MIGRANT

IF 2.8 4区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE
Nora Alkaldi, K. Renaud
{"title":"MIGRANT","authors":"Nora Alkaldi, K. Renaud","doi":"10.1145/3533692.3533698","DOIUrl":null,"url":null,"abstract":"Password manager applications have the potential to alleviate password pain and improve password strength, yet they are not widely adopted. Password managers are dissimilar to other kinds of software tools, given that the leakage of the credentials they store could give a hacker access to all the individual's online accounts. Moreover, adoption requires a deliberate switch away from an existing (manual) password management routine. As such, traditional technology adoption models are unlikely to model password manager adoption accurately. In this paper, we propose and explain how we validated a theoretical model of smartphone password manager adoption. We commenced by carrying out exploratory interviews with 30 smartphone owners to identify factors that influence adoption. These were used to develop a model that reflects the password manager adoption process, building on migration theory. The proposed model, MIGRANT (MIGRation pAssword maNager adopTion), was validated and subsequently refined in a week-long study with 198 smartphone owners, combining self-report and observation to measure constructs. This study contributes to the information security behavioral literature by isolating the main factors that encourage or deter password manager adoption, and those that moor smartphone owners in their current practices, hindering switching. With this investigation, we introduce migration theory as a reference theory for future studies in the information security behavioral field.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"8 1","pages":"63 - 95"},"PeriodicalIF":2.8000,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Data Base for Advances in Information Systems","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1145/3533692.3533698","RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 3

Abstract

Password manager applications have the potential to alleviate password pain and improve password strength, yet they are not widely adopted. Password managers are dissimilar to other kinds of software tools, given that the leakage of the credentials they store could give a hacker access to all the individual's online accounts. Moreover, adoption requires a deliberate switch away from an existing (manual) password management routine. As such, traditional technology adoption models are unlikely to model password manager adoption accurately. In this paper, we propose and explain how we validated a theoretical model of smartphone password manager adoption. We commenced by carrying out exploratory interviews with 30 smartphone owners to identify factors that influence adoption. These were used to develop a model that reflects the password manager adoption process, building on migration theory. The proposed model, MIGRANT (MIGRation pAssword maNager adopTion), was validated and subsequently refined in a week-long study with 198 smartphone owners, combining self-report and observation to measure constructs. This study contributes to the information security behavioral literature by isolating the main factors that encourage or deter password manager adoption, and those that moor smartphone owners in their current practices, hindering switching. With this investigation, we introduce migration theory as a reference theory for future studies in the information security behavioral field.
移民
密码管理器应用程序有可能减轻密码痛苦并提高密码强度,但它们并没有被广泛采用。密码管理器与其他类型的软件工具不同,因为它们存储的凭证泄露可能会让黑客访问个人的所有在线帐户。此外,采用需要有意地从现有的(手动)密码管理例程切换。因此,传统的技术采用模型不太可能准确地模拟密码管理器的采用。在本文中,我们提出并解释了我们如何验证智能手机密码管理器采用的理论模型。我们首先对30位智能手机用户进行了探索性访谈,以确定影响采用的因素。这些数据被用来开发一个模型,该模型反映了基于迁移理论的密码管理器采用过程。提出的模型,移民(迁移密码管理器采用),经过验证,并随后在为期一周的研究中完善了198智能手机用户,结合自我报告和观察来测量结构。这项研究通过隔离鼓励或阻止密码管理器采用的主要因素,以及那些将智能手机用户禁锢在他们目前的做法中,阻碍切换的因素,为信息安全行为文献做出了贡献。通过本研究,我们将引入迁移理论,作为未来信息安全行为领域研究的参考理论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Data Base for Advances in Information Systems
Data Base for Advances in Information Systems INFORMATION SCIENCE & LIBRARY SCIENCE-
CiteScore
3.60
自引率
7.10%
发文量
18
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信