Abstract
This paper studies the effect of individual differences in human cognition on user performance in authentication tasks. In particular, a text-based password and a recognition-based graphical authentication mechanism were deployed in the frame of an ecological valid experimental design, to investigate the effect of individuals’ different cognitive processing abilities toward efficiency and effectiveness of user authentication tasks. A total of 107 users participated in the reported study during a three-month period between September and November 2012. The results of this recent study can be interpreted under the light of human information processing as they demonstrate a main effect of users’ cognitive processing abilities on both efficiency and effectiveness related to authentication mechanisms. The main findings can be considered valuable for future deployment of adaptive security mechanisms since it has been initially shown that specific cognitive characteristics of users could be a determinant factor for the adaptation of security mechanisms.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Herley, C., van Oorschot, P.: A Research Agenda Acknowledging the Persistence of Passwords. Security and Privacy 10(1), 28–36 (2012)
Zhang, J., Luo, X., Akkaladevi, S., Ziegelmayer, J.: Improving Multiple-password Recall: An Empirical Study. Information Security 18(2), 165–176 (2009)
Schneier, B.: The Secret Question Is: Why do IT Systems use Insecure Passwords? The Guardian, UK (2009)
Cranor, F., Garfinkel, S.: Security and Usability: Designing Secure Systems That People Can Use. O’Reilly & Associates, Sebastopol (2005)
Jakobsson, M., Myers, S.: Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley-Interscience (2006)
Biddle, R., Chiasson, S., van Oorschot, P.: Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys 44(4), Article 19 (2012)
Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The Design and Analysis of Graphical Passwords. In: USENIX International Security Symposium, p. 1. USENIX Association, Berkley (1999)
Tao, H., Adams, C.: Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. Network Security 7(2), 273–292 (2008)
Bulling, A., Alt, F., Schmidt, A.: Increasing the Security of Gaze-based Cued-recall Graphical Passwords using Saliency Masks. In: ACM SIGCHI International Conference on Human Factors in Computing Systems, pp. 3011–3020. ACM Press, New York (2012)
Passfaces Corporation, The science behind Passfaces, http://passfaces.com/enterprise/resources/whitepapers.htm
Mihajlov, M., Jerman-Blazic, B.: On Designing Usable and Secure Recognition-based Graphical Authentication Mechanisms. Interacting with Computers 23(6), 582–593 (2011)
Adams, A., Sasse, A.: Users are not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures. Communications of the ACM 42(12), 40–46 (1999)
Florencio, D., Herley, C.A.: Large-scale Study of Web Password Habits. In: ACM International Conference on World Wide Web, pp. 657–666. ACM Press, New York (2007)
Inglesant, P., Sasse, A.: The True Cost of Unusable Password Policies: Password use in the Wild. In: ACM SIGCHI International Conference on Human Factors in Computing Systems, pp. 383–392. ACM Press, New York (2010)
Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.): Adaptive Web 2007. LNCS, vol. 4321. Springer, Heidelberg (2007)
Card, S.K., Moran, T.P., Newell, A.: The Model Human Processor: An Engineering Model of Human Performance. In: Boff, K.R., Kaufman, L., Thomas, J.P. (eds.) Handbook of Perception and Human Performance. Cognitive Processes and Performance, vol. 2, pp. 1–35 (1986)
Demetriou, A., Spanoudis, G., Shayer, S., Mouyi, A., Kazi, S., Platsidou, M.: Cycles in Speed-Working Memory-G Relations: Towards a Developmental-Differential Theory of the Mind. Intelligence 41, 34–50 (2013)
Hunt, E.B.: Human Intelligence. Cambridge University Press, New York (2011)
Demetriou, A., Spanoudis, G., Mouyi, A.: Educating the Developing Mind: Towards an Overarching Paradigm. Educational Psychology Review 23(4), 601–663 (2011)
MacLeod, C.M.: Half a Century of Research on the Stroop Effect: An Integrative review. Psychological Bulletin 109, 163–203 (1991)
Posner, M.I., Raicle, M.E.: Images of Mind. Scientific American Library, New York (1997)
Stroop, J.R.: Studies of Interference in Serial Verbal Reactions. Experimental Psychology 18, 643–662 (1935)
Baddeley, A.: Working Memory: Theories, Models, and Controversies. Annual Review of Psychology 63, 1–29 (2012)
Baddeley, A.: Working Memory. Science 255(5044), 556–559 (1992)
Shipstead, Z., Broadway, J.: Individual Differences in Working Memory Capacity and the Stroop Effect: Do High Spans Block the Words? Learning and Individual Differences (in press)
Demetriou, A., Christou, C., Spanoudis, G., Platsidou, M.: The Development of Mental Processing: Efficiency, Working Memory and Thinking. Monographs of the Society for Research in Child Development 67(1) (2002)
Anderson, J.R.: Cognitive Psychology and its Implications, 7th edn. Worth Publishers, New York (2009)
Ally, B.A., Budson, A.E.: The Worth of Pictures: Using High Density Event Related Potentials to Understand the Memorial Power of Pictures and the Dynamics of Recognition Memory. NeuroImage 35, 378–395 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Belk, M., Germanakos, P., Fidas, C., Samaras, G. (2013). Studying the Effect of Human Cognition on User Authentication Tasks. In: Carberry, S., Weibelzahl, S., Micarelli, A., Semeraro, G. (eds) User Modeling, Adaptation, and Personalization. UMAP 2013. Lecture Notes in Computer Science, vol 7899. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38844-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-38844-6_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38843-9
Online ISBN: 978-3-642-38844-6
eBook Packages: Computer ScienceComputer Science (R0)