skip to main content
10.1145/3487405.3487657acmotherconferencesArticle/Chapter ViewAbstractPublication PageseiccConference Proceedingsconference-collections
poster
Public Access

A Comparison of SONA and MTurk for Cybersecurity Surveys

Published:22 November 2021Publication History

ABSTRACT

For almost every online account, people are required to create a password to protect their information online. Since many people have many accounts, they tend to create insecure passwords and re-use passwords. These insecure passwords are often easy to guess, which can lead to compromised data. It is well-known that every person has a different personality type, which can be determined using personality models such as Big Five and True Colors. This research examines if there is a link between personality type and password security among a variety of participants in two groups of participants: SONA and MTurk. Each participant in both surveys answered questions based on password security and their personality type. Our results show that participants in the MTurk survey were more likely to choose a strong password and to exhibit better security behaviors and knowledge than participants in the SONA survey. This is mostly attributed to the age difference. However, the distribution of the results was similar for both MTurk and SONA. Future surveys on cybersecurity should include both types of demographics for a more generalizable result.

References

  1. M Buhrmester and T Kwang. 2011. Amazon’s Mechanical Turk: A new source of inexpensive, yet high-quality, data? on Psychological Science.Google ScholarGoogle Scholar
  2. Dropbox. 2017. zxcvbn. https://github.com/dropbox/zxcvbn.Google ScholarGoogle Scholar
  3. B W Gamblin, M P Winslow, B Lindsay, A W Newsom, and A Kehn. 2017. Comparing in-person, Sona, and Mechanical Turk measurements of three prejudice-relevant constructs. Current Psychology 36, 2 (2017), 217–224.Google ScholarGoogle ScholarCross RefCross Ref
  4. Margaret Gratian, Sruthi Bandi, Michel Cukier, Josiah Dykstra, and Amy Ginther. 2018. Correlating human traits and cyber security behavior intentions. http://www.sciencedirect.com/science/article/pii/S0167404817302523. Computers & Security 73(2018), 345 – 358. https://doi.org/10.1016/j.cose.2017.11.015Google ScholarGoogle ScholarCross RefCross Ref
  5. Tzipora Halevi, James Lewis, and Nasir Memon. 2013. A Pilot Study of Cyber Security and Privacy Related Behavior and Personality Traits. In Proceedings of the 22nd International Conference on World Wide Web (Rio de Janeiro, Brazil) (WWW ’13 Companion). Association for Computing Machinery, New York, NY, USA, 737–744. https://doi.org/10.1145/2487788.2488034Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Maraj, M. V. Martin, M. Shane, and M. Mannan. 2019. On the null relationship between personality types and passwords. 2019 17th International Conference on Privacy, Security and Trust (PST) (2019).Google ScholarGoogle ScholarCross RefCross Ref
  7. A. McCormac, T. Zwaans, K. Parsons, D. Calic, M. Butavicius, and M. Pattinson. 2017. Individual differences and information security awareness. Computers in Human Behavior 69 (2017), 151–156.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Paolacci and J. Chandler. 2014. Inside the Turk: Understanding Mechanical Turk as a participant pool. Current directions in psychological science 23, 3 (2014), 184–188.Google ScholarGoogle Scholar
  9. [9] Amazon Mechanical Turk.Accessed 2021. https://www.mturk.com/.Google ScholarGoogle Scholar
  10. B. Zhang and S. Gearhart. 2020. Collecting Online Survey Data: A Comparison of Data Quality among a Commercial Panel & MTurk. Surv. Pract 13(2020).Google ScholarGoogle Scholar

Index Terms

  1. A Comparison of SONA and MTurk for Cybersecurity Surveys
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          EICC '21: Proceedings of the 2021 European Interdisciplinary Cybersecurity Conference
          November 2021
          97 pages
          ISBN:9781450390491
          DOI:10.1145/3487405

          Copyright © 2021 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 November 2021

          Check for updates

          Qualifiers

          • poster
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)68
          • Downloads (Last 6 weeks)4

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format