Abstract
Though much is known about how adults understand and use passwords, little research attention has been paid specifically to parents or, more importantly, to how parents are involved in their children’s password practices. To better understand both the password practices of parents, as well as how parents are involved in their children’s password practices, we conducted a survey study of 265 parents in the United States (US) with school-aged children (kindergarten through 12th grade, 5 to 18 years old). We asked parents about their general technology use, the kinds of technologies and password-protected accounts they have; how they make and maintain their passwords; and about how, if at all, they help their children create and maintain passwords. We found that parent password practices align with research surrounding adult password practices, and that parents, especially those of younger children, are very involved in the creation and maintenance of their children’s passwords. With these findings, we conclude with both recommendations for future research, as well as a call for the cybersecurity community to better support parents’ password understandings and practices so that parents can better support their children.
This material is based on work supported by the UMD and NIST Professional Research Experience Program (PREP) under Award Number 70NANB18H165.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Both parents and legal guardians are referred to as “parents” hereafter throughout the paper.
- 2.
- 3.
In cases in which the Chi Square test could not be run due to small cell sizes, Fisher’s exact tests were conducted. In some cases, p-values were simulated to ascertain statistical significance.
- 4.
Due to small cell sizes, “not important” and “neutral” items were combined for follow-up analysis. This yielded a significant Chi-Square χ2(2)=12.9, p<.01.
References
Abraham, M., Crabb, M., Radomirović, S.: “I’m doing the best I Can”: understanding technology literate older adults’ account management strategies. In: Parkin, S., Viganò, L. (eds.) STAST 2021. LNCS, vol. 13176, pp. 86–107. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-10183-0_5
Agresti, A.: An Introduction to Categorical Data Analysis, 3rd edn. Wiley, Hoboken (2018)
Bandura, A., Walters, R.H.: Social Learning Theory, vol. 1. Prentice Hall, Englewood Cliffs (1977)
Choong, Y.-Y., Theofanos, M.F., Renaud, K., Prior, S.: Passwords protect my stuff”—a study of children’s password practices. J. Cybersecur. 5(1), 19, Article no. tyz015 (2019). https://doi.org/10.1093/cybsec/tyz015
Das, A., Bonneau, J., Caesar, M., Borisov, N., Wang, X.F.: The tangled web of password reuse. In: NDSS 2014, vol. 2014, pp. 23–26 (2014). 15 pages
Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657–666 (2007)
Grassi, P.A., et al.: Digital identity guidelines: authentication and lifecycle management. Technical Report 800-63B, NIST Special Publication (2017). https://doi.org/10.6028/NIST.SP.800-63b
Hernández-Alava, M., Popli, G.: Children’s development and parental input: evidence from the UK millennium cohort study. Demography 54(2), 485–511 (2017). https://doi.org/10.1007/s13524-017-0554-6
Inglesant, P.G., Angela Sasse, M.: The true cost of unusable password policies: password use in the wild. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 383–392 (2010). https://doi.org/10.1145/1753326.1753384
Kawu, A.A., Orji, R., Awal, A., Gana, U.: Personality, culture and password behavior: a relationship study. In: Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, pp. 1–4, Article no. 36 (2018). https://doi.org/10.1145/3283458.3283530
Kumar, P., Naik, S.M., Devkar, U.R., Chetty, M., Clegg, T.L., Vitak, J.: “No telling passcodes out because they’re private” understanding children’s mental models of privacy and security online. Proc. ACM Hum.-Comput. Interact. 1, CSCW, 1–21, Article no. 64 (2017). https://doi.org/10.1145/3134699
Lamichhane, D.R., Read, J.C.: Investigating children’s passwords using a game-based survey. In: Proceedings of the 2017 Conference on Interaction Design and Children, pp. 617–622 (2017). https://doi.org/10.1145/3078072.3084333
Livingstone, S., Helsper, E.J.: Parental mediation of children’s internet use. J. Broadcast. Electron. Media 52(2), 581–599 (2008). https://doi.org/10.1080/08838150802437396
Maqsood, S., Biddle, R., Maqsood, S., Chiasson, S.: An exploratory study of children’s online password behaviours. In: Proceedings of the 17th ACM Conference on Interaction Design and Children, pp. 539–544 (2018). https://doi.org/10.1145/3202185.3210772
Mayer, P., Volkamer, M.: Addressing misconceptions about password security effectively. In: Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, pp. 16–27 (2018). https://doi.org/10.1145/3167996.3167998
Morris, R., Thompson, K.: Password security: a case history. Commun. ACM 22(11), 594–597 (1979). https://doi.org/10.1145/359168.359172
Pearman, S., et al.: Let’s go in for a closer look: observing passwords in their natural habitat. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 295–310 (2017). https://doi.org/10.1145/3133956.3133973
Pearman, S., Zhang, S.A., Bauer, L., Christin, N., Cranor, L.F.: Why people (don’t) use password managers effectively. In: 15th Symposium on Usable Privacy and Security (SOUPS 2019), pp. 319–338 (2019)
Ratakonda, D.K., French, T., Fails, J.A.: My name is my password: understanding children’s authentication practices. In: Proceedings of the 18th ACM International Conference on Interaction Design and Children, pp. 501–507 (2019). https://doi.org/10.1145/3311927.3325327
Rideout, V., Robb, M.B.: The Common Sense Census: Media use by tweens and teens. Common Sense Media 2019 census full report. Common Sense Media. San Francisco (2019). https://www.commonsensemedia.org/sites/default/files/research/report/2019-census-8-to-18-full-report-updated.pdf
Rim, K., Choi, S.: Analysis of password generation types in teenagers–focusing on the students of Jeollanam-do. Int. J. u-and e-Serv. Sci. Technol. 8(9), 371–380 (2015)
Sharpe, D.: Chi-square test is statistically significant: now what? Pract. Assess. Res. Eval. 20(1), Article no. 8 (2015). https://doi.org/10.7275/tbfa-x148
Smahel, D., et al.: EU Kids Online 2020: Survey results from 19 countries. EU Kids Online, London (2020). http://hdl.handle.net/20.500.12162/5299
Tobert, E.S., Biddle, R.: The password life cycle: user behaviour in managing passwords. In: 10th Symposium on Usable Privacy and Security (SOUPS 2014), pp. 243–255 (2014)
Tam, L., Glassman, M., Vandenwauver, M.: The psychology of password management: a tradeoff between security and convenience. Behav. Inf. Technol. 29(3), 233–244 (2010). https://doi.org/10.1080/01449290903121386
Taneski, V., Heričko, M., Brumen, B.: Password security—no change in 35 years? In: 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1360–1365. IEEE (2014). https://doi.org/10.1109/MIPRO.2014.6859779
Theofanos, M., Choong, Y.-Y., Murphy, O.: “Passwords keep me safe”–understanding what children think about passwords. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 19–35 (2021)
Ur, B., et al.: “I added ‘!’ at the end to make it secure”: observing password creation in the lab. In: Eleventh Symposium on Usable Privacy and Security (SOUPS 2015), pp. 123–140 (2015)
Ur, B., Bees, J., Segreti, S.M., Bauer, L., Christin, N., Cranor, L.F.: Do users’ perceptions of password security match reality? In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3748–3760 (2016). https://doi.org/10.1145/2858036.2858546
Walia, K.S., Shenoy, S., Cheng, Y.: An empirical analysis on the usability and security of passwords. In: 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI), vol. 1, no. 7, pp. 1–8. IEEE (2020). https://doi.org/10.1109/IRI49571.2020.00009
Wang, C., Jan, S.T.K., Hu, H., Bossart, D., Wang, G.: The next domino to fall: empirical analysis of user passwords across online services. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 196–203 (2018). https://doi.org/10.1145/3176258.3176332
Wash, R., Rader, E., Berman, R., Wellmer, Z.: Understanding password choices: how frequently entered passwords are re-used across websites. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pp. 175–188 (2016)
Zhang-Kennedy, L., Mekhail, C., Abdelaziz, Y., Chiasson, S.: From nosy little brothers to stranger-danger: children and parents’ perception of mobile threats. In: Proceedings of the 15th International Conference on Interaction Design and Children, pp. 388–399 (2016). https://doi.org/10.1145/2930674.2930716
Zou, Y., Roundy, K., Tamersoy, A., Shintre, S., Roturier, J., Schaub, F.: Examining the adoption and abandonment of security, privacy, and identity theft protection practices. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–15 (2020). https://doi.org/10.1145/3313831.3376570
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Choong, YY., Buchanan, K., Williams, O. (2023). Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children’s Password Practices. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2023. Lecture Notes in Computer Science, vol 14045. Springer, Cham. https://doi.org/10.1007/978-3-031-35822-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-35822-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35821-0
Online ISBN: 978-3-031-35822-7
eBook Packages: Computer ScienceComputer Science (R0)