DOI QR코드

DOI QR Code

Comparisons of Pattern Analysis in using the Four-digit Personal Identification Numbers according to Sensitivity -A University Case

민감도에 따른 네 자리 숫자 비밀번호 사용 형태 비교 연구-A대학 사례연구

  • Moon, Soog-Kyung (Dept. of Marketing & Information Consulting, Mokwon University)
  • 문숙경 (목원대학교 마케팅정보컨설팅학과)
  • Received : 2015.04.06
  • Accepted : 2015.05.17
  • Published : 2015.06.25

Abstract

This study is investigated the effect of sensitivity upon pattern of the four-digit personal identification numbers(PINs) of A-university students. Under survey 2, PINs were collected after each student had information about his PINs were used in disclose his test scores, But Under survey 1, each student didn't have. Survey 2 is viewed more sensitive situation than survey 1 to students. The rate of occurrences of most common PINs which were created by the reason of easiness to remember or to use without caution, in survey 2 is five times less than survey 1 and using rate of girl students are considerably less than that of boys. By comparing frequencies of digits used at each position, it is found that significant differences exist between two surveys in the first, second and forth position except third. PINs are represented by the polygonal graph with that X-axis shows position and Y-axis shows digits from 0 to 9 used at each position. There are many different figures between two surveys. This study shows that students are more anxious about using the PINs in survey 2 which is viewed more sensitive than survey 1.

본 연구는 A-대학 학생들에 대하여 조사 전에 성적 공개에 사용되어진다는 사실을 인지한 조사 2와 인지 사실이 없는 조사 1 간 네 자리 숫자 비밀번호(PINs) 사용형태를 비교 분석한 내용이다. 학생들에겐 조사 2가 조사 1에 비해 민감도가 다소 높은 상황으로 인식될 수 있으며, 분석 결과, 주의를 기울이지 않고 사용하는 대표적인 번호들의 사용량이 조사 2는 조사1에 비해 현저히 줄어들었으며, 여학생들이 남학생들에 비해 더 두렷한 사용감소세를 보였다. 자리별로 사용된 숫자들을 대상으로 분석한 결과 셋째자리만 제외한 거의 모든 자리에서 사용된 숫자들의 출현빈도 간 차이를 보였으며, 각각의 PINs들을 x축은 자리 위치를 y축은 각 자리별 사용된 숫자를 나타내는 꺽은선 그래프로 묘사한 패턴분석 결과 증가 형이 많이 나타난 조사 1에 비해 조사2에서는 감소 형이 많이 나타나는 등 다양한 차이가 있음을 알 수 있었다. 연구 결과 민감도가 높아지면 학생들은 PINs 번호 사용 시 주의를 더 기울인다는 사실을 다각적인 분석을 통해 알 수 있었다.

Keywords

References

  1. Gaw S., Felten E.W., "Password management strategies for online accounts", Proc Scoups, pp 44-55, 2006.
  2. Bonneau, Preibusch, "The password thicket: Technical and Markey failures in human authentication on the web", Proceedings of WEIS, Boston, MA, USA. 2010.
  3. Y. N. Shin, Y. J. Lee, M. G. Chun, "Biometric Template Security for Personal Information Protection", Journal of Korean Intelligence and Information Systems, Vol.18, No. 4, pp 437-444, 2008. https://doi.org/10.5391/JKIIS.2008.18.4.437
  4. Y. N. Shin, M. J. Kwon, Y. J. Lee, J. I. Park, M. G. Chun, "Biometric and Identity Reference Protection", Journal of Korean Intelligence and Information Systems, Vol. 19, No. 2, pp. 160-167, 2009. https://doi.org/10.5391/JKIIS.2009.19.2.160
  5. M. K. You, M. J. Kwon, S. H. Lee, M. G. Chun, "Secure Binding of Identity Reference and Biometric Reference", Journal of Korean Intelligence and Information Systems, Vol. 20, No. 5, pp. 610-616, 2010. https://doi.org/10.5391/JKIIS.2010.20.5.610
  6. Y. N. Shin, M. G. Chun, "Personal Information Protection for Biometric Verification Based", Journal of Korean Intelligence and Information Systems, Vol. 20, No. 5, pp. 659-664, 2010. https://doi.org/10.5391/JKIIS.2010.20.5.659
  7. J. M. Seung, B. N. Noh, S. H. Ahn, "A damage trend and responses to cope with the latest principal hacking", Korea Institute of Information Security & Cryptology, Vol 16, No. 1, pp. 80-83, 2006.
  8. Harreld, H., "Security: an uneasy alliance", Infoworld 23, pp. 42-44, 2001.
  9. Shay R., Komanduri S., Kelley P.G., Bauer L, Leon P.G., Christin N., Mazur M.L., Cranor L.F.,"Encountering Stronger Password Requirements: User Attitudes and Behaviors", Symposium on Usable Privacy and Security(SOUPS), July 14-16 Remond, WA, USA. 2010.
  10. Beate G., Hilary J., "Using and Managing Multiple Passwords : A Week to a View", Interacting with Computers, 23, pp. 256-267, 2011. https://doi.org/10.1016/j.intcom.2011.03.007
  11. Zviran, M., Haga, W.J., "Password security: an empirical study", Journal of Management Information Systems Vol 15, No. 4, pp. 161-185, 1999. https://doi.org/10.1080/07421222.1999.11518226
  12. Brown, A.S., Brackener, Pro,E., Zoccoli S., and Douglas, K., "Generating and Remembering Passwords", Applied Cognitive Psychology, Vol. 18, pp. 641-651, 2004. https://doi.org/10.1002/acp.1014
  13. Dhamija. R., Perrig, A., "A user study: Using images for authentication", Proceedings of the 9th USENIX Security Symposium, August, 2000.
  14. S. K. Moon, "An Empirical study on the analysis of the re-using of four-digit personal identification numbers -A university case", Journal of Digital Policy & Management, Vol 11, No. 10, pp. 737-746, 2013.
  15. S. K. Moon, "A study on the using pattern analysis of four-digit personal identification numbers -A university case", Journal of Digital Policy & Management, Vol 10, No. 10, pp. 529-538, 2012.
  16. E. J. Kim, "Comparision study of the culture of digits habit between korean and Chinese", Journal of Jejoo-Hanra University, Vol 34, 2010.
  17. D. Amitay, "Most Common iPhone Passcodes", Available : http://amitay.us/blog/files/most_common_iphone_passcodes.php, 2011, [Accessed : March 15, 2015]