To read this content please select one of the options below:

Comparing experts’ and users’ perspectives on the use of password workarounds and the risk of data breaches

Michael J. Rooney (College of Computing and Engineering, Nova Southeastern University – Fort Lauderdale/Davie Campus, Fort Lauderdale, Florida, USA)
Yair Levy (College of Computing and Engineering, Nova Southeastern University – Fort Lauderdale/Davie Campus, Fort Lauderdale, Florida, USA)
Wei Li (College of Computing and Engineering, Nova Southeastern University – Fort Lauderdale/Davie Campus, Fort Lauderdale, Florida, USA)
Ajoy Kumar (College of Computing and Engineering, Nova Southeastern University – Fort Lauderdale/Davie Campus, Fort Lauderdale, Florida, USA)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 16 July 2024

171

Abstract

Purpose

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as “password workarounds” or “shadow security.” These deviant password behaviors can put individuals and organizations at risk, resulting in a data breach. This paper aims to engage IS users and Subject Matter Experts (SMEs), focused on designing, developing and empirically validating the Password Workaround Cybersecurity Risk Taxonomy (PaWoCyRiT) – a 2x2 taxonomy constructed by aggregated scores of perceived cybersecurity risks from Password Workarounds (PWWAs) techniques and their usage frequency.

Design/methodology/approach

This research study was a developmental design conducted in three phases using qualitative and quantitative methods: (1) A set of 10 PWWAs that were identified from the literature were validated by SMEs along with their perspectives on the PWWAs usage and risk for data breach; (2) A pilot study was conducted to ensure reliability and validity and identify if any measurement issues would have hindered the results and (3) The main study data collection was conducted with a large group of IS users, where also they reported on coworkers' engagement frequencies related to the PWWAs.

Findings

The results indicate that statistically significant differences were found between SMEs and IS users in their aggregated perceptions of risks of the PWWAs in causing a data breach, with IS users perceiving higher risks. Engagement patterns varied between the two groups, as well as factors like years of IS experience, gender and job level had statistically significant differences among groups.

Practical implications

The PaWoCyRiT taxonomy that the we have developed and empirically validated is a handy tool for organizational cyber risk officers. The taxonomy provides organizations with a quantifiable means to assess and ultimately mitigate cybersecurity risks.

Social implications

Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. Thus, the taxonomy that the authors have developed and empirically validated provides broader implications for society, as it assists organizations in all industries with the ability to mitigate the risks of data breaches that can result from PWWAs.

Originality/value

The taxonomy the we have developed and validated, the PaWoCyRiT, provides organizations with insights into password-related risks and behaviors that may lead to data breaches.

Keywords

Citation

Rooney, M.J., Levy, Y., Li, W. and Kumar, A. (2024), "Comparing experts’ and users’ perspectives on the use of password workarounds and the risk of data breaches", Information and Computer Security, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/ICS-05-2024-0116

Publisher

:

Emerald Publishing Limited

Copyright © 2024, Emerald Publishing Limited

Related articles