Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Graphical passwords for older computer users
Carter N.  UIST 2015 Adjunct (Adjunct Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology, Daegu, South Korea, Nov 8-11, 2015)29-32.2015.Type:Proceedings
Date Reviewed: Jun 28 2016

The ubiquitous use of alphanumerical passwords to control access to computing devices poses a dilemma for most users: a simple, convenient scheme risks unauthorized access, while a more sophisticated but also more cumbersome scheme improves security. At one extreme are users who use a single, simple password for multiple accounts, while at the other are those with password managers, single-use passwords in combination with secondary communication channels, or sophisticated password generation schemes.

This paper examines the use of passwords for computer users older than 60. Many of those users prefer simple password schemes, and often rely on writing them down, with the obvious dangers associated with these practices. An interesting alternative to text or numerical personal identification numbers (PINs) is the use of image-based techniques. Here, users select a sequence of images from a set displayed on the screen.

The author suggests a variation of previous image-based solutions by letting users select personally meaningful images to set as the password, and identifying those images in the correct sequence from a larger set displayed on the screen. Implemented carefully, the entropy is similar to textual passwords with comparable characteristics (set of symbols/images, length of the sequence). Initial experiments conducted with users from the target audience confirmed the practicality and usability of the scheme, and a follow-up study will expand the group of participants and investigate related aspects.

The method of using personally meaningful images instead of text or PINs looks promising for older users, and may be an attractive alternative for computer users in general. One crucial question is how to curate a pool of images that contains enough candidates with meaningful associations for individuals while avoiding clues that could be used to break this personal internal secret key.

Reviewer:  Franz Kurfess Review #: CR144534 (1609-0689)
Bookmark and Share
  Featured Reviewer  
 
User-Centered Design (H.5.2 ... )
 
Would you recommend this review?
yes
no
Other reviews under "User-Centered Design": Date
Human-computer interface design guidelines
Brown C., Intellect Books, Exeter, UK, 1999.  236, Type: Book (9781871516548)
Jun 1 2000
Shaping Web usability: interaction design in context
Badre A., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  276, Type: Book (9780201729931)
Jan 29 2003
Usability engineering: scenario-based development of human-computer interaction
Rosson M., Carroll J., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2002.  422, Type: Book (9781558607125), Reviews: (1 of 2)
Apr 17 2002
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy