Skip to main content

The Role of Mental Model in Graphical Password Selection and Design

  • Conference paper
  • First Online:
  • 2528 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 722))

Abstract

The aim of this paper is to present conceptual foundations for an ongoing comprehensive study on the effects of Mental Model and culture on the selection and the design of the Recognition-Based Graphical Password (RBG-P). A flexible Security, Usability, Mental (SUM) meta-model has been proposed to provide better insights on designing a usable RBG-P through manipulating the optimal equilibrium solution expanse (δ) without compromising security. This manipulation results in the design requirements, which is a consequence of the combinative effects of both the user and the designer mental models as constituted by the culture. A cognitive map has been produced to explicate the relationship between constituents of usability and security provided by the RBG-P. The development of the mental model process necessitates the building of new mindset and culture. This multifaceted relationship of the Shared Mental Model (SMM) development is represented by extrapolating of Metcalfe’s law to social networks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Olaverri-Monreal, C., Goncalves, J.: Capturing mental models to meet users expectations. In: Paper presented at the the 9th Iberian Conference on Information Systems and Technologies (CISTI), Barcelona (2014)

    Google Scholar 

  2. Langan-Fox, J., Platania-Phung, C., Waycott, J.: Effects of advance organizers, mental models and abilities on task and recall performance using a mobile phone network. Appl. Cognit. Psychol. 20, 1143–1165 (2006)

    Article  Google Scholar 

  3. Raja, F., Hawkey, K., Hsu, S., Wang, K.-L., Benznosov, A.: Brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. In: Paper presented at the SOUPS 2011, Proceedings of the Seventh Symposium on Usable Privacy and Security, Pittsburgh, USA (2011)

    Google Scholar 

  4. Ruggles, R.: The state of the notion: knowledge management in practice. Calif. Manag. Rev. 40(3), 80–89 (1998)

    Article  Google Scholar 

  5. Cannon-Bowers, J.A., Salas, E., Converse, S.A.: Shared mental models in expert team decision making. In: Castellan, J. (ed.) Individual and Group Decision Making: Current Issues, pp. 221–246. Lawrence Erlbaum Associates, Hillsdale (1993)

    Google Scholar 

  6. Hofstede, G.: Dimensionalizing cultures: the Hofstede model in context. Online Readings Psychol. Cult. 2(1), 1–26 (2011)

    Article  Google Scholar 

  7. Zhang-Kennedy, L., Chiasson, S., Biddle, R.: Password advice shouldn’t be boring: visualizing password guessing attacks. In: Paper presented at the eCrime Researchers Summit, San Francisco, CA (2013)

    Google Scholar 

  8. Mohamed, M.A., Pillutla, S.: Cloud computing: a collaborative green platform for the knowledge society. J. Inf. Knowl. Syst. 44(3), 357–374 (2014)

    Google Scholar 

  9. Gyselinck, V., Tardieu, H.: The role of illustrations in text comprehension: what, when, for whom, and why? In: van Oostendorp, H., Goldman, S.R. (eds.) The construction of mental representations during reading, Mahwah, NJ, US, pp. 195–218. Lawrence Erlbaum Associates Publishers (1999)

    Google Scholar 

  10. Odoh, M., Chinedum, I.: Implementing 3D graphical password schemes. IOSR J. Electron. Commun. Eng. (IOSR-JECE) 9(6), 9–17 (2014)

    Google Scholar 

  11. Sahu, S., Singh, A.: Enhanced user graphical password authentication with an usability and memorability. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(6), 477–484 (2015)

    Google Scholar 

  12. Young, K., Rudin-Brown, C., Lenné, M., Williamson, A.: The implications of cross-regional differences for the design of in-vehicle information systems: a comparison of Australian and Chinese drivers. Appl. Ergon. 43(3), 564–573 (2012)

    Article  Google Scholar 

  13. Ford, G., Kotzè, P., Marcus, A.: Cultural dimensions: who is stereotyping whom? Internationalization Online Communities Soc. Comput. Des. Eval. 10, 1–10 (2005)

    Google Scholar 

  14. Liang, S.-F.: An axiomatic method for cross cultural usability analysis. In: Aykin, N. (ed.) Usability and Internationalization, vol. I, pp. 355–364. Springer, Heidelberg (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mona A. Mohamed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohamed, M.A., Chakraborty, J., Dehlinger, J. (2018). The Role of Mental Model in Graphical Password Selection and Design. In: Karwowski, W., Ahram, T. (eds) Intelligent Human Systems Integration. IHSI 2018. Advances in Intelligent Systems and Computing, vol 722. Springer, Cham. https://doi.org/10.1007/978-3-319-73888-8_94

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73888-8_94

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73887-1

  • Online ISBN: 978-3-319-73888-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics