Influence of Mobile Devices on Password Composition and Authentication Performance Paper by: Emanuel von Zezschwitz, University of Munich, Germany Alexander.

Slides:



Advertisements
Similar presentations
Security for Mobile Devices
Advertisements

An Analysis of the Alternatives to Traditional Static Alphanumeric Passwords Mahmoud Abaza and Brent Hunter School of Computing and Information Systems,
Computer Programming Mr. José A. Ortiz Morris. Computer Language  Languages that the computer understands.  They are low level languages. (BINARY 1.
Program Design Using Haggis
A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.
Experiments and Variables
Tablet Computers and Standards of Learning Testing: Insights from the Virginia Department of Education Monday, August 12, 2013.
Multi-Modal Text Entry and Selection on a Mobile Device David Dearman 1, Amy Karlson 2, Brian Meyers 2 and Ben Bederson 3 1 University of Toronto 2 Microsoft.
Design of icons for use by Chinese in Mainland China Interacting with computers 9(1998) Yee-Yin Choong, Gavriel Salvendy Report: Yang Kun, Ou.
What Is a Computer and What Does It Do?
The art and science of measuring people l Reliability l Validity l Operationalizing.
INTERPRET MARKETING INFORMATION TO TEST HYPOTHESES AND/OR TO RESOLVE ISSUES. INDICATOR 3.05.
Introduction to the World of Computers
TAUCHI – Tampere Unit for Computer-Human Interaction Manual Text Entry: Experiments, Models, and Systems Poika Isokoski Tampere Unit for Computer-Human.
1 Introduction Lecture 1 CSCI 1405 Introduction to Computer Science Fall 2006.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
DeVry University Donelle Vance. GRAB - The Cross Platform iPhone, iPad & Android Phone Sharing Application August 2011.
People & Devices: (Inputs & Outputs) Startlingly small child using computer History of human-computer interaction Another history video.
Free Wi-Fi Zone. Detail Process of Free Wi-Fi Access Switch on Wi-Fi setup on your Wi-Fi enabled Device like Cell Phone, Tablet PC, Laptop & search for.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Operating Systems Chapter 4.
Ajou University, South Korea ICSOC 2003 “Disconnected Operation Service in Mobile Grid Computing” Disconnected Operation Service in Mobile Grid Computing.
Mobile Text Entry: Methods and Evaluation CSCI 4800 March 31, 2005.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
Chapter 4 System Software.
Effect of Text font, line length and language on online information search Hang Yu Human Centered Design and Engineering University of Washington.
Introduction to the World of Computers
Effects on driving behavior of congestion information and of scale of in-vehicle navigation systems Author: Shiaw-Tsyr Uang, Sheue-Ling Hwang Transportation.
Towards Understanding ATM Security – A Field Study of Real World ATM Use Yan Qiang,
Practical Computer Literacy Week-02
HealthCare Platforms: Lessons Learned and Future Challenges Piotr Bała ICM, University of Warsaw, Warsaw, PL
Python Repetition. We use repetition to prevent typing the same code out many times and to make our code more efficient. FOR is used when you know how.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
Integration of End User Satisfaction in the CPOE Implementation Process Bill French, VP eHealth Strategies Wisconsin Office of Rural Health HIT Implementation.
Software refer to all the programs that can be run on the computer.
Project Report An investigation on data entry effectiveness & efficiency.
CSCI 1101 INTRODUCTION TO COMPUTERS 5. Basic Computer Architecture.
Latest Technology News and Updates |Information Technology updates | Android Blog | SSO
Basic Apple Configurator Preferences. Apple Configurator  Preferences…
Improving O&M Skills Through the Use of VE for People Who Are Blind: Past Research and Future Potential O. Lahav School of Education, Tel Aviv University.
User Perceptions of Drawing Logic Diagrams with Pen-Centric User Interfaces Bo Kang, Jared N. Bott, and Joseph J. LaViola Jr. Interactive Systems & User.
The Effects of Color on Flavor Ratings Stephanie Mattson Denise White
Driver Attention for Information Display on Variable Message Signs with Graphics and Texts Chien-Jung Lai, Chi-Ying Wang National Chin-Yi University of.
D IGITAL S OLUTIONS FOR D IGITAL P ATRONS. Join the digital age – patron scanning Library Document Station™
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model (Short Paper) FC 2010 Toni Perković joint work with Mario Čagalj and Nitesh Saxena.
姓名 : 許浩維 學號 :M 日期 : Road Accident: Driver Behaviour, Learning and Driving Task 1.
11.1 Notes Chi Square Test of Independence. Chi Square Test of Independence is used to determine if there is a relationship between two variables or are.
Saving Bitrate vs. Users: Where is the Break-Even Point in Mobile Video Quality? ACM MM’11 Presenter: Piggy Date:
MERIL: On-Site Accessibility Assessments Research Conducted By: Jenny Stanhope and Todd Ries.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
HP ALL IN ONE LASER PRINTER M227FDN
PAMANTASAN NG LUNGSOD NG MARIKINA College of Business Administration
for the Final Stage of our Merger:
Effects of Watermark and Music on Mobile Message Advertisements
Tutorial Using the App help.ebsco.com.
Investigation of Instructions for Password Generation
What this activity will show you
Fix yahoo error code 1032 Call Toll-free Number
Popular Operating Systems
Software engineering USER INTERFACE DESIGN.
Different Types of Apps. App Development ● App Development refers to the creation of computer applications for use on mobile devices such as tablets,
Toll-Free: Article Source-
APPLE TWO STEP VERIFICATION CHANGE PHONE NUMBER Please read the following presentation on any help on Apple two step verification change phone number.
Multifactor Authentication & First Time Login
Standard Algorithms Input validation Finding the minimum
Tutorial Using the App help.ebsco.com.
Lab Report 5 pts – title 5 pts – problem 5 pts – hypothesis
Module I Keyboarding UNIT 1 LESSONS 1-20
String Handling.
Presentation transcript:

Influence of Mobile Devices on Password Composition and Authentication Performance Paper by: Emanuel von Zezschwitz, University of Munich, Germany Alexander De Luca, University of Munich, Germany Heinrich Hussmann, University of Munich, Germany

Pre-study assessing password performance

Independent variables  3 devices  Smartphone (Apple iPhone 5)  Tablet (Apple iPad 4 10”)  PC (Windows PC with 24” display and Cherry JK-0100DE keyboard)  3 password categories  Dictionary (ex. casanova)  Internet (ex. Yasana75)  Random (ex.

Procedure  Training: enter short text, no logging  Typing speed: enter text (different for each device)  Authentication: enter 4 password of each category  Repeat until all 3 devices had been tested Participants  24 experienced users  20 males; 4 females  Average age of 25

Results  Typing speed  Significantly influenced by the device  Smartphone slowest, PC fastest  Slower when string complexity increases  Error rate  Significantly influenced by the device  Smartphone is error prone

Large scale study choice and perception

Procedure  Password creation task asked to select a password for an imaginary service they would frequently use on the current device Participants  149 tablet users; 149 PC users; 152 smartphone users  238 males; 212 females  Average age of 31 years

Results  Password  Significantly influenced by the device  Smartphone shortest passwords, PC longest passwords  Tablet and smartphone use fewer upper case letters  Errors  Significantly influenced by the device  50% of all errors occurred on smartphones

Conclusion

 Mobile devices have significant impact on alphanumeric passwords  Slower input  More errors  Users opt for easy and fast to enter passwords  Limiting factors of password security  Used to be memorability  now it is input effort  Should provide adjusted authentication methods