skip to main content
10.1145/3172944.3172996acmconferencesArticle/Chapter ViewAbstractPublication PagesiuiConference Proceedingsconference-collections
short-paper

Eye Gaze-driven Prediction of Cognitive Differences during Graphical Password Composition

Published: 05 March 2018 Publication History

Abstract

Evidence suggests that individual cognitive differences affect users' memorability, visual behavior, and graphical passwords' security. Such knowledge denotes the added value of personalizing graphical password schemes towards the unique cognitive characteristics of the users. However, real-time and accurate cognition-based predictive user models are necessary to reach such a breakthrough. In this paper, we present the results of such an attempt, where an in-lab eye-tracking study was conducted with 36 participants who completed a recall-based graphical password composition task. We adopted a credible cognitive style theory, and investigated a variety of eye-tracking metrics to predict participants' cognitive styles. Results' analysis reveals that inferring individual cognitive differences in real-time during graphical password composition is feasible within a few seconds and that specific eye-tracking metrics correlate stronger with certain cognitive style groups. The findings further support the vision of incorporating real-time adaptive mechanisms in graphical password schemes for the benefit of service providers and end-users.

References

[1]
Charoula Angeli, Nicos Valanides, and Paul Kirschner. 2009. Field dependence--independence and instructional-design effects on learners? performance with a computer-modeling tool. Computers in Human Behavior 25, 6: 1355--1366.
[2]
Marios Belk, Christos Fidas, Panagiotis Germanakos, and George Samaras. 2017. The Interplay between Humans, Technology and User Authentication: A Cognitive Processing Perspective. Computers in Human Behavior.
[3]
Marios Belk, Christos Fidas, Christina Katsini, and George Avouris Nikolaos Samaras. 2017. Effects of human cognitive differences on interaction and visual behavior in graphical user authentication.
[4]
Natalie Clewley, Sherry Y. Chen, and Xiaohui Liu. 2009. Cognitive styles and web-based instruction: Field dependent/independent vs. Holist/Serialist. In 2009 IEEE International Conference on Systems, Man and Cybernetics, 2074--2079.
[5]
Natalie Clewley, Sherry Y. Chen, and Xiaohui Liu. 2010. Cognitive styles and search engine preferences. Journal of Documentation 66, 4: 585--603.
[6]
Katherine M. Everitt, Tanya Bragin, James Fogarty, and Tadayoshi Kohno. 2009. A comprehensive study of frequency, interference, and training of multiple graphical passwords. In Proceedings of the 27th international conference on Human factors in computing systems - CHI 09, 889.
[7]
Enrique Frias-Martinez, Sherry Y. Chen, and Xiaohui Liu. 2007. Automatic cognitive style identification of digital library users for personalization. Journal of the American Society for Information Science and Technology 58, 2: 237--251.
[8]
Joseph H. Goldberg and Jonathan I. Helfman. 2010. Comparing information graphics. In Proceedings of the 3rd BELIV'10 Workshop on BEyond time and errors: novel evaLuation methods for Information Visualization - BELIV '10, 71--78.
[9]
Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H. Witten. 2009. The WEKA data mining software. ACM SIGKDD Explorations Newsletter 11, 1: 10.
[10]
Limor Hochberg, Cecilia Ovesdotter Alm, Esa M Rantanen, Qi Yu, Caroline M Delong, Anne Haake, and Cecilia O Alm. 2014. Towards Automatic Annotation of Clinical Decision-Making Style. Proceedings of LAW VIII - The 8th Linguistic Annotation Workshop: 129--138.
[11]
Jon Chao Hong, Ming Yueh Hwang, Ker Ping Tam, Yi Hsuan Lai, and Li Chun Liu. 2012. Effects of cognitive style on digital jigsaw puzzle performance: A GridWare analysis. Computers in Human Behavior 28, 3: 920--928.
[12]
L. Huestegge and L. Pimenidis. 2014. Visual Search in Authentication Systems Based on Memorized Faces: Effects of Memory Load and Retention Interval. International Journal of Human-Computer Interaction 30, 7: 604--611.
[13]
Jeffrey Jay Johnson, Steve Seixeiro, Zachary Pace, Giles van der Bogert, Sean Gilmour, Levi Siebens, and Kenneth Tubbs. 2014. Picture Gesture Authentication.
[14]
Christina Katsini, Christos Fidas, Marios Belk, Nikolaos Avouris, and George Samaras. 2017. Influences of Users? Cognitive Strategies on Graphical Password Composition. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems - CHI EA '17, 2698--2705.
[15]
Christina Katsini, Christos Fidas, George E Raptis, Marios Belk, George Samaras, and Nikolaos Avouris. 2018. Influences of Human Cognition and Visual Behavior on Password Security during Picture Password Composition. In CHI 2018: CHI Conference on Human Factors in Computing.
[16]
Mohammad Khatib and Rasoul Mohammad Hosseinpur. 2011. On the Validity of the Group Embedded Figure Test (GEFT). Journal of Language Teaching and Research 2, 3.
[17]
Oleg V Komogortsev, Denise V Gobert, Sampath Jayarathna, Do Hyong Koh, and Sandeep M Gowda. 2010. Standardization of Automated Analyses of Oculomotor Fixation and Saccadic Behaviors. IEEE Transactions on Biomedical Engineering 57, 11: 2635--2645.
[18]
Franco Mawad, Marcela Trías, Ana Giménez, Alejandro Maiche, and Gastón Ares. 2015. Influence of cognitive style on information processing and selection of yogurt labels: Insights from an eye-tracking study. Food Research International 74: 1--9.
[19]
William Melicher, Michelle L. Mazurek, Darya Kurilova, Sean M. Segreti, Pranshu Kalvani, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2016. Usability and Security of Text Passwords on Mobile Devices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16, 527--539.
[20]
Efi A. Nisiforou and Andrew Laghos. 2013. Do the eyes have it? Using eye tracking to assess students cognitive dimensions. Educational Media International 50, 4: 247--265.
[21]
Efi A. Nisiforou, Eleni Michailidou, and Andrew Laghos. 2014. Using Eye Tracking to Understand the Impact of Cognitive Abilities on Search Tasks. . 46--57.
[22]
Efi Nisiforou and Andrew Laghos. 2016. Field Dependence--Independence and Eye Movement Patterns: Investigating Users' Differences Through an Eye Tracking Study. Interacting with Computers 28, 4: 407--420.
[23]
Philip K Oltman, Evelyn Raskin, and Herman A. Witkin. 1971. Group Embedded Figures Test. Consulting Psychologists Press, Palo Alto CA, USA.
[24]
George E. Raptis, Christos A. Fidas, and Nikolaos M. Avouris. 2016. Differences of Field Dependent / Independent Gamers on Cultural Heritage Playing?: Preliminary Findings of an Eye -- Tracking Study. . Springer International Publishing, 1--8.
[25]
George E. Raptis, Christos A. Fidas, and Nikolaos M. Avouris. 2016. Using Eye Tracking to Identify Cognitive Differences. Proceedings of the 20th Pan-Hellenic Conference on Informatics - PCI '16: 1--6.
[26]
George E. Raptis, Christina Katsini, Marios Belk, Christos Fidas, George Samaras, and Nikolaos Avouris. 2017. Using Eye Gaze Data and Visual Activities to Infer Human Cognitive Styles: Method and Feasibility Studies. In Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization - UMAP '17, 164--173.
[27]
George E Raptis, Christos A Fidas, and Nikolaos M Avouris. 2016. Do Field Dependence-Independence Differences of Game Players Affect Performance and Behaviour in Cultural Heritage Games? In Proceedings of the 2016 Annual Symposium on Computer-Human Interaction in Play - CHI PLAY '16, 38--43.
[28]
Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, and Michelle L. Mazurek. 2017. Diversify to Survive: Making Passwords Stronger with Adaptive Policies. The Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017): 1--12.
[29]
Ben Steichen, Giuseppe Carenini, and Cristina Conati. 2013. User-adaptive information visualization. In Proceedings of the 2013 international conference on Intelligent user interfaces - IUI '13, 317.
[30]
Ben Steichen, Michael M a Wu, Dereck Toker, Cristina Conati, and Giuseppe Carenini. 2014. Te,Te,Hi,Hi: Eye gaze sequence analysis for informing user-adaptive information visualizations. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8538: 183--194.
[31]
Tobii AB. Tobii Pro Glasses Analyzer User's Manual.
[32]
Dereck Toker, Sébastien Lallé, and Cristina Conati. 2017. Pupillometry and Head Distance to the Screen to Predict Skill Acquisition During Information Visualization Tasks. In Proceedings of the 22nd International Conference on Intelligent User Interfaces - IUI '17, 221--231.
[33]
Dereck Toker, Ben Steichen, Matthew Gingerich, Cristina Conati, and Giuseppe Carenini. 2014. Towards facilitating user skill acquisition. In Proceedings of the 19th international conference on Intelligent User Interfaces - IUI '14, 105--114.
[34]
Yi Wang, Jalal Mahmud, Taikun Liu, I B M Research-almaden, Harry Road, and San Jose. 2016. Understanding Cognitive Styles from User-Generated Social Media Content. In Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016).
[35]
James L. C. Wijnen and Cees J. Groot. 1984. An eye movement analysis system (EMAS) for the identification of cognitive processes on figural tasks. Behavior Research Methods, Instruments, & Computers 16, 3: 277--281.
[36]
Herman. A. Witkin, Carol A. Moore, Donald R. Goodenough, and Patricia W. Cox. 1975. Field-Dependent and Field-Independent Cognitive Styles and their Educational Implications. ETS Research Bulletin Series 1975, 2: 1--64.
[37]
Anatoly Yelizarov and Dennis Gamayunov. 2014. Adaptive Visualization Interface That Manages User's Cognitive Load Based on Interaction Characteristics. In Proceedings of the 7th International Symposium on Visual Information Communication and Interaction - VINCI '14, 1--8.

Cited By

View all
  • (2024)Cognitively Available Cybersecurity: A Systematic Literature ReviewHuman-Centered Software Engineering10.1007/978-3-031-64576-1_9(160-170)Online publication date: 8-Jul-2024
  • (2023)Exploring the Impact of Cognitive Styles on the Visualization of Privacy PoliciesProceedings of the 27th Pan-Hellenic Conference on Progress in Computing and Informatics10.1145/3635059.3635076(109-115)Online publication date: 24-Nov-2023
  • (2023)Human-centered Behavioral and Physiological SecurityProceedings of the 2023 New Security Paradigms Workshop10.1145/3633500.3633504(48-61)Online publication date: 18-Sep-2023
  • Show More Cited By

Index Terms

  1. Eye Gaze-driven Prediction of Cognitive Differences during Graphical Password Composition

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IUI '18: Proceedings of the 23rd International Conference on Intelligent User Interfaces
      March 2018
      698 pages
      ISBN:9781450349451
      DOI:10.1145/3172944
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 05 March 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. classification
      2. eye-tracking
      3. graphical user authentication
      4. human cognitive differences
      5. user modeling

      Qualifiers

      • Short-paper

      Funding Sources

      • ADVisE (University of Cyprus)
      • General Secretariat for Research and Technology (GSRT) and the Hellenic Foundation for Research and Innovation (H.F.R.I.)
      • SUCCESS

      Conference

      IUI'18
      Sponsor:

      Acceptance Rates

      IUI '18 Paper Acceptance Rate 43 of 299 submissions, 14%;
      Overall Acceptance Rate 746 of 2,811 submissions, 27%

      Upcoming Conference

      IUI '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)15
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 20 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Cognitively Available Cybersecurity: A Systematic Literature ReviewHuman-Centered Software Engineering10.1007/978-3-031-64576-1_9(160-170)Online publication date: 8-Jul-2024
      • (2023)Exploring the Impact of Cognitive Styles on the Visualization of Privacy PoliciesProceedings of the 27th Pan-Hellenic Conference on Progress in Computing and Informatics10.1145/3635059.3635076(109-115)Online publication date: 24-Nov-2023
      • (2023)Human-centered Behavioral and Physiological SecurityProceedings of the 2023 New Security Paradigms Workshop10.1145/3633500.3633504(48-61)Online publication date: 18-Sep-2023
      • (2021)Gaze Behavior Effect on Gaze Data Visualization at Different Abstraction LevelsSensors10.3390/s2114468621:14(4686)Online publication date: 8-Jul-2021
      • (2021)WhatShapeWhatColor: Designing a Puzzle Game to Elicit the Field Dependence-Independence Cognitive StyleProceedings of the 25th Pan-Hellenic Conference on Informatics10.1145/3503823.3503861(200-205)Online publication date: 26-Nov-2021
      • (2021)A Comparative Study among Different Computer Vision Algorithms for Assisting Users in Picture Password CompositionAdjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization10.1145/3450614.3464474(357-362)Online publication date: 21-Jun-2021
      • (2021)Eye-GUAna: Higher Gaze-Based Entropy and Increased Password Space in Graphical User Authentication Through GamificationACM Symposium on Eye Tracking Research and Applications10.1145/3448018.3458615(1-7)Online publication date: 25-May-2021
      • (2021)Investigating the Effects of Individual Cognitive Styles on Collaborative GameplayACM Transactions on Computer-Human Interaction10.1145/344579228:4(1-49)Online publication date: 11-Aug-2021
      • (2021)An Empirical Study of Picture Password Composition on SmartwatchesHuman-Computer Interaction – INTERACT 202110.1007/978-3-030-85610-6_37(655-664)Online publication date: 30-Aug-2021
      • (2020)CogniPGA: Longitudinal Evaluation of Picture Gesture Authentication with Cognition-Based Interventioni-com10.1515/icom-2019-001118:3(237-257)Online publication date: 14-Jan-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media