Click to Enter: Comparing Graphical and Textual Passwords for Children

被引:7
|
作者
Cole, Jasper [1 ]
Walsh, Greg [1 ]
Pease, Zachary [1 ]
机构
[1] Univ Baltimore, Digital Whimsy Lab, Baltimore, MD 21201 USA
关键词
Security; Passwords; Children;
D O I
10.1145/3078072.3084311
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work outlines a study comparing graphical and textual passwords. A study was conducted with 13 children between the ages of six and twelve years old. These participants created their own textual and graphical passwords for fictional Web sites and after two weeks, participants returned and attempted to recall the usernames and passwords that they created. Our preliminary results showed that graphical passwords had a lower success rate and participants were less likely to access their accounts when using graphical passwords. Whether using graphical or textual passwords, children succeeded with generalities, but struggled with specifics.
引用
收藏
页码:472 / 477
页数:6
相关论文
共 50 条
  • [41] Investigating the Viability of Multifactor Graphical Passwords for User Authentication
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    [J]. INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 10 - 21
  • [42] Graphical Passwords as Browser Extension: Implementation and Usability Study
    Bicakci, Kemal
    Yuceel, Mustafa
    Erdeniz, Burak
    Gurbaslar, Hakan
    Atalay, Nart Bedin
    [J]. TRUST MANAGEMENT III, 2009, 300 : 15 - +
  • [43] Graphical Passwords: Learning from the First Twelve Years
    Biddle, Robert
    Chiasson, Sonia
    Van Oorschot, P. C.
    [J]. ACM COMPUTING SURVEYS, 2012, 44 (04)
  • [44] Pictures at the ATM: Exploring the usability of multiple graphical passwords
    Moncur, Wendy
    Leplatre, Gregory
    [J]. CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1 AND 2, 2007, : 887 - 894
  • [45] TwoStep: An Authentication Method Combining Text and Graphical Passwords
    van Oorschot, P. C.
    Wan, Tao
    [J]. E-TECHNOLOGIES-INNOVATION IN AN OPEN WORLD, 2009, 26 : 233 - 239
  • [46] Is it Better to Choose Seen or Unseen Distracters for Graphical Passwords
    Ashraf, Abdul
    Poet, Ron
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [47] Optimal Discretization for High-Entropy Graphical Passwords
    Bicakci, Kemal
    [J]. 23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 48 - 53
  • [48] A Preliminary Study to Evaluate Graphical Passwords for Older Adults
    Jittibumrungrak, Paranya
    Hongwarittorrn, Nuttanont
    [J]. PROCEEDINGS OF CHIUXID 2019: 5TH INTERNATIONAL ACM IN-COOPERATION HCI AND UX CONFERENCE, 2019, : 88 - 95
  • [49] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
    Saadi, Zena Mohammad
    Sadiq, Ahmed T.
    Akif, Omar Z.
    Farhan, Alaa K.
    [J]. ELECTRONICS, 2024, 13 (15)
  • [50] On predictive models and user-drawn graphical passwords
    Van Oorschot, P. C.
    Thorpe, Julie
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)