Skip to main content

Studying the Effect of Human Cognition on User Authentication Tasks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7899))

Abstract

This paper studies the effect of individual differences in human cognition on user performance in authentication tasks. In particular, a text-based password and a recognition-based graphical authentication mechanism were deployed in the frame of an ecological valid experimental design, to investigate the effect of individuals’ different cognitive processing abilities toward efficiency and effectiveness of user authentication tasks. A total of 107 users participated in the reported study during a three-month period between September and November 2012. The results of this recent study can be interpreted under the light of human information processing as they demonstrate a main effect of users’ cognitive processing abilities on both efficiency and effectiveness related to authentication mechanisms. The main findings can be considered valuable for future deployment of adaptive security mechanisms since it has been initially shown that specific cognitive characteristics of users could be a determinant factor for the adaptation of security mechanisms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Herley, C., van Oorschot, P.: A Research Agenda Acknowledging the Persistence of Passwords. Security and Privacy 10(1), 28–36 (2012)

    Article  Google Scholar 

  2. Zhang, J., Luo, X., Akkaladevi, S., Ziegelmayer, J.: Improving Multiple-password Recall: An Empirical Study. Information Security 18(2), 165–176 (2009)

    Google Scholar 

  3. Schneier, B.: The Secret Question Is: Why do IT Systems use Insecure Passwords? The Guardian, UK (2009)

    Google Scholar 

  4. Cranor, F., Garfinkel, S.: Security and Usability: Designing Secure Systems That People Can Use. O’Reilly & Associates, Sebastopol (2005)

    Google Scholar 

  5. Jakobsson, M., Myers, S.: Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley-Interscience (2006)

    Google Scholar 

  6. Biddle, R., Chiasson, S., van Oorschot, P.: Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys 44(4), Article 19 (2012)

    Google Scholar 

  7. Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The Design and Analysis of Graphical Passwords. In: USENIX International Security Symposium, p. 1. USENIX Association, Berkley (1999)

    Google Scholar 

  8. Tao, H., Adams, C.: Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. Network Security 7(2), 273–292 (2008)

    Google Scholar 

  9. Bulling, A., Alt, F., Schmidt, A.: Increasing the Security of Gaze-based Cued-recall Graphical Passwords using Saliency Masks. In: ACM SIGCHI International Conference on Human Factors in Computing Systems, pp. 3011–3020. ACM Press, New York (2012)

    Google Scholar 

  10. Passfaces Corporation, The science behind Passfaces, http://passfaces.com/enterprise/resources/whitepapers.htm

  11. Mihajlov, M., Jerman-Blazic, B.: On Designing Usable and Secure Recognition-based Graphical Authentication Mechanisms. Interacting with Computers 23(6), 582–593 (2011)

    Article  Google Scholar 

  12. Adams, A., Sasse, A.: Users are not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures. Communications of the ACM 42(12), 40–46 (1999)

    Article  Google Scholar 

  13. Florencio, D., Herley, C.A.: Large-scale Study of Web Password Habits. In: ACM International Conference on World Wide Web, pp. 657–666. ACM Press, New York (2007)

    Chapter  Google Scholar 

  14. Inglesant, P., Sasse, A.: The True Cost of Unusable Password Policies: Password use in the Wild. In: ACM SIGCHI International Conference on Human Factors in Computing Systems, pp. 383–392. ACM Press, New York (2010)

    Google Scholar 

  15. Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.): Adaptive Web 2007. LNCS, vol. 4321. Springer, Heidelberg (2007)

    Google Scholar 

  16. Card, S.K., Moran, T.P., Newell, A.: The Model Human Processor: An Engineering Model of Human Performance. In: Boff, K.R., Kaufman, L., Thomas, J.P. (eds.) Handbook of Perception and Human Performance. Cognitive Processes and Performance, vol. 2, pp. 1–35 (1986)

    Google Scholar 

  17. Demetriou, A., Spanoudis, G., Shayer, S., Mouyi, A., Kazi, S., Platsidou, M.: Cycles in Speed-Working Memory-G Relations: Towards a Developmental-Differential Theory of the Mind. Intelligence 41, 34–50 (2013)

    Article  Google Scholar 

  18. Hunt, E.B.: Human Intelligence. Cambridge University Press, New York (2011)

    Google Scholar 

  19. Demetriou, A., Spanoudis, G., Mouyi, A.: Educating the Developing Mind: Towards an Overarching Paradigm. Educational Psychology Review 23(4), 601–663 (2011)

    Article  Google Scholar 

  20. MacLeod, C.M.: Half a Century of Research on the Stroop Effect: An Integrative review. Psychological Bulletin 109, 163–203 (1991)

    Article  Google Scholar 

  21. Posner, M.I., Raicle, M.E.: Images of Mind. Scientific American Library, New York (1997)

    Google Scholar 

  22. Stroop, J.R.: Studies of Interference in Serial Verbal Reactions. Experimental Psychology 18, 643–662 (1935)

    Article  Google Scholar 

  23. Baddeley, A.: Working Memory: Theories, Models, and Controversies. Annual Review of Psychology 63, 1–29 (2012)

    Article  Google Scholar 

  24. Baddeley, A.: Working Memory. Science 255(5044), 556–559 (1992)

    Article  Google Scholar 

  25. Shipstead, Z., Broadway, J.: Individual Differences in Working Memory Capacity and the Stroop Effect: Do High Spans Block the Words? Learning and Individual Differences (in press)

    Google Scholar 

  26. Demetriou, A., Christou, C., Spanoudis, G., Platsidou, M.: The Development of Mental Processing: Efficiency, Working Memory and Thinking. Monographs of the Society for Research in Child Development 67(1) (2002)

    Google Scholar 

  27. Anderson, J.R.: Cognitive Psychology and its Implications, 7th edn. Worth Publishers, New York (2009)

    Google Scholar 

  28. Ally, B.A., Budson, A.E.: The Worth of Pictures: Using High Density Event Related Potentials to Understand the Memorial Power of Pictures and the Dynamics of Recognition Memory. NeuroImage 35, 378–395 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Belk, M., Germanakos, P., Fidas, C., Samaras, G. (2013). Studying the Effect of Human Cognition on User Authentication Tasks. In: Carberry, S., Weibelzahl, S., Micarelli, A., Semeraro, G. (eds) User Modeling, Adaptation, and Personalization. UMAP 2013. Lecture Notes in Computer Science, vol 7899. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38844-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38844-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38843-9

  • Online ISBN: 978-3-642-38844-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics