Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords

Daniel Mølmark-O’Connor, Emmanouil Vasilomanolakis

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

119 Downloads (Orbit)

Abstract

Passwords are still the most common authentication method for various digital services. The majority of the research into passwords is focused on technical concerns rather than the human elements of password construction. In this paper, we aim at studying cultural aspects of leaked passwords with the usage of an online game. In particular, we
introduce a novel web-based data collection tool utilizing gamification elements that benefits from appealing aesthetics and implemented narrative elements to engage users into prolonged play. The player’s role is to label presented passwords with available descriptive tags. Our goal is to collect a large number of gaming data to identify prevalent tag choices through consensus, and as such, assign perceived meaning to the passwords through the tags. An initial field test of the prototype returned a high number of responses that were determined to be valid when assessed via internal controls.
Original languageEnglish
Title of host publicationProceedings of Computer Security – ESORICS 2022
Volume13556
Publication date2022
Edition3
Pages743-748
ISBN (Print)978-3-031-17142-0
ISBN (Electronic)978-3-031-17143-7
DOIs
Publication statusPublished - 2022
Event27th European Symposium on Research in Computer Security - DGI Byen, Copenhagen, Denmark
Duration: 26 Sept 202230 Sept 2022
Conference number: 27
https://esorics2022.compute.dtu.dk/

Conference

Conference27th European Symposium on Research in Computer Security
Number27
LocationDGI Byen
Country/TerritoryDenmark
CityCopenhagen
Period26/09/202230/09/2022
Internet address

Fingerprint

Dive into the research topics of 'Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords'. Together they form a unique fingerprint.

Cite this