EconPapers    
Economics at your fingertips  
 

An analysis view on password patterns of Chinese internet users

Cheng Yang, Jui‐long Hung and Zhangxi Lin

Nankai Business Review International, 2013, vol. 4, issue 1, 66-77

Abstract: Purpose - In December 2011, the National Computer Network Emergency Response Technical Team/Coordination Center of China reported the most serious user data leak in history which involved 26 databases with 278 million user accounts and passwords. After acquiring the user data from this massive information leak, this study has two major research purposes: the paper aims to reveal similarities and differences of password construction among four companies; and investigate how culture factors shape user password construction in China. Design/methodology/approach - This article analyzed real‐life passwords collected from four companies by comparing the following attributes: password length, password constitution, top 20 frequent passwords, character frequency distributions, string similarity, and password reuse. Findings - Major findings include that: general users in China have a weaker sense of security than those in Western countries, which reflected in the password lengths, the character combinations and the content structures; password constitution preferences are different between users in Western countries and in China, where passwords are more similar to the Pinyin context and Chinese number homonym; and password reuse is very common in China. General users tend to reuse the same passwords and IT professionals tend to engage in Seed Password reuse. Research limitations/implications - Due to the rapid growth of Internet users and e‐commerce markets in China, many online service providers may not pay enough attention to security issues, but focus instead on market expansion. Employees in these companies may not be well trained in information security, resulting in carelessness when handling security issues. Originality/value - This is the first study which attempts to consider culture influences in password construction by analyzing real‐life datasets.

Keywords: Password security; Cultural issues; Longest common substring (LCS); Password reuse; China; Internet; Data security (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations:

Downloads: (external link)
https://www.emerald.com/insight/content/doi/10.110 ... d&utm_campaign=repec (text/html)
https://www.emerald.com/insight/content/doi/10.110 ... d&utm_campaign=repec (application/pdf)
Access to full text is restricted to subscribers

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:eme:nbripp:v:4:y:2013:i:1:p:66-77

DOI: 10.1108/20408741311303887

Access Statistics for this article

Nankai Business Review International is currently edited by Dr Xuexiu Wang and Professor Li Wei'an

More articles in Nankai Business Review International from Emerald Group Publishing Limited
Bibliographic data for series maintained by Emerald Support ().

 
Page updated 2025-03-19
Handle: RePEc:eme:nbripp:v:4:y:2013:i:1:p:66-77