 74(3), 774-789.
[14]. Rammstedt, B., & John, O. P. (2007). Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German. Journal of Research in Personality, 41(1), 203-212.
[15]. Rauch, W., & Schmitt, K. (2009). Fatigue of cognitive control in the stroop-task. In Proceedings of the Annual Meeting of the Cognitive Science Society (Vol. 31, No. 31). pp. 750-755, 2009.
[16]. Reichl, D. (2018). Password Quality Estimation. In KeePass.info. Retrieved from https://keepass.info/help/kb/ pw_quality_est.html
[17]. Stobert, E., & Biddle, R. (2014). The Password Life th Cycle: User Behaviour in Managing Passwords. In 10 Symposium on Usable Privacy and Security. pp. 243-255.
[18]. Watson, D., Clark, L. A., & Tellegen, A. (1988). Development and validation of brief measures of positive and negative affect: the PANAS scales. Journal of Personality and Social Psychology, 54(6), 1063- 1070.
[19]. Wegner, D. M., Schneider, D. J., Carter, S. R., & White, T. L. (1987). Paradoxical effects of thought suppression. Journal of Personality and Social Psychology, 53(1), 5-13.
[20]. Wheeler, D. L. (2016). zxcvbn: Low-Budget Password Strength Estimation. In USENIX Security Symposium (pp. 157- 173).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.