Abstract
The Web is an invaluable resource for users of all ages, but it especially offers facilities which can make a huge difference to the lives of elderly users, many of whom have to contend with limited mobility and frequent illness. Whereas there is some understanding of the issues that pertain to designing websites for this group of users, the issue of specialized Web authentication has not received much attention. Web authentication is often treated as a one-size-fits-all problem with ubiquitous use of the password, and indeed authentication is seldom tailored to the needs of either the site or the target users. Sites are seldom subjected to a risk analysis before an authentication mechanism is chosen. This paper proposes a technique for matching the risk levels of a website to the security rating of an authentication mechanism and presents an authentication mechanism that is tailored to the needs of elderly users for protecting sites with a low risk rating. Usage data from a field test of this mechanism is reported, which show that the mechanism is indeed feasible and meets older users’ needs.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akatsu, H. & Miki, H. [2004], Usability Research for the Elderly People, Oki Technical Review 71(3).
Bartomoleo, P., Bachoud-Lévi, A.-C., Chokron, S. & Degos, J.-D. [2002], Visually and Motor-based Knowledge of Letters: Evidence from a Pure Alexic Patient, Neurosychologica 40(8), 1363–71.
BBC [2003], Clue to Old Age Memory Loss. http://news.bbc.co.uk/2/hi/health/3040203.stm.
Berghel, H. [2000], Identity Theft, Social Security Numbers, and the Web, Communications of the ACM 43(2), 17–21.
Braghin, C. [2000], Biometric Authentication. Available at http://citeseer.ist.psu.edu/436492.html (last accessed 2005-04-13).
Chisnell, D. & Redish, J. [2005], Who is the Older Adult in Your Audience?, intercom. http://www.stc.org/intercom/PDFs/2005/200501_10.pdf (last accessed 2005-04-13).
Chisnell, D., Lee, A. & Redish, J. [2004], Design Web Sites for Older Users: Comparing AARP’s Studies to Earlier Findings. http://www.aarp.org/olderwiserwired/oww-features/Articles/a2004-03-03-comparison-studies.html (last accessed 2005-04-13).
Damle, P. [2002], Social Engineering: A Tip of the Iceberg, Information Systems Control Journal 2. http://www.isaca.org/Template.cfm?Section=Archives&CONTENTID=17032&TEMPLATE=/ContentManagement/ContentDisplay.cfm.
De Angeli, A., Coutts, M., Coventry, L. & Johnson, G. I. [2002], VIP: A Visual Approach to User Authentication, in S. Levialdi (ed.), Proceedings of the Conference on Advanced Visual Interface (AVI2002), ACM Press, pp.316–23.
Dhamija, R. & Perrig, A. [2000], Déjà vu: A User Study Using Images for Authentication, in Proceedings of 9th USENIX Security Symposium, The USENIX Association, Denver, Colorado, pp.45–58. http://www.usenix.org/events/sec2000/full_papers/dhamija/dhamija.pdf.
Doran, G. D. [1999], Touchy Subject Biometric Technology: Is It Time for Your Computer to Get to Know You?, http://www.entrepreneur.com/Magazines/Copy_of_MA_SegArticle/0,4453,230131,00.html. Entrepreneur magazine.
Ellison, C., Hall, C., Milbert, R. & Schneier, B. [2000], Protecting Secret Keys with Personal Entropy, Future Generation Computer Systems 16, 311–8.
Engardio, P. & Matlack, C. [2005], Global Aging. Business Week, JANUARY 31, http://www.businessweek.com/magazine/content/05_05/b3918011.htm.
Friedman, B., Hurley, D., Howe, D. C., Nissenbaum, H. & Felten, E. [2002], Users’ Conceptions of Risks and Harms on the Web: A Comparative Study, in D. Wixon (ed.), Proceedings of SIGCHI Conference on Human Factors in Computing Systems: Changing our World, Changing Ourselves (CHI’02), CHI Letters 4(1), ACM Press, pp.614–615.
Garfinkel, S. [2002], Biometrics Slouches Toward the Mainstream. CSO Online. http://www.csoonline.com/read/090402/machine.html.
Gill, J. [2004], Design of Smart Card Systems to Meet the Needs of Disabled and Elderly Persons. Tiresias.org Scientific and Technological Reports. http://www.tiresias.org/reports/ecart.htm.
Hawthorn, D. [2003], How universal is good design for older users?, in CUU’ 03: Proceedings of the 2003 conference on Universal Usability, ACM Press, pp. 38–45.
Heckman, J. G., Lang, C. J. & Neundorfer, B. [2001], Recognition of Familiar Handwriting in Stroke and Dementia, Neurology 57(11), 2128–31.
IASEP [2000], Data Security Protocol for Education, http://iasep.soe.purdue.edu/Protocol/home_page.htm. Center for Information Assurance and Security and the Indiana Assessment System of Education Proficiencies. Purdue Research Foundation.
Knoblich, G. & Prinz, W. [2001], Recognition of self-generated actions from kinematic displays of drawing, Journal of Experimental Psychology: Human Perception and Performance 27(2), 456–65.
Leonard, K. [2003], The Importance of Being Secure: The ROI of Web Security, Information Systems Control Journal 5. http://www.isaca.org/Template.cfm?Section=Archives&CONTENTID=16729&TEMPLATE=/ContentManagement/ContentDisplay.cfm.
Longcamp, M., Anton, J. L., Roth, M. & Velay, J. L. [2003], Visual Presentation of Single Letters Activates a Premotor Area Involved in Writing, Neuroimage 19(4), 1492–500.
Mavis, B. E. & Brocato, J. J. [1998], Postal Surveys versus Electronic Mail Surveys. The Tortoise and the Hare Revisited, Evaluation & The Health Professions 21(3), 395–408.
Miller, J. C. [2000], Risk Assessment for your Web Site, http://www.irmi.com/irmicom/expert/articles/2000/schoenfeld09.aspx. IRMI.com. International Risk Management Institute.
Park, D. C., Puglisi, J. T. & Smith, A. D. [1986], Memory for pictures: Does an age-related decline exist?, Journal of Psychology and Aging 1(1), 11–7.
Renaud, K. & De Angeli, A. [2004], My Password is Here! An Investigation into Visuo-spatial Authentication Mechanisms, Interacting with Computers 16(6), 1017–41.
Renaud, K. V. [2004], Quantification of Authentication Mechanisms — A Usability Perspective, Journal of Web Engineering 3(2), 95–123.
Schreider, T. [2003], Risk Assessment Tools: A Primer, Information Systems Control Journal 2. http://www.isaca.org/TemplateRedirect.cfm?template=/ContentManagement/ContentDisplay.cfm&ContentID=16222.
Seki, K., Yajima, M. & Sugishita, M. [1995], The Efficacy of Kinesthetic Reading Treatment for Pure Alexia, Neuropsychologica 33(5), 595–609.
Srihari, S. N., Tomai, C., Lee, S. & Zhang, B. [2003], Individuality of Numerals, in A. Antonacopoulos (ed.), Proceedings of the Seventh IEEE International Conference on Document Analysis and Recognition, IEEE Computer Society Press, Edinburgh, Scotland, pp. 1096–100.
Starren, J., Sengupta, S., Hripcsak, G., Ring, G., Klerer, R. & Shea, S. [2001], Making Grandma’s Data Secure: A Security Architecture for Home Telemedicine, in S. Bakken (ed.), Proceedings of the AMIA Symposium, AMIA, pp.657–61.
Trostel, P. A. & Taylor, G. A. [2001], Theory of Time Preference, Economic Inquiry 39(3), 379–95.
Walker, T. [2001], Fighting Security Breaches and Cyberattacks with Two-factor Authentication Technology, Information Systems Control Journal 2. http://www.isaca.org/TemplateRedirect.cfm?template=/ContentManagement/ContentDisplay. cfm&ContentID=17187.
Weinshall, D. [2004], Secure Authentication Schemes suitable for an Associative Memory, Technical Report TR 2004-30, Hebrew University, Leibniz Center for Research in Computer Science.
Zimmer, A. [1982], Do We See What Makes Our Script Characteristic — Or Do We Only Feel It? Modes of Sensory Control in Handwriting, Psychological Research 44(2).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this paper
Cite this paper
Renaud, K. (2006). A Visuo-Biometric Authentication Mechanism for Older Users. In: McEwan, T., Gulliksen, J., Benyon, D. (eds) People and Computers XIX — The Bigger Picture. Springer, London. https://doi.org/10.1007/1-84628-249-7_11
Download citation
DOI: https://doi.org/10.1007/1-84628-249-7_11
Publisher Name: Springer, London
Print ISBN: 978-1-84628-192-1
Online ISBN: 978-1-84628-249-2
eBook Packages: Computer ScienceComputer Science (R0)