Skip to main content

Bridging the Gap Between Usability and Security: Cultural Adaptation of a Graphical User Authentication

  • Conference paper
  • First Online:
Universal Access in Human-Computer Interaction. Novel Design Approaches and Technologies (HCII 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13308))

Included in the following conference series:

Abstract

Authentication tasks are becoming more important, since these tasks are performed daily by millions of users across diverse cultures that share distinct characteristics and behaviors. Alphanumerical password authentication is often criticized because of its memorability issues. Thus, graphical passwords, which require users to select images as their password, have been proposed to increase memorability and ease the user authentication process. However, graphical passwords are globalized without considering that people from distinct cultures understand and interact with technologies differently. Culturally familiar graphical passwords allow the user to select pictures that relate to his cultural background. Such passwords exhibit a higher level of memorability, and leverage humans’ cognitive strengths.

This paper reports the finding of an investigation of the effect of cultural elements on graphical password usability. A pilot study was conducted with thirty-four participants to examine the usability impact of culture on a customized graphical user authentication application. Two groups of participants were part of the study, namely Cameroonian and American users. Participants were asked to create a graphical password with the option of selecting cultural related images as opposed to non-related cultural images. Data gathered was used to measure the correlation between cultural related images and memorability and user preferences. The results showed that cultural elements are well considered as factors that influence password choices and the memorability of users during the registration and the authentication process. Findings underpin the necessity to consider cultural differences in the design of graphical password authentications, to enhance usability features and strengthened security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Maayan, G.: 5 Authentication Methods that Can Prevent the Next Breach (2019). https://www.idrnd.ai/5-authentication-methods-that-can-prevent-the-next-breach/

  2. Weldon, M.S., Roediger, H.L., Challis, B.H.: The properties of retrieval cues constrain the picture superiority effect. Mem. Cognit. 17(1), 95–105 (1989). https://doi.org/10.3758/BF03199561

    Article  Google Scholar 

  3. Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: effects of tolerance and image choice. In: Proceedings of the 2005 symposium on Usable privacy and security, pp. 1–12, July 2005

    Google Scholar 

  4. Aljahdali, H.M., Poet, R.: Users’ perceptions of recognition-based graphical passwords: a qualitative study on culturally familiar graphical passwords. In: Proceedings of the 7th International Conference on Security of Information and Networks, pp. 279–283, September 2014

    Google Scholar 

  5. Czaja, S.J., Boot, W.R., Charness, N., Rogers, W.A.: Designing for Older Adults: Principles and Creative Human Factors Approaches, 3rd edn. CRC Press, Boca Raton, FL (2019)

    Book  Google Scholar 

  6. Riley, C., Buckner, K., Johnson, G., Benyon, D.: Culture and biometrics: regional differences in the perception of biometric authentication technologies. AI society 24(3), 295-306. Symposium on Usable Privacy and Security ({SOUPS} 2015), pp. 123–140 (2009)

    Article  Google Scholar 

  7. Gao, H., Jia, W., Ye, F., Ma, L.: A survey on the use of graphical passwords in security. JSW 8(7), 1678–1698 (2013)

    Google Scholar 

  8. Woods, N., Siponen, M.: Improving password memorability, while not inconveniencing the user. Int. J. Hum Comput Stud. 128, 61–71 (2019)

    Article  Google Scholar 

  9. Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., Furlong, M.: Security design based on social and cultural practice: sharing of passwords. In: Aykin, N. (ed.) UI-HCII 2007. LNCS, vol. 4560, pp. 476–485. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73289-1_55

    Chapter  Google Scholar 

  10. Mohamed, M., Chakraborty, J., Pillutla, S.: Effects of culture on graphical password image selection and design. J. Syst. Inf. Technol. (2020)

    Google Scholar 

  11. Hofstede Insights Organizational Culture Consulting (hofstede-insights.com)

    Google Scholar 

  12. Constantinides, A., Fidas, C., Belk, M., Pitsillides, A.: On the personalization of image content in graphical passwords based on users’ sociocultural experiences: new challenges and opportunities. In: Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization, pp. 199–202, June 2019

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yvonne Kamegne .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kamegne, Y., Owusu, E., Chakraborty, J. (2022). Bridging the Gap Between Usability and Security: Cultural Adaptation of a Graphical User Authentication. In: Antona, M., Stephanidis, C. (eds) Universal Access in Human-Computer Interaction. Novel Design Approaches and Technologies. HCII 2022. Lecture Notes in Computer Science, vol 13308. Springer, Cham. https://doi.org/10.1007/978-3-031-05028-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-05028-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-05027-5

  • Online ISBN: 978-3-031-05028-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics