Deception Task Design in Developer Password Studies: Exploring a Student Sample
Date: August 12 2018 Publication: Proceedings of the Fourteenth USENIX Symposium on Usable Privacy and Security (SOUPS '18) Page(s): 297 - 313 Publisher: USENIX Source 1: https://www.usenix.org/system/files/conference/soups2018/soups2018-naiakshina.pdf Abstract or Summary:
Studying developer behavior is a hot topic for usable security researchers. While the usable security community has ample experience and best-practice knowledge concerning the design of end-user studies, such knowledge is still lacking for developer studies. We know from end-user studies that task design and framing can have significant effects on the outcome of the study. To offer initial insights into these effects for developer research, we extended our previous password storage study [42]. We did so to examine the effects of deception studies with regard to developers. Our results show that there is a huge effect - only 2 out of the 20 nonprimed participants even attempted a secure solution, as compared to the 14 out of 20 for the primed participants. In this paper, we will discuss the duration of the task and contrast qualitative vs. quantitative research methods for future developer studies. In addition to these methodological contributions, we also provide further insights into why developers store passwords insecurely. PasswordResearch.com Note: Slides from presentation: https://www.usenix.org/sites/default/files/conference/protected-files/soups18_slides_danilova.pdf
Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.
<-- Back to Authentication Research Paper Index |