Secret sharing in online communities: A comparative analysis of offender and non-offender password creation strategies

dc.contributor.authorBergeron, Andréanneen
dc.contributor.authorDearden, Thomas E.en
dc.date.accessioned2024-11-19T14:08:36Zen
dc.date.available2024-11-19T14:08:36Zen
dc.date.issued2024-11-05en
dc.description.abstractEven though several authentication methods exist, passwords remain the most common type of authentication. Researchers have demonstrated the influence of a person’s environment and exposure to the Internet on their online security behavior (Bosnjak & Brumen, 2016; He et al., 2021; Juozapavičius et al., 2022). Those studies suggest that social identity seems to play a role in password choice. The objective of this study was to determine if the criminal nature of a network influences password-creation strategies. To achieve this, we utilized two databases with a substantial number of actual passwords (1,485,095) that had been leaked to the Internet. One database was sourced from a non-delinquent social network, while the other was from a hacker forum. We employed logistic regression to reveal the characteristics associated with each group, ensuring a comprehensive analysis of different types of password strategies and the similarity between actors of the same network. Results show that users of the same network have passwords with characteristics that are similar to each other. Individuals with the same social interests seem more likely to use the same password-creation strategies. From a network analysis perspective, the results show that similar individuals (sharing the same interests) are similar in other aspects (password creation strategies). These findings offer valuable insights into the diverse landscape of password varieties and user behaviors, contributing to a more comprehensive understanding of internet user networks.en
dc.description.versionPublished versionen
dc.identifier100110 (Article number)en
dc.identifier.doihttps://doi.org/10.1016/j.jeconc.2024.100110en
dc.identifier.issn2949-7914en
dc.identifier.issue2024en
dc.identifier.orcidDearden, Thomas [0000-0003-0549-927X]en
dc.identifier.urihttps://hdl.handle.net/10919/123635en
dc.identifier.volume6en
dc.language.isoenen
dc.publisherElsevieren
dc.rightsCreative Commons Attribution-NonCommercial 4.0 Internationalen
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/en
dc.subjectCybercrimeen
dc.subjectEconomic crimeen
dc.subjectAuthenticationen
dc.subjectNetworksen
dc.subjectOffendersen
dc.subjectSocial identity theoryen
dc.titleSecret sharing in online communities: A comparative analysis of offender and non-offender password creation strategiesen
dc.title.serialJournal of Economic Criminologyen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten
dc.type.otherArticleen
pubs.organisational-groupVirginia Techen
pubs.organisational-groupVirginia Tech/All T&R Facultyen
pubs.organisational-groupVirginia Tech/Liberal Arts and Human Sciencesen
pubs.organisational-groupVirginia Tech/Liberal Arts and Human Sciences/Sociologyen
pubs.organisational-groupVirginia Tech/Liberal Arts and Human Sciences/CLAHS T&R Facultyen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
1-s2.0-S2949791424000629-main.pdf
Size:
784.16 KB
Format:
Adobe Portable Document Format
Description:
Published version
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.5 KB
Format:
Plain Text
Description: