Skip to main content

A Personalization Method Based on Human Factors for Improving Usability of User Authentication Tasks

  • Conference paper
User Modeling, Adaptation, and Personalization (UMAP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8538))

Abstract

Aiming to ensure safety of operation to application providers and improve the usability of human computer interactions during authentication, this paper proposes a two-step personalization approach of user authentication tasks based on individual differences in cognitive processing as follows: i) recommend a textual or graphical user authentication mechanism based on the users’ cognitive styles of processing textual and graphical information, and ii) recommend a standard or enhanced authentication key strength policy considering the users’ cognitive processing abilities. The proposed approach has been applied in a four month ecological valid user study in which 137 participants interacted with a personalized user authentication mechanism and policy based on their cognitive characteristics. Initial results indicate that personalizing the user authentication task based on human cognitive factors could provide a viable solution for balancing the security and usability of authentication mechanisms at the benefit of both application providers and end-users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Inglesant, P., Sasse, A.: The True Cost of Unusable Password Policies: Password use in the Wild. In: ACM SIGCHI International Conference on Human Factors in Computing Systems, pp. 383–392. ACM Press, New York (2010)

    Google Scholar 

  2. Biddle, R., Chiasson, S., van Oorschot, P.: Graphical Passwords: Learning from the First Twelve Years. J. ACM Computing Surveys 44(4), Article 19 (2012)

    Google Scholar 

  3. Mihajlov, M., Jerman-Blazic, B.: On Designing Usable and Secure Recognition-based Graphical Authentication Mechanisms. J. Interacting with Computers 23(6), 582–593 (2011)

    Article  Google Scholar 

  4. Zhang, J., Luo, X., Akkaladevi, S., Ziegelmayer, J.: Improving Multiple-password Recall: An Empirical Study. J. Information Security 18(2), 165–176 (2009)

    Google Scholar 

  5. Wright, N., Patrick, A., Biddle, R.: Do You See Your Password?: Applying Recognition to Textual Passwords. In: ACM International Symposium on Usable Privacy and Security, Article 8, 14 pages. ACM Press, New York (2012)

    Google Scholar 

  6. Komanduri, S., Shay, R., Kelley, P., Mazurek, M., Bauer, L., Christin, N., Cranor, L., Egelman, S.: Of Passwords and People: Measuring the Effect of Password-composition Policies. In: ACM International Conference on Human Factors in Computing Systems, pp. 2595–2604. ACM Press, New York (2011)

    Google Scholar 

  7. Stroop, J.R.: Studies of Interference in Serial Verbal Reactions. J. Experimental Psychology 18, 643–662 (1935)

    Article  Google Scholar 

  8. Baddeley, A.: Working Memory: Theories, Models, and Controversies. J. Annual Review of Psychology 63, 1–29 (2012)

    Article  Google Scholar 

  9. Riding, R., Cheema, I.: Cognitive Styles – An Overview and Integration. J. Educational Psychology 11(3-4), 193–215 (1991)

    Article  Google Scholar 

  10. Wu, X., Kumar, V., Quinlan, J., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G., Ng, A., Liu, B., Yu, P., Zhou, Z., Steinbach, M., Hand, D., Steinberg, D.: Top 10 Algorithms in Data Mining. J. Knowledge Information Systems 14(1), 1–37 (2007)

    Article  Google Scholar 

  11. Belk, M., Fidas, C., Germanakos, P., Samaras, G.: Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms. In: Kotzé, P., Marsden, G., Lindgaard, G., Wesson, J., Winckler, M. (eds.) INTERACT 2013, Part III. LNCS, vol. 8119, pp. 442–459. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  12. Belk, M., Germanakos, P., Fidas, C., Samaras, G.: Studying the Effect of Human Cognition on User Authentication Tasks. In: Carberry, S., Weibelzahl, S., Micarelli, A., Semeraro, G. (eds.) UMAP 2013. LNCS, vol. 7899, pp. 102–113. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  13. Schaie, W.: Developmental Influences on Adult Intelligence: The Seattle Longitudinal Study, 2nd edn. Oxford University Press, New York (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Belk, M., Germanakos, P., Fidas, C., Samaras, G. (2014). A Personalization Method Based on Human Factors for Improving Usability of User Authentication Tasks. In: Dimitrova, V., Kuflik, T., Chin, D., Ricci, F., Dolog, P., Houben, GJ. (eds) User Modeling, Adaptation, and Personalization. UMAP 2014. Lecture Notes in Computer Science, vol 8538. Springer, Cham. https://doi.org/10.1007/978-3-319-08786-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08786-3_2

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08785-6

  • Online ISBN: 978-3-319-08786-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics