Cross-cultural effects on graphical password memorability and design

被引:3
作者
Mohamed M. [1 ]
Porterfield T. [2 ]
Chakraborty J. [2 ]
机构
[1] Department of Business Analytics and Technology Management, Towson University, Towson, MD
[2] Associate Dean, Kean University, Union, NJ
来源
Journal of Systems and Information Technology | 2021年 / 23卷 / 01期
关键词
Culture; Memorability; Memory decay; Mental model; Recognition; Trade-off; Visualization;
D O I
10.1108/JSIT-06-2020-0105
中图分类号
学科分类号
摘要
Purpose: This study aims to examine the impact of cultural familiarity with images on the memorability of recognition-based graphical password (RBG-P). Design/methodology/approach: The researchers used a between-group design with two groups of 50 participants from China and the Kingdom of Saudi Arabia, using a webtool and two questionnaires to test two hypotheses in a four-week long study. Findings: The results showed that culture has significant effects on RBG-P memorability, including both recognition and recall of images. It was also found that the login success rate depreciated quickly as time progressed, which indicates the memory decay and its effects on the visual memory. Research limitations/implications: Collectively, these results can be used to design universal RBG-Ps with maximal password deflection points. For better cross-cultural designs, designers must allow users from different cultures to personalize their image selections based on their own cultures. Practical implications: The RBG-P interfaces developed without consideration for users’ cultures may lead to the construction of passwords that are difficult to memorize and easy to attack. Thus, the incorporation of cultural images is indispensable for improving the authentication posture. Social implications: The development of RBG-P with cultural considerations will make it easy for the user population to remember the password and make it more expensive for the intruder to attack. Originality/value: This study provides an insight for RBG-P developers to produce a graphical password platform that increases the memorability factor. © 2021, Emerald Publishing Limited.
引用
收藏
页码:82 / 108
页数:26
相关论文
共 94 条
  • [1] Al-Khalifa F.A., Kohun F.G., Skovira R.J., A discussion about culture and information security policy compliance: a Sub-culturally bound determinant – redefining the Hofstede hypothesis, Issues in Information Systems, 16, 4, pp. 202-208, (2015)
  • [2] Aljahdali H., Poet R., The affect of familiarity on the usability of recognition-based graphical passwords, paper presented at the 12th IEEE International Conference on Trust, (2013)
  • [3] Aljahdali H., Poet R., Challenge set designs and user guidelines for usable and secured recognition-based graphical passwords, paper presented at the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (2014)
  • [4] Aljaroodi H.M., Adam M.T.P., Chiong R., Teubner T., Avatars and embodied agents in experimental information systems research: a systematic review and conceptual framework, Australasian Journal of Information Systems, 23, pp. 1-37, (2019)
  • [5] Aljaroodi H.M., Chiong R., Adam M.T.P., Designing persuasive avatars in mhealth for arabic culture: a qualitative study, paper presented at the Australasian Conference on Information Systems, (2017)
  • [6] Aljaroodi H.M., Chiong R., Adam M.T.P., Exploring the design of avatars for users from Arabian culture through a hybrid approach of deductive and inductive reasoning, Computers in Human Behavior, 106, (2020)
  • [7] Atkinson R.C., Shiffrin R.M., Human memory. A proposed system and its control processes, The Psychology of Learning and Motivation, Vol. 2, (1968)
  • [8] Barate A.K., Shinde S.S., Graphical password system using different techniques – a review, International Journal of Engineering Trends and Technology (IJETT, 9, 11, pp. 536-539, (2014)
  • [9] Bhusari V., Graphical authentication based techniques, International Journal of Scientific and Research Publications, 3, 7, pp. 31-38, (2013)
  • [10] Bhuyan S., Evaluating the usability of system-generated and user-generated passwords of approximately minimum equal security, (2011)