DOI QR코드

DOI QR Code

A Case Study on Comparative Analysis of Four-digit Passwords Usage Type Before and After Using Smart phone

스마트폰 사용 전후 네 자리 숫자 비밀번호 사용형태에 관한 비교 연구

  • Moon, Soog-Kyung (Dept. of Marketing & Information Consulting, Mokwon University)
  • 문숙경 (목원대학교 마케팅정보컨설팅학과)
  • Received : 2018.10.10
  • Accepted : 2018.12.20
  • Published : 2018.12.31

Abstract

This paper deals with the comparative analysis the two surveys called term1, term2 by collecting 4-digit password data 1313 for 2006~2011 and 2519 for 2012~ 2017. Numbers lacking prudence were significantly reduced in the term2 survey and over time, the use of four digit PWs became increasingly prudent. There was a difference in the use of digit numbers between male and female. The top five types accounted over 60%, which imply that certain types of preferences are present. It was the outcome of this paper that we can indirectly deduce these facts. Studies such as reuse of four digit PWs in user's convenience will need to be supplemented in the near future.

본 논문은 국내에서 스마트폰을 본격적으로 사용하기 시작한 2012년부터 2017년, 6년간 2519개, 이전 2006년부터 2011년, 6년간 1313개의 네 자리 숫자 비밀번호 자료들을 수집하여 전, 후 두 조사 간 사용형태 등에 대한 비교 분석 내용을 다루고 있다. 전조사에서 후조사로 갈수록 네 자리 숫자 PW들의 사용에 신중을 기하고 있다는 것, 남녀 간 숫자 사용에 있어서 다소 차이가 존재한다는 것과 네 자리 숫자 사용 패튼에 있어서 두 조사 모두 5개의 특정 패튼이 차지하는 비율이 60% 이상을 차지하는 등 선호도가 존재한다는 사실 등을 분석결과 알 수 있었다. 자료수집이 불가능한 패스워드 분야에서 간접적으로라도 사용형태를 유추해볼 수 있게 한 것이 이 논문의 성과로 볼 수 있으며, 향후 사용자 입장에서의 재사용 등과 같은 연구가 보완되어질 필요가 있을 것으로 본다.

Keywords

Table 1. number of students and PWs

JKOHBZ_2018_v8n6_159_t0001.png 이미지

Table 2. Most common PWs (%)

JKOHBZ_2018_v8n6_159_t0002.png 이미지

Table 3. Frequency of each digits (%)

JKOHBZ_2018_v8n6_159_t0003.png 이미지

Table 4. Rate of Occurrences with Gender

JKOHBZ_2018_v8n6_159_t0004.png 이미지

Table 5. Output of Analysis with Gender

JKOHBZ_2018_v8n6_159_t0005.png 이미지

Table 6. Rate of Occurrences of each digits(%)

JKOHBZ_2018_v8n6_159_t0006.png 이미지

Table 7. Output of analysis in each position

JKOHBZ_2018_v8n6_159_t0007.png 이미지

Table 8. Analysis with gender in each position

JKOHBZ_2018_v8n6_159_t0008.png 이미지

Table 9. Output of analysis with gender

JKOHBZ_2018_v8n6_159_t0009.png 이미지

Table 10. Output of analysis with same gender

JKOHBZ_2018_v8n6_159_t0010.png 이미지

Table 11. Most common paired digits

JKOHBZ_2018_v8n6_159_t0011.png 이미지

Table 12. Common paired digits with male

JKOHBZ_2018_v8n6_159_t0012.png 이미지

Table 13. Common paired digits with female

JKOHBZ_2018_v8n6_159_t0013.png 이미지

Table 14. Most common paired digits

JKOHBZ_2018_v8n6_159_t0014.png 이미지

Table 15. Kinds of type

JKOHBZ_2018_v8n6_159_t0015.png 이미지

Table 16. Most common types (%)

JKOHBZ_2018_v8n6_159_t0016.png 이미지

Table 17. Output of analysis

JKOHBZ_2018_v8n6_159_t0017.png 이미지

References

  1. http://kosis.kr/statHtml/statHtml.do
  2. http://gallup.co.kr/gallupdb/gallupreport(20180808)
  3. S. Gaw & E. W. Felten.(2006). Password management strategies for online accounts, Proc Scoups, 44-55.
  4. W. J. Jang & H. W. Lee. (2010). Biometric One-Time Password Generation Mechanism and its Application on SIP Authentication. Journal of the Korea Convergence Society, 1(1), 93-100. https://doi.org/10.15207/JKCS.2010.1.1.093
  5. Y. C. Hwang, H. J. Mun & J. W. Lee. (2015). Face Recognition System Technologies for Authentication System- A Survey. Journal of Convergence for Information Technology, 5(3), 9-13. https://doi.org/10.22156/CS4SMB.2015.5.3.009
  6. H. J. Mun. (2018). Biometric Information and OTP based on Authentication Mechanism using Blockchain. Journal of Convergence for Information Technology, 8(3), 85-90. https://doi.org/10.22156/CS4SMB.2018.8.3.085
  7. R. Shay, S. Komanduri, P. G. Kelley, L. Bauer, P. G. Leon, N. Christin, M. L. Mazur & L. F. Cranor. (2010). Encountering stronger password requirements: User attitudes and behaviors. Symposium on Usable Privacy and Security(SOUPS), July, 14-16.
  8. V. Ashlee. (2010). Most common iPhone if your password is 123456, Just make it hackme, The New York Times, January 20.
  9. J. M. Seung, B. N. Noh & S. H. Ahn. (2006). A damage trend and responses to cope with the latest principal hacking, Korea Institute of Information Security & Cryptology, 16(1), 80-83.
  10. G. Beate & J. Hilary. (2011). Using and managing multiple passwords : A Week to a View. Interacting with Computers, 23, 256-267. https://doi.org/10.1016/j.intcom.2011.03.007
  11. A. S. Brown, E. Bracken, S. Zoccoli & K. Douglas. (2004). Generating and remembering passwords. Applied Cognitive Psychology, 18, 641-651. https://doi.org/10.1002/acp.1014
  12. S. K. Moon. (2013). An Empirical study on the analysis of the re-using of four-digit personal identification numbers -A university case. Journal of Digital Policy & Management, 11(10), 737-746.
  13. D. Amitay. (2011). Most common iPhone passcodes. http://amitay.us/blog/files/most_common_iphone_passcodes.php
  14. S. K. Moon. (2012). A study on the using pattern analysis of four-digit personal identification numbers -A university case, Journal of Digital Policy & Management, 10(10), 529-538.
  15. S. K. Moon. (2015). Comparisons of pattern analysis in using the four-digit personal identification numbers According to Sensitivity -A university case. Journal of Korean Institute of Intelligent System, 25(3), 229-235. https://doi.org/10.5391/JKIIS.2015.25.3.229