How Students Deal With Password Security: Case Study of Nalut University Students

  • Saida Issa Al-Jerbie Faculty of education/ Nalut, Nalut University, Libya Computer Department
  • Riad Suliman Jernaz Faculty of education/ Nalut, Nalut University, Libya Computer Department
  • Ekram Askar Faculty of education/ Nalut, Nalut University, Libya Computer Department
  • Doa Benhamed Faculty of education/ Nalut, Nalut University, Libya Computer Department
  • Zahra Kamis Faculty of education/ Nalut, Nalut University, Libya Computer Department
  • Salsabill OunAllah Faculty of education/ Nalut, Nalut University, Libya Computer Department
Keywords: Password, password security, security risks, university students

Abstract

University students are the largest segment of society that uses modern technology, represented by computers and smart phones, and to ensure the security and integrity of information, students must consider the most common protection methods for conducting the electronic authentication process. This research seeks to evaluate the extent of awareness of Nalut University students about password policies. The size of the study sample was (539) students, and the average age of the sample was (between 18 and 20 years) out of 2177 students. The questionnaire was analyzed using the statistical analysis program SPSS, version (26). The results of the study showed that the level of awareness among Nalut University students was low, as their percentage was 49.8%. It was found that there is a relationship between gender and password policy among university students, where the p value was = 0.01.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

1. Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46.
2. Bashear, E.A. 2019. The Degree of Using Smartphones by Jordanian Private Universities Students in Teaching on Quality Criteria. MIDDLE EAST UNIVERSITY. Master Thesis.
3. Brown, A. S., Bracken, E., Zoccoli, S., & Douglas, K. (2004). Generating and remembering passwords. Applied Cognitive Psychology: The Official Journal of the Society for Applied Research in Memory and Cognition, 18(6), 641-651.
4. Carnavalet, X. D. C. D., & Mannan, M. (2015). A large-scale evaluation of high-impact password strength meters. ACM Transactions on Information and System Security (TISSEC), 18(1), 1-32.
5. Dell'Amico, M., Michiardi, P., & Roudier, Y. (2010, March). Password strength: An empirical analysis. In 2010 Proceedings IEEE INFOCOM (pp. 1-9). IEEE.‏
6. Florêncio, D., & Herley, C. (2010, July). Where do security policies come from?. In Proceedings of the Sixth Symposium on Usable Privacy and Security (pp. 1-14).‏
7. Florencio, D., & Herley, C. (2007, May). A large-scale study of web password habits. In Proceedings of the 16th international conference on World Wide Web (pp. 657-666).‏
8. Gaw, S., & Felten, E. W. (2006, July). Password management strategies for online accounts. In Proceedings of the second symposium on Usable privacy and security (pp. 44-55).)
9. Mazurek, M. L., Komanduri, S., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., ... & Ur, B. (2013, November). Measuring password guess ability for an entire university. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (pp. 173-186).
10. Malone, D., & Maher, K. (2012, April). Investigating the distribution of password choices. In Proceedings of the 21st international conference on World Wide Web (pp. 301-310).‏
11. Notoatmodjo, G., & Thomborson, C. D. (2009, January). Passwords and Perceptions. In AISC (Vol. 9, pp. 71-78).
12. Quermann, N., Harbach, M., & Dürmuth, M. (2018). The state of user authentication in the wild. WAY, 18.‏
13. Seitz, T., Hartmann, M., Pfab, J., & Souque, S. (2017, May). Do differences in password policies prevent password reuse?. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2056-2063).‏
14. Szasz, A., & Kiss, G. (2018). Multimedia password retrieval programs in information security education. JOURNAL OF APPLIED MULTIMEDIA, 13(3), 87-96.
15. Taneski, V., Heričko, M., & Brumen, B. (2019). Systematic overview of password security problems. Acta Polytechnica Hungarica, 16(3), 143-165.
16. Ur, B., Noma, F., Bees, J., Segreti, S. M., Shay, R., Bauer, L., ... & Cranor, L. F. (2015). " I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab. In Eleventh symposium on usable privacy and security (SOUPS 2015) (pp. 123-140).
17. Venkadesh, S., & Palanivel, K. (2015). A survey on password stealing attacks and its protecting mechanism. International Journal of Engineering Trends and Technology (IJETT), 19(4).
18. Wash, R., Rader, E., Berman, R., & Wellmer, Z. (2016). Understanding password choices: How frequently entered passwords are re-used across websites. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) (pp. 175-188).
19. Wiefling, S., Jørgensen, P. R., Thunem, S., & Iacono, L. L. (2022). Pump up password security! Evaluating and enhancing risk-based authentication on a real-world large-scale online service. ACM Transactions on Privacy and Security, 26(1), 1-36.‏
20. Zviran, M., & Haga, W. J. (1999). Password security: an empirical study. Journal of Management Information Systems, 15(4), 161-185.‏
Published
2024-04-18
How to Cite
Al-Jerbie, S. I., Jernaz, R. S., Askar, E., Benhamed, D., Kamis, Z., & OunAllah, S. (2024). How Students Deal With Password Security: Case Study of Nalut University Students. European Scientific Journal, ESJ, 28, 505. Retrieved from https://eujournal.org/index.php/esj/article/view/18045
Section
ESI Preprints