skip to main content
10.1145/3328243.3328255acmotherconferencesArticle/Chapter ViewAbstractPublication PageschiuxidConference Proceedingsconference-collections
research-article

A Preliminary Study to Evaluate Graphical Passwords for Older Adults

Authors Info & Claims
Published:01 April 2019Publication History

ABSTRACT

Picture-based authentication offers visual cues (e.g. images) that helps users recalling their passwords. Human facial images were utilized in making graphical passwords, as humans are better at remembering human faces than other types of images. Prior research found that users performed better with the partitioned facial images than with the full-face portrait images; nevertheless, age-related differences were not considered. This present research is a preliminary study to assess older adults' understanding toward Passface and overall experimental procedure, by examining two levels of facial image presentation: full-face portrait image, and partitioned facial image. The results showed that the partitioned facial image aided memory and recall better than the full-face portrait image, which was reflected by registration time, authentication time and success rate. In general, majority of older adults were able to understand Passface and overall experimental procedure.

References

  1. Kanin Udomsukprasert. 2012. A Study of Password Setting Behavior of Working Internet Users in Thailand. M.Sc. Thesis. King Mongkut's University of Technology North Bangkok, Bangkok, Thailand.Google ScholarGoogle Scholar
  2. Anne Adams and Martina A. Sasse. 1999. User are not the enemy. Magazine Communication of the ACM. 42, 12 (December 1999), 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Rachna Dhamija and Adrian Perrig. 2000. Déjà Vu: A User Study Using Images for Authentication. In Proceedings of the 9th Conference on USENIX Security Symposium, 45--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Roger N. Shepard. 1967. Recognition Memory for Words, Sentences, and Pictures. Journal of Verbal Learning and Verbal Behavior 6, 1: 156--163.Google ScholarGoogle ScholarCross RefCross Ref
  5. Nipat Pattarasophonkul. 2014. Effects of Facial Image Displays and Password Setting Turns on Password Recall. M.Sc. Thesis. Thammasat University, Pathum Thani, Thailand.Google ScholarGoogle Scholar
  6. Pew Research Center. Internet/Broadband Fact Sheet. 2018. Retrieved October 30, 2018 from http://www.pewinternet.org/fact-sheet/internet-broadband/Google ScholarGoogle Scholar
  7. Apsornsiri Iampracha. 2014. Chapter 3 Human Development. Retrieved November 1, 2018 from http://www.educ-bkkthon.com/blog/apsornsiri/wpcontent/uploads/2014/02/DocumentGS101-Chapter-3_57.pdfGoogle ScholarGoogle Scholar
  8. Aimée K. Bright and Lynne Coventry. 2013. Assistive technology for older adults: psychological and socioemotional design requirements. In Proceedings of the 6th International Conference on Pervasive Technologies Related to Assistive Environments. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jakob Nielsen. 2013. Usability for senior citizens. Retrieved October 30, 2018 from https://www.nngroup.com/articles/usability-for-senior-citizens/Google ScholarGoogle Scholar
  10. Margaret W. Matlin. 2009. Cognitive Psychology. John Wiley & Sons (Asia) Pte Ltd.Google ScholarGoogle Scholar
  11. OpenStax. Chapter 8 Memory: How Memory Functions. 2014. Retrieved November 2, 2018 from https://courses.lumenlearning.com/wsu-sandbox/chapter/how-memory-functions/?fbclid=IwAR3S8tAsVjese-B0rPBPqPBj7E0aCvQudihmC2f9mh-APwFe9hp9xX7ovSA/Google ScholarGoogle Scholar
  12. Ubolwanna Pavakanun. 2013. Cognitive Psychology. Thammasat University.Google ScholarGoogle Scholar
  13. Raluca Budiu.2014. Memory Recognition and Recall in User Interfaces. Retrieved November 2, 2018 from https://www.nngroup.com/articles/recognition-and-recall/?fbclid=IwAR0f-H3byiSXVYPZvH4xNANaMd18vEIoRcnY4ZacaVcUQ8gdC2LkkNo8Trs/Google ScholarGoogle Scholar
  14. Wendy A. Rogers, Aideen J. Stronge, and Arthur D. Fisk. 2005. Technology and Aging. Reviews of Human Factors and Ergonomics. 1, 1(June 2005), 130--171.Google ScholarGoogle ScholarCross RefCross Ref
  15. John W. Santrock. 2008. Life-Span Development. University of Texas at Dallas.Google ScholarGoogle Scholar
  16. Real User. Passfaces: Two Factor Authentication for the Enterprise. 2005. Retrieved October 30, 2018 from http://www.realuser.com/Google ScholarGoogle Scholar
  17. Farnaz Towhidi, Maslin Masrom, and Azizah A. Manaf. 2013. An Enhancement on Passface Graphical Password Authentication. Journal of Basic and Applied Scientific Research 3, 2: 135--141.Google ScholarGoogle Scholar
  18. Rattanawalee Khruasawat. 2014. The Influence of Type of Pictures and Captions on Effectiveness of Graphical Password. M.Sc. Thesis. Thammasat University, Pathum Thani, Thailand.Google ScholarGoogle Scholar
  19. Raywadee Sakdulyatham. 2016. User Interface (UI) on Smart Phone for elderly Users. Ph.D. Dissertation. Chulalongkorn University, Bangkok, Thailand.Google ScholarGoogle Scholar
  20. Churairat Duangchan and Seree Chadcham. 2013. An Event-Related Brain Potentials Evidence for the Effect of Interactive Imagery on Face-Name Associative Recognition in Elderly. Research Methodology & Cognitive Science 11, 2: 1--15.Google ScholarGoogle Scholar
  21. Wonil Hwang and Gavriel Salvendy. 2010. Number of people required for usability evaluation: the 10±2 rule. Magazine Communication of the ACM. 53, 5 (May 2010), 130--133. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Eleanor H. Rosch. 1973. Natural categories. Cognitive Psychology 4, 3: 328--350.Google ScholarGoogle ScholarCross RefCross Ref
  23. Ainat Pansky and Asher Koriat, A. 2004. The basiclevel convergence effect on memory distortions. Psychological Science 15, 1: 52--59.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Preliminary Study to Evaluate Graphical Passwords for Older Adults

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CHIuXiD'19: Proceedings of the 5th International ACM In-Cooperation HCI and UX Conference
      April 2019
      205 pages
      ISBN:9781450361873
      DOI:10.1145/3328243

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 April 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate22of50submissions,44%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader