Table 1. number of students and PWs
Table 2. Most common PWs (%)
Table 3. Frequency of each digits (%)
Table 4. Rate of Occurrences with Gender
Table 5. Output of Analysis with Gender
Table 6. Rate of Occurrences of each digits(%)
Table 7. Output of analysis in each position
Table 8. Analysis with gender in each position
Table 9. Output of analysis with gender
Table 10. Output of analysis with same gender
Table 11. Most common paired digits
Table 12. Common paired digits with male
Table 13. Common paired digits with female
Table 14. Most common paired digits
Table 15. Kinds of type
Table 16. Most common types (%)
Table 17. Output of analysis
References
- http://kosis.kr/statHtml/statHtml.do
- http://gallup.co.kr/gallupdb/gallupreport(20180808)
- S. Gaw & E. W. Felten.(2006). Password management strategies for online accounts, Proc Scoups, 44-55.
- W. J. Jang & H. W. Lee. (2010). Biometric One-Time Password Generation Mechanism and its Application on SIP Authentication. Journal of the Korea Convergence Society, 1(1), 93-100. https://doi.org/10.15207/JKCS.2010.1.1.093
- Y. C. Hwang, H. J. Mun & J. W. Lee. (2015). Face Recognition System Technologies for Authentication System- A Survey. Journal of Convergence for Information Technology, 5(3), 9-13. https://doi.org/10.22156/CS4SMB.2015.5.3.009
- H. J. Mun. (2018). Biometric Information and OTP based on Authentication Mechanism using Blockchain. Journal of Convergence for Information Technology, 8(3), 85-90. https://doi.org/10.22156/CS4SMB.2018.8.3.085
- R. Shay, S. Komanduri, P. G. Kelley, L. Bauer, P. G. Leon, N. Christin, M. L. Mazur & L. F. Cranor. (2010). Encountering stronger password requirements: User attitudes and behaviors. Symposium on Usable Privacy and Security(SOUPS), July, 14-16.
- V. Ashlee. (2010). Most common iPhone if your password is 123456, Just make it hackme, The New York Times, January 20.
- J. M. Seung, B. N. Noh & S. H. Ahn. (2006). A damage trend and responses to cope with the latest principal hacking, Korea Institute of Information Security & Cryptology, 16(1), 80-83.
- G. Beate & J. Hilary. (2011). Using and managing multiple passwords : A Week to a View. Interacting with Computers, 23, 256-267. https://doi.org/10.1016/j.intcom.2011.03.007
- A. S. Brown, E. Bracken, S. Zoccoli & K. Douglas. (2004). Generating and remembering passwords. Applied Cognitive Psychology, 18, 641-651. https://doi.org/10.1002/acp.1014
- S. K. Moon. (2013). An Empirical study on the analysis of the re-using of four-digit personal identification numbers -A university case. Journal of Digital Policy & Management, 11(10), 737-746.
- D. Amitay. (2011). Most common iPhone passcodes. http://amitay.us/blog/files/most_common_iphone_passcodes.php
- S. K. Moon. (2012). A study on the using pattern analysis of four-digit personal identification numbers -A university case, Journal of Digital Policy & Management, 10(10), 529-538.
- S. K. Moon. (2015). Comparisons of pattern analysis in using the four-digit personal identification numbers According to Sensitivity -A university case. Journal of Korean Institute of Intelligent System, 25(3), 229-235. https://doi.org/10.5391/JKIIS.2015.25.3.229