{"id":259,"date":"2008-04-25T07:05:09","date_gmt":"2008-04-25T13:05:09","guid":{"rendered":"http:\/\/blogs.uww.edu\/library\/archives\/259"},"modified":"2008-04-21T14:06:03","modified_gmt":"2008-04-21T20:06:03","slug":"your-password-for-chocolate","status":"publish","type":"post","link":"https:\/\/blogs.uww.edu\/library\/archives\/259","title":{"rendered":"Chocolate for your password"},"content":{"rendered":"<p>OK, what&#8217;s more important to <em>you<\/em>: your password or your chocolate habit?<\/p>\n<p>A study in London found that a disturbing number of people would give up their computer passwords for a chocolate bar (121 of 576 subway riders, or 21 percent, at London&#8217;s Liverpool Street Station).  Apparently this is an improvement, because last year 64% preferred the chocolate to their computer security! The study also found gender made a difference: 45 percent of women, compared with 10 percent of the men, gave up their passwords (Hey! C&#8217;mon ladies!). Of course, as my coworker pointed out, the chocoholics may be giving up bogus passwords. I certainly hope so!<\/p>\n<p>This is yet another gem brought to my attention by my iGoogle science news tab. It was a &#8220;News Bytes of the Week&#8221; item at the <a href=\"http:\/\/www.sciam.com\/article.cfm?id=news-bytes-security-wifi&amp;sc=rss\"><em>Scientific American<\/em><\/a> web site.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OK, what&#8217;s more important to you: your password or your chocolate habit? A study in London found that a disturbing number of people would give up their computer passwords for a chocolate bar (121 of 576 subway riders, or 21 &hellip; <a href=\"https:\/\/blogs.uww.edu\/library\/archives\/259\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":37,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[36],"tags":[835,695,834,218,833],"class_list":["post-259","post","type-post","status-publish","format-standard","hentry","category-around-the-world","tag-computer-security","tag-igoogle","tag-passwords","tag-research","tag-studies"],"_links":{"self":[{"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/posts\/259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/comments?post=259"}],"version-history":[{"count":0,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/posts\/259\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/media?parent=259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/categories?post=259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/tags?post=259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}