A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.

Slides:



Advertisements
Similar presentations
Educational Research: Causal-Comparative Studies
Advertisements

Synchronous (Live) Class Sessions in Online Accounting Classes Dr. Connie Fajardo Professor and Program Lead for Bachelor of Science in Accountancy National.
Critical Reading Strategies: Overview of Research Process
Robin L. Donaldson May 5, 2010 Prospectus Defense Florida State University College of Communication and Information.
Anxiety Increases Age Differences in Memory Jane Student and Dr. Julie Earles Wilkes Honors College of Florida Atlantic University Why do people forget?
Design of icons for use by Chinese in Mainland China Interacting with computers 9(1998) Yee-Yin Choong, Gavriel Salvendy Report: Yang Kun, Ou.
Investigating the Effect of Taking and Reviewing the Annotations and Homework to Math Learning iCORE 2009 Hwang Wu-Yuin National Central University, Taiwan.
Title 4 Effects of a student designed multimedia project on 8th graders attitude and performance.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
CEP Welcome September 1, Matthew J. Koehler September 1, 2005CEP Cognition and Technology Who’s Who?  Team up with someone you don’t.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Password Management Strategies for Online Accounts Gaw & Felten Optional Reading.
Gender Issues in Systems Design and User Satisfaction for e- testing software Prepared by Sahel AL-Habashneh. Department of Business information systems.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
© Tefko Saracevic, Rutgers University1 digital libraries and human information behavior Tefko Saracevic, Ph.D. School of Communication, Information and.
Correlational Designs
Slide 1 Testing Multivariate Assumptions The multivariate statistical techniques which we will cover in this class require one or more the following assumptions.
Kerry Murphy Paolo Busante
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Business Statistics: Communicating with Numbers By Sanjiv Jaggia.
Pseudorandom Number Generators. Randomness and Security Many cryptographic protocols require the parties to generate random numbers. All the hashing algorithms.
Abstract evaluation Another example…. The abstract The purposes of this study were to examine athletes' mental skill use in practice and competition,
Basic Statistics Michael Hylin. Scientific Method Start w/ a question Gather information and resources (observe) Form hypothesis Perform experiment and.
Dr. Engr. Sami ur Rahman Assistant Professor Department of Computer Science University of Malakand Research Methods in Computer Science Lecture: Research.
S519: Evaluation of Information Systems Week 14: April 7, 2008.
The Impact of CReSIS Summer Research Programs that Influence Students’ Choice of a STEM Related Major in College By: Alica Reynolds, Jessica.
Raymond S. Pastore, Ph.D..  What is multimedia?  Verbal and Non Verbal representations better for learning than just one (Mayer, 2005)  Modality.
Applying creativity in CS high school education - criteria, teaching example and evaluation Romeike, R. (2007). Applying creativity in CS high school education.
Analysis of Variance Chapter 12 Introduction Analysis of variance compares two or more populations of interval data. Specifically, we are interested.
+ Asperger’s Syndrome and Assistive Technology. + Introduction This study was done on children with Autism Spectrum Conditions (ASC). Children with ASC.
A MULTIMEDIA APPLICATION FOR THE TEACHING OF THE MODULE "WATER" Anna Thysiadou 1, Sofoklis Christoforidis 2, Panagiotis Jannakoudakis 1 1 Aristotle University.
Computer Science and Engineering - University of Notre Dame Jimmy Neutron CSE 40827/60827 – Ubiquitous Computing November 13, 2009 Project Presentation.
Research Design & the Research Proposal Qualitative, Quantitative, and Mixed Methods Approaches Dr. Mary Alberici PY550 Research Methods and Statistics.
Evaluation of software engineering. Software engineering research : Research in SE aims to achieve two main goals: 1) To increase the knowledge about.
Single-Factor Experimental Designs
BY CHEN YEAH TECK Image-Based Authentication for Mobile Phones: Performance and User Opinions Source: Slippery Brick (2006)
Analysis of Variance ST 511 Introduction n Analysis of variance compares two or more populations of quantitative data. n Specifically, we are interested.
Big Idea 1: The Practice of Science Description A: Scientific inquiry is a multifaceted activity; the processes of science include the formulation of scientifically.
L 1 Chapter 12 Correlational Designs EDUC 640 Dr. William M. Bauer.
Human Computer Interaction
Implementing Basic Differences Tests
Scientific Research in Biotechnology 5.03 – Demonstrate the use of the scientific method in the planning and development of an experimental SAE.
A Meta-Study of Algorithm Visualization Effectiveness Christopher Hundhausen, Sarah Douglas, John Stasko Presented by David Burlinson 8/10/2015.
Mohawk Junior High Showcase of Learning What is a Science Project?
Scientific Processes Mrs. Parnell. What is Science? The goal of science is to investigate and understand the natural world, to explain events in the natural.
For ABA Importance of Individual Subjects Enables applied behavior analysts to discover and refine effective interventions for socially significant behaviors.
Why is Research Important?. Basic Research Pure science or research Research for the sake of finding new information and expanding the knowledge base.
Mary Theofanos Visualization & Usability Group Information Access Division Information Technology Laboratory PIV Pilot Usability Lessons Learned.
EDCI 696 Dr. D. Brown Presented by: Kim Bassa. Targeted Topics Analysis of dependent variables and different types of data Selecting the appropriate statistic.
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
Copyright © Allyn & Bacon 2008 Intelligent Consumer Chapter 14 This multimedia product and its contents are protected under copyright law. The following.
WEBSITES AND ADDRESS RELATIONSHIP By: Nahed Alnahash Dr. Wenjin Zhou.
Theme 2: Data & Models One of the central processes of science is the interplay between models and data Data informs model generation and selection Models.
Major Science Project Process A blueprint for experiment success.
Empirical Evaluation Chris North cs5984: Information Visualization.
Helpful hints for planning your Wednesday investigation.
The Scientific Method involves a series of steps in which scientists answer questions and solve problems.
Crystal Reinhart, PhD & Beth Welbes, MSPH Center for Prevention Research and Development, University of Illinois at Urbana-Champaign Social Norms Theory.
What is Research Design? RD is the general plan of how you will answer your research question(s) The plan should state clearly the following issues: The.
PSYCH 540 TUTOR The power of possibility/psych540tutordotcom.
Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.
PS Research Methods I with Kimberly Maring Unit 9 – Experimental Research Chapter 6 of our text: Zechmeister, J. S., Zechmeister, E. B., & Shaughnessy,
QNT 565 mart Expert Success/qnt565martdotcom FOR MORE CLASSES VISIT
UWave: Accelerometer-based personalized gesture recognition and its applications Tae-min Hwang.
Single Subject Research
Investigation of Instructions for Password Generation
Parts of an Academic Paper
Just What Is Science Anyway???
Human Computable Passwords
Chapters 8, 9, 10, 11 Dr. Bhattacharya
Anna Adams Martina Angela Sasse
Presentation transcript:

A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science

2 PhD Researcher An organism that converts caffeine and sandwiches/pizza into PhD thesis + =

Motivation School of Computing Science text passwords 1. Writing down the passwords; 2. Reusing the same passwords; 3. Sharing them with others

School of Computing Science A potential solution: Images as password ‘M’ number of images = 1 password Limitation of existing work: focused on the usability of a single password Users need to remember and use multiple passwords Research Problem

Objectives School of Computing Science which image type (s) performs best in terms of usability, when multiple passwords are used?’ Compare the usability of 4 image types: Mikon, doodle, art and everyday object, when used as passwords

1: Username selection 2: Password image selection (4 images) 3: Password confirmation 4: Registration completion Registration School of Computing Science 6 Select 4 images 4 images = 1 password

Authentication Four step login = 1 * 4 images (T) Each step: 1 target+ 15 decoys = 1 challenge set Select 1 image (target) and move to next step School of Computing Science 7 Result: Displayed at the end of the 4 th (final) step

IMAGE TYPES USED AS PASSWORD (1)Mikon: These are icon-like images which have been drawn by users using a tool called the Mikon engine developed by Mikons.com (2) Doodle: These images are drawn by users using pen on paper School of Computing Science 8

Image types used in our research (3) Art: These images were collected from a range of free websites and comprised of paintings from different styles such as cubism, abstract and modernism (4) Object: These images comprised of pictures of food and drinks, sculpture and buildings as well as sports and leisure activities, again collected from a range of free websites most of the existing usability studies have been done with them Since this is the first study of its kind, we did not concentrate in examining more image types Why use these image types? School of Computing Science 9

Experimental design / User Study School of Computing Science 10 Mikon 25 users TASK OF EACH USER IN A CONDITION 1.Create 4 passwords (a survey with sample users) 2. login with 4 passwords every week 3.Frequency of login was varied Doodle 25 users Art 25 users Object 25 users Conditions # users INDEPENDENT MEASURES

Frequency of login in each week School of Computing Science 11 week 1 is the training week; participants would get used to the system

100 participants of age for a period of eight weeks User Demographics School of Computing Science 12 Grounded theory framework for pre-study survey

Mean successful login percentage: It examined the mean successful login percentage for in each condition : Shapiro-Wilk test – Normal Distribution ANOVA– Significant difference in all conditions Tukey Post hoc test- Significant difference in each pair of condition except Mikon and Object Result 1: Memorability Object passwords are the most memorable whereas art passwords are the least School of Computing Science 13

Weekly Login Success Percentage School of Computing Science 14 The memorability decreases with time and less frequent usage

Result 2: Registration time School of Computing Science 15 decreases from p1- first registered password to p4- last registered password decreases as users get used to the system

Result 3: Login time School of Computing Science 16 differences between the average login time of Mikon and doodle as well as Mikon and object passwords is not significant

School of Computing Science Post Study: Strategy to create and remember password Mikon and doodle: story/pattern or personal likings Art: personal likings or visual appeal Object: personal likings or story

First study that compares the usability of multiple image passwords using 4 different images types- Mikon, doodle, art and objects Results demonstrated that  object passwords are most usable in the sense of being more memorable and less time-consuming to employ;  Mikon images are close behind (without any significant difference);  but doodle and art images are significantly inferior CONCLUSION-1 School of Computing Science 18

Do users find it difficult to remember multiple image passwords? Users do have problems remembering many image passwords. Hence they will face the same password memorability/ management problems as that of text passwords, when the number of image passwords increases. CONCLUSION-2 School of Computing Science 19

REMARKS- 1  If a system is not usable, then the users will engage into insecure practices, which may compromise the security.  Solving the memorability problem of the passwords could prevent insecure coping mechanisms.  A solution to address the memorability problem  Provide adequate security ‘Hint based authentication’ ONGOING WORK School of Computing Science 20

REMARKS-2 In the absence of any related study of this kind, it is impossible to produce a flawless experimental design. There is no standard procedure to design experiments for studying multiple image passwords. (Major limitation of our field) The use of different experimental framework, dependant variables and image types makes it difficult to allow systematic comparison of our results with them. School of Computing Science 21

REMARKS-3 School of Computing Science 22 We believe that the experimental design in our user studies is:  valid as it answers the research question through the data we collected;  reliable as it can be reproduced by the research community;  most importantly, such a study for the stated research problem has not been conducted in the past.

Learn – Unlearn – Relearn School of Computing Science 23