Exploring the Acceptability of Graphical Passwords for People with Dyslexia

被引:2
|
作者
Evtimova, Polina [1 ]
Nicholson, James [1 ]
机构
[1] Northumbria Univ, Newcastle Upon Tyne, Tyne & Wear, England
关键词
Dyslexia; Authentication; Passwords; Graphical passwords; HCI; INDIVIDUAL-DIFFERENCES; SECURITY;
D O I
10.1007/978-3-030-85623-6_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Alphanumeric passwords are still the most common form of user authentication despite well-known usability issues. These issues, including weak composition and poor memorability, have been well-established across different user groups, yet users with dyslexia have not been studied despite making up approximately 10% of the population. In this paper, we focus on understanding the user authentication experiences of people with dyslexia (PwD) in order to better understanding their attitudes towards a graphical password system that may provide a more inclusive experience. Through interactive interviews, participants were encouraged to try three different knowledge-based authentication systems (PIN, password, and graphical password) and then discuss their strategies behind code composition. We found that PwD employed potentially dangerous workarounds when composing passwords, in particular an over-reliance on pattern-based composition. We report on how PwD do not immediately see the benefits of graphical passwords, but upon experiencing the mechanism we see opportunities for more inclusive authentication.
引用
收藏
页码:213 / 222
页数:10
相关论文
共 50 条
  • [31] Graphical Passwords as Browser Extension: Implementation and Usability Study
    Bicakci, Kemal
    Yuceel, Mustafa
    Erdeniz, Burak
    Gurbaslar, Hakan
    Atalay, Nart Bedin
    [J]. TRUST MANAGEMENT III, 2009, 300 : 15 - +
  • [32] Graphical Passwords: Learning from the First Twelve Years
    Biddle, Robert
    Chiasson, Sonia
    Van Oorschot, P. C.
    [J]. ACM COMPUTING SURVEYS, 2012, 44 (04)
  • [33] Exploiting predictability in click-based graphical passwords
    van Oorschot, P.
    Thorpe, Julie
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (04) : 669 - 702
  • [34] TwoStep: An Authentication Method Combining Text and Graphical Passwords
    van Oorschot, P. C.
    Wan, Tao
    [J]. E-TECHNOLOGIES-INNOVATION IN AN OPEN WORLD, 2009, 26 : 233 - 239
  • [35] Is it Better to Choose Seen or Unseen Distracters for Graphical Passwords
    Ashraf, Abdul
    Poet, Ron
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [36] Optimal Discretization for High-Entropy Graphical Passwords
    Bicakci, Kemal
    [J]. 23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 48 - 53
  • [37] A Preliminary Study to Evaluate Graphical Passwords for Older Adults
    Jittibumrungrak, Paranya
    Hongwarittorrn, Nuttanont
    [J]. PROCEEDINGS OF CHIUXID 2019: 5TH INTERNATIONAL ACM IN-COOPERATION HCI AND UX CONFERENCE, 2019, : 88 - 95
  • [38] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
    Saadi, Zena Mohammad
    Sadiq, Ahmed T.
    Akif, Omar Z.
    Farhan, Alaa K.
    [J]. ELECTRONICS, 2024, 13 (15)
  • [39] On predictive models and user-drawn graphical passwords
    Van Oorschot, P. C.
    Thorpe, Julie
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
  • [40] Click to Enter: Comparing Graphical and Textual Passwords for Children
    Cole, Jasper
    Walsh, Greg
    Pease, Zachary
    [J]. PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INTERACTION DESIGN AND CHILDREN (IDC 2017), 2017, : 472 - 477