Aniqa Alam, Elizabeth Stobert, Robert Biddle (Carleton University)

This paper explores how cultural factors impact the password-sharing attitudes and practices of young Bangladeshi adults. We conducted semi-structured interviews with 24 Bangladeshi participants aged between 18 and 39 about how, why, and with whom they share passwords. Using Grounded Theory, we identified three stages of password sharing (motivations, expectations, and problems) and three cultural factors (gender identity, collectivist social norms, and religious identity) that impact password sharing in Bangladesh. We found that password sharing is pervasive, and deeply affected by Bangladeshi culture and identity. Young adults’ motivations and expectations for password sharing were complex and nuanced, and often served poorly by the tools and accounts that they were attempting to share. We found that Bangladeshi culture creates a situation in which password sharing is inevitable, but where individuals are inconvenienced and sometimes endangered by the action.

View More Papers

QPEP in the Real World: A Testbed for Secure...

Julian Huwyler (ETH Zurich), James Pavur (University of Oxford), Giorgio Tresoldi and Martin Strohmeier (Cyber-Defence Campus) Presenter: Martin Strohmeier

Read More

On the Feasibility of Profiling Electric Vehicles through Charging...

Ankit Gangwal (IIIT Hyderabad), Aakash Jain (IIIT Hyderabad) and Mauro Conti (University of Padua)

Read More

Privacy-Preserving Database Fingerprinting

Tianxi Ji (Texas Tech University), Erman Ayday (Case Western Reserve University), Emre Yilmaz (University of Houston-Downtown), Ming Li (CSE Department The University of Texas at Arlington), Pan Li (Case Western Reserve University)

Read More

VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search

Zhenhao Luo (College of Computer, National University of Defense Technology), Pengfei Wang (College of Computer, National University of Defense Technology), Baosheng Wang (College of Computer, National University of Defense Technology), Yong Tang (College of Computer, National University of Defense Technology), Wei Xie (College of Computer, National University of Defense Technology), Xu Zhou (College of Computer,…

Read More