AN EXAMINATION OF STUDENTS PASSWORD SECURITY: CASE STUDY OF NALUT UNIVERSITY STUDENTS - LIBYA
Keywords:
Password, Password Security, Security Risks, University StudentsAbstract
University students comprise the largest segment of society utilizing modern technology, including computers and smartphones. To ensure the security and integrity of information, students must adhere to common protection methods for electronic authentication processes. This research aims to assess the awareness level of password policies among students at Nalut University. Quantitative method used for a questionnaire consisted of 539 students, with an average age ranging between 18 and 20 years, selected from a total of 2177 students. The questionnaire data were analyzed using the statistical analysis program SPSS, version 26. The study results revealed a low level of awareness among Nalut University students, with only 49.8% demonstrating awareness of password policies. Furthermore, a statistically significant relationship was found between gender and password policy among university students, with a p-value of 0.01.
References
Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46.
Bashear, E.A. 2019. The Degree of Using Smartphones by Jordanian Private Universities Students in Teaching on Quality Criteria. MIDDLE EAST UNIVERSITY. Master Thesis.
Bonneau, J. (2012, May). The science of guessing: analyzing an anonymized corpus of 70 million passwords. In 2012 IEEE symposium on security and privacy (pp. 538-552). IEEE.
Brown, A. S., Bracken, E., Zoccoli, S., & Douglas, K. (2004). Generating and remembering passwords. Applied Cognitive Psychology: The Official Journal of the Society for Applied Research in Memory and Cognition, 18(6), 641-651.
Carnavalet, X. D. C. D., & Mannan, M. (2015). A large-scale evaluation of high-impact password strength meters. ACM Transactions on Information and System Security (TISSEC), 18(1), 1-32.
Dell'Amico, M., Michiardi, P., & Roudier, Y. (2010, March). Password strength: An empirical analysis. In 2010 Proceedings IEEE INFOCOM (pp. 1-9). IEEE.
Florêncio, D., & Herley, C. (2010, July). Where do security policies come from?. In Proceedings of the Sixth Symposium on Usable Privacy and Security (pp. 1-14).
Florencio, D., & Herley, C. (2007, May). A large-scale study of web password habits. In Proceedings of the 16th international conference on World Wide Web (pp. 657-666).
Gaw, S., & Felten, E. W. (2006, July). Password management strategies for online accounts. In Proceedings of the second symposium on Usable privacy and security (pp. 44-55).)
Mazurek, M. L., Komanduri, S., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., & Ur, B. (2013, November). Measuring password guess ability for an entire university. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (pp. 173-186).
Malone, D., & Maher, K. (2012, April). Investigating the distribution of password choices. In Proceedings of the 21st international conference on World Wide Web (pp. 301-310).
Notoatmodjo, G., & Thomborson, C. D. (2009, January). Passwords and Perceptions. In AISC (Vol. 9, pp. 71-78).
Quermann, N., Harbach, M., & Dürmuth, M. (2018). The state of user authentication in the wild. WAY, 18.
Seitz, T., Hartmann, M., Pfab, J., & Souque, S. (2017, May). Do differences in password policies prevent password reuse?. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2056-2063).
Juwel, R., & Gutierrez, L., & John., O. (2021). Quantitative Methods. 10.1007/978-3-319-31816-5_460-1.
Szasz, A., & Kiss, G. (2018). Multimedia password retrieval programs in information security education. JOURNAL OF APPLIED MULTIMEDIA, 13(3), 87-96.
Taneski, V., Heričko, M., & Brumen, B. (2019). Systematic overview of password security problems. Acta Polytechnica Hungarica, 16(3), 143-165.
Ur, B., Noma, F., Bees, J., Segreti, S. M., Shay, R., Bauer, L., ... & Cranor, L. F. (2015). " I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab. In Eleventh symposium on usable privacy and security (SOUPS 2015) (pp. 123-140).
Venkadesh, S., & Palanivel, K. (2015). A survey on password stealing attacks and its protecting mechanism. International Journal of Engineering Trends and Technology (IJETT), 19(4).
Wash, R., Rader, E., Berman, R., & Wellmer, Z. (2016). Understanding password choices: How frequently entered passwords are re-used across websites. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) (pp. 175-188).
Wiefling, S., Jørgensen, P. R., Thunem, S., & Iacono, L. L. (2022). Pump up password security! Evaluating and enhancing risk-based authentication on a real-worldlarge-scale online service. ACM Transactions on Privacy and Security, 26(1), 1-36.
Zviran, M., & Haga, W. J. (1999). Password security: an empirical study. Journal of Management Information Systems, 15(4), 161-185.
Downloads
Published
Issue
Section
License
Copyright (c) -1 Al -Jerbie Saida Issa, Jernaz Riad Suliman (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.