skip to main content
10.1145/3132465.3132472acmconferencesArticle/Chapter ViewAbstractPublication PagessecConference Proceedingsconference-collections
research-article

Graphical passwords for older computer users

Published: 14 October 2017 Publication History

Abstract

Traditional text password authentication is widely used to gain access to computing resources. Older users find the cognitive effort, and manual dexterity skills needed to use strong text passwords challenging. We designed and evaluated our Graphical Password system based on touchscreen selection of familiar facial images embedded randomly among unfamiliar, yet similar images. In our usability study, older users demonstrated a recall rate of 97%, password entropy superior to short PINs, and authentication time comparable to short text passwords.

References

[1]
Sacha Brostoff and M. Angela Sasse. 2000. Are Passfaces More Usable Than Passwords? A Field Trial Investigation. People and Computers XIV-Usability or Else!, 405--424.
[2]
Rafael A. Calvo and Dorian Peters. 2014. Positive Computing: Technology for Well-Being and Human Potential. The MIT Press, Cambridge, MA.
[3]
Nancy Carter. 2015. Graphical Passwords for Older Computer Users. In Doctoral Symposium at 28th ACM User Interface Software and Technology Symposium (UIST 2015), ACM Press, New York, NY, 29--32.
[4]
Soumyadeb Chowdhury, Ron Poet, and Lewis Mackenzie. 2014. Passhint: Memorable and Secure Authentication. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2014), ACM Press, New York, NY, 2917--2926.
[5]
Paul Dunphy and Jeff Yan. 2007. Do Background Images Improve "Draw a Secret" Graphical Passwords? In Proceedings of the 14th ACM conference on Computer and Communications Security (CCS 2007), ACM Press, New York, NY, 36--47.
[6]
Faraz Farzin, Chuan Hou, and Anthony M. Norcia. 2012. Piecing it together: Infants' neural responses to face and object structure. J. Vision 12, 6 (December 2012). 14 pages.
[7]
Leah Findlater, Jon E. Froehlich, Kays Fattal, Jacob O. Wobbrock, and Tanya Dastyar. 2013. Age-Related Differences in Performance with Touchscreens Compared to Traditional Mouse Input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2013). ACM Press, New York, NY, 343--346.
[8]
Dinei Florencio and Cormac Herley. 2007. A Large-Scale Study of Web Password Habits. In Proceedings of the 16th International Conference on World Wide Web 2007(WWW 2007). ACM Press, New York, NY, 657--666.
[9]
Marian Harbach, Emanuel von Zezschwitz, Andreas Fichter, Alexander De Luca, and Matthew Smith. 2014. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking. In Tenth Symposium on Usable Privacy and Security (SOUPS 2014). 213--230.
[10]
Nancy Kanwisher. 2010. Functional specificity in the human brain: A window into the functional architecture of the mind. In Proceedings of the National Academy of Sciences of the United States of America. Washington, DC, 11163--11170.
[11]
James Nicholson, Lynne Coventry and Pam Briggs. 2013. Age-Related Performance Issues for PIN and Face-based Authentication Systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM Press, New York, NY, 323--332.
[12]
Passfaces Corporation. 2015. The science behind Passfaces. Retrieved April 2015 from http://www.passfaces.com/published/The%20Science%20Behind%20Passfaces.pdf.
[13]
Wikipedia. 2017. Password Strength. Retrieved from https://en.wikipedia.org/wiki/Password_strength
[14]
Pew Research Center. 2014. Older Adults and Technology Use. Retrieved May 16, 2017 from http://www.pewinternet.org/2014/04/03/older-adults-and-technology-use/.
[15]
Pew Research Center. 2015. U.S. Smartphone Use in 2015. Retrieved May 16, 2017 from http://www.pewinternet.org/files/2015/03/PI_Smartphones_0401151.pdf.
[16]
United States Census Bureau. 2014. An Aging Nation: The Older Population in the United States. P25-1140.
[17]
Nicolas Van Balen and Haining Wang. 2015. GridMap: Enhanced Security in Cued-Recall Graphical Passwords. In International Conference on Security and Privacy in Communications Networks. SpringerLink, 75--94.
[18]
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, and Nasir Memon. 2005. PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63, 1--2 (July 2005), 102--127.

Cited By

View all
  • (2022)Password Challenges for Older People in China and the United KingdomComputers Helping People with Special Needs10.1007/978-3-031-08645-8_5(34-40)Online publication date: 1-Jul-2022
  • (2020)Cognitive Mobile Design Guidelines for the Elderly: A Preliminary Study2020 17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)10.1109/ECTI-CON49241.2020.9157905(673-678)Online publication date: Jun-2020
  • (2018)A New Password Authentication Mechanism Using 2D Shapes2018 8th International Conference on Computer Science and Information Technology (CSIT)10.1109/CSIT.2018.8486188(113-118)Online publication date: Jul-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HotWeb '17: Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies
October 2017
97 pages
ISBN:9781450355278
DOI:10.1145/3132465
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tag

  1. older users

Qualifiers

  • Research-article

Conference

SEC '17
Sponsor:
SEC '17: IEEE/ACM Symposium on Edge Computing
October 14, 2017
California, San Jose

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Password Challenges for Older People in China and the United KingdomComputers Helping People with Special Needs10.1007/978-3-031-08645-8_5(34-40)Online publication date: 1-Jul-2022
  • (2020)Cognitive Mobile Design Guidelines for the Elderly: A Preliminary Study2020 17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)10.1109/ECTI-CON49241.2020.9157905(673-678)Online publication date: Jun-2020
  • (2018)A New Password Authentication Mechanism Using 2D Shapes2018 8th International Conference on Computer Science and Information Technology (CSIT)10.1109/CSIT.2018.8486188(113-118)Online publication date: Jul-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media