A DECADE+ OF STORYTELLING POWERED BY THE BEST WRITERS ON THE PLANET

WE DON'T DO IT ALL, BUT WE DO IT ALL "FOR GOOD"

BE PART OF THE LEGACY

TAMPA BAY • FEBRUARY 23-24 2026

This FINAL encore experience will be unlike any other. Because like everything we do, it's been "reimagined" from beginning to end. It's not a virtual or hybrid event. It's not a conference. It's not a seminar, a workshop, a meeting, or a symposium. And it's not your typical run-of-the-mill everyday event crammed with stages, keynote speeches, team-building exercises, PowerPoint presentations, and all the other conventional humdrum. Because it's up close & personal by design. Where conversation trumps presentation. And where authentic connection runs deep.

How Do You Pick Your Passwords?

A secure relationship with passwords means not being attached to how you pick them

Merrill Warkentin, Mississippi State University; Karen Renaud, Abertay University, and Robert Otondo, Mississippi State University

When you are asked to create a password – either for a new online account or resetting login information for an existing account – you’re likely to choose a password you know you can remember. Many people use extremely basic passwords, or a more obscure one they reuse across many sites. Our research has found that others – even ones who use different passwords for each site – have a method of devising them, for instance basing them all on a familiar phrase and making site-specific tweaks.

In all those cases, the people are creating weak passwords that are easily guessed – especially when up against automated password-cracking software that can test thousands of possibilities a second. One reason for this weakness might well be their users’ emotional connection to their preexisting password creation routine.

Cybersecurity efforts often encourage people to choose stronger passwords, but rarely acknowledge the idea that people have this feeling of attachment. They focus on the measurable improvement in security without realizing they’re trying to persuade people to switch to a less personal method.

There’s a better way to choose a secure password.
XKCD, CC BY-SA

Insecure tendencies

Passwords are key to cybersecurity for people and companies. A single bad password can grant a hacker access to an entire network of computers and data-storage servers.

As a result, many computer systems force users to create new passwords regularly – say, every 30 or 45 days – and require every password to contain capital letters, numbers and punctuation characters even though federal experts advise against both of these practices. Regularly requiring people to choose new passwords that are hard to remember leads to unfortunate side effects. People could reuse a strong password on several sites, or they could write down the new password – which is safe only if you trust the other people who have access where you store the record.

Training people to create secure passwords hasn’t made much of a difference to overall password security on the internet. People may not understand the risks related to weak passwords – though some experts blame character flaws, stupidity or just plain indifference.

The endowment effect

Our research has identified another explanation for why people choose weak passwords: People feel that they own, and are emotionally attached to, the way they usually create passwords. In behavioral economics, this kind of response is called the endowment effect, in which people so overvalue their existing possessions that they don’t want to exchange them for other items – even if the new item is better or more valuable.

The endowment effect is usually applied to physical goods – and may help explain why your grandmother doesn’t want to get a new washing machine to replace her decades-old one. Our research suggests that the same psychological process influences how people contemplate their password creation routines.

In our study, we asked 419 participants how they created their passwords. Many used something they already knew, such as a pet name or their own birthday. Others had developed a personal system. They might have a root password and then personalize it for every different site, use a pattern on the keyboard or make up a silly sentence. When we probed more deeply, we found that people felt a sense of ownership and personal pride about their password creation routine. One said “I think my way is a good system.” In addition, we found that they overvalued their own method and felt threatened by suggestions that it was flawed.

We provided a scenario where “Terry” derides “Pat’s” password creation routine, and then asked people how they thought Pat would react. The most popular responses were: becoming defensive, avoiding the conversation or withdrawing from it. All of these suggest that a critique of a personal password routine was perceived as an attack or a threat. These answers we found lined up perfectly with the endowment effect, including finding that the participants labored under the illusion that their passwords provided more protection than they actually did.

More than just a habit

The attachment people feel to their password-choosing method is more than just a habit. Psychologically speaking, a habit is a behavior cued by an event or an item in the environment – like brushing teeth before bed, washing hands before meals or switching off lights when leaving a room. They’re often nearly automatic, and don’t require a deliberate decision or much thought. Something that’s a habit seems to occur naturally, without any deliberate decision triggering its activation.

Choosing a password is different. It always requires deliberate and effortful cognition. That’s what brings the endowment effect into play. Cybersecurity training programs should include information not only about how to choose more secure passwords, but also should acknowledge that users may feel a sense of loss about the change.

People won’t pick stronger passwords just because they’re asked to. If they feel their existing methods are being treated with disdain, they might perceive that as a personal attack, and become even less likely to adopt more secure practices. Instead, security experts should find ways to minimize users’ sense of loss – and perhaps even encourage them to find a new emotional connection to a more secure method of choosing.The Conversation

Merrill Warkentin, James J. Rouse Endowed Professor of Information Systems, Mississippi State University; Karen Renaud, Professor of Cybersecurity, Abertay University, and Robert Otondo, Associate Professor of Information Systems, Mississippi State University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

THE CONVERSATION
THE CONVERSATIONhttps://theconversation.com/us
THE CONVERSATION US launched as a pilot project in October 2014. It is an independent source of news and views from the academic and research community, delivered direct to the public. Our team of professional editors work with university and research institute experts to unlock their knowledge for use by the wider public. We aim to help rebuild trust in journalism. All authors and editors sign up to our Editorial Charter. All contributors must abide by our Community Standards policy. We only allow authors to write on a subject on which they have proven expertise, which they must disclose alongside their article. Authors’ funding and potential conflicts of interest must also be disclosed. Failure to do so carries a risk of being banned from contributing to the site. The Conversation started in Melbourne Victoria and the innovative technology platform and development team is based in the university and research precinct of Carlton. Our newsroom is based in Boston but our team is part of a global newsroom able to share content across sites and around the world. The Conversation US is a non-profit educational entity.​

DO YOU HAVE THE "WRITE" STUFF? If you’re ready to share your wisdom of experience, we’re ready to share it with our massive global audience – by giving you the opportunity to become a published Contributor on our award-winning Site with (your own byline). And who knows? – it may be your first step in discovering your “hidden Hemmingway”. LEARN MORE HERE


CONVERSATIONS

RECIPIENT OF THE 2024 "MOST COMPREHENSIVE LIFE & CULTURE MULTIMEDIA DIGEST" AWARD

WE ARE NOW FEATURED ON

EXPLORE 360° NATION

ENJOY OUR FREE EVENTS

OUR COMMUNITIES