Javascript must be enabled to continue!
Usability Study on Textual and Graphical Passwords
View through CrossRef
One of the most common methods used for authentication are passwords, in particular textual passwords. However, maintaining multiple textual passwords across various websites or information systems could be an overwhelming task especially when it comes to memorability. An alternative is Graphical passwords as pictures could be easier to recollect. Pictures on the other hand could be memory intensive. As a result, this research explores the use of graphical and textual passwords by integrating the strong points of both password scheme thereby providing stronger authentication platform that may be difficult for attackers to break. The use of a background image for memorability and security purpose was adopted in the implementation of the graphical scheme. A usability experiment was carried out with users from diverse background. The users were given the developed system that integrates the two password applications to use. A questionnaire was then administered to enable them share their user experience. Results from the evaluation of the system showed high level of acceptance of the use of a graphical password scheme from participants, even though it was a relatively new concept to them. In particular, 82% of the users preferred graphical passwords as a more secure scheme against the other 18% who preferred the use of a textual password. The textual password length and combination was simplified by avoiding excessive length since the graphical password augmented in terms of security. Overall, 77% of the participants were able to successfully carry out each task highlighted in the questionnaire.
Nigerian Academy of Science
Title: Usability Study on Textual and Graphical Passwords
Description:
One of the most common methods used for authentication are passwords, in particular textual passwords.
However, maintaining multiple textual passwords across various websites or information systems could be an overwhelming task especially when it comes to memorability.
An alternative is Graphical passwords as pictures could be easier to recollect.
Pictures on the other hand could be memory intensive.
As a result, this research explores the use of graphical and textual passwords by integrating the strong points of both password scheme thereby providing stronger authentication platform that may be difficult for attackers to break.
The use of a background image for memorability and security purpose was adopted in the implementation of the graphical scheme.
A usability experiment was carried out with users from diverse background.
The users were given the developed system that integrates the two password applications to use.
A questionnaire was then administered to enable them share their user experience.
Results from the evaluation of the system showed high level of acceptance of the use of a graphical password scheme from participants, even though it was a relatively new concept to them.
In particular, 82% of the users preferred graphical passwords as a more secure scheme against the other 18% who preferred the use of a textual password.
The textual password length and combination was simplified by avoiding excessive length since the graphical password augmented in terms of security.
Overall, 77% of the participants were able to successfully carry out each task highlighted in the questionnaire.
Related Results
Usability Quality Model: An Enhancement of Dromey's Model
Usability Quality Model: An Enhancement of Dromey's Model
ABSTRACT
Usability is a fundamental software quality attribute that strongly influences user performance, acceptance, and the overall success of software systems....
How to Protect Your Passwords and Secret Personal Notes
How to Protect Your Passwords and Secret Personal Notes
Many people think of using passwords for their data security, but few of them think about how to protect their passwords. The passwords we use also need to be protected. While crea...
Cyber and Physical Access Control in Legacy System Using Passwords
Cyber and Physical Access Control in Legacy System Using Passwords
Passwords—secret combinations of symbols—play an important role in physical world security (e.g. watchword to prevent unauthorized entry into military forbidden...
Usability of the login authentication process: passphrases and passwords
Usability of the login authentication process: passphrases and passwords
Purpose
The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forg...
Efficient Plain Password Cryptanalysis Techniques
Efficient Plain Password Cryptanalysis Techniques
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common mea...
Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism
Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism
A variety of authentication mechanisms are used for online applications to protect user’s data. Prior literature identifies that
adults and children often utilize weak a...
Perancangan Usability Website Interface Sistem Informasi Kerusakan Laboratorium Universitas AMIKOM Yogyakarta
Perancangan Usability Website Interface Sistem Informasi Kerusakan Laboratorium Universitas AMIKOM Yogyakarta
INTISASIUsability sebagai ukuran kualitas pengalaman pengguna seringkali dikatakan sebagai suatu nilai penerimaan (acceptance) seseorang terhadap suatu produk ketika berinteraksi d...
Electronic Health Record Usability Evaluation Improves Training (Preprint)
Electronic Health Record Usability Evaluation Improves Training (Preprint)
BACKGROUND
EHRs are said to reduce physician workload, however, physicians who are not appropriately trained on using an EHR in medical school may encounter...

