Author:
Mohamed Mona,Porterfield Tobin,Chakraborty Joyram
Abstract
Purpose
This study aims to examine the impact of cultural familiarity with images on the memorability of recognition-based graphical password (RBG-P).
Design/methodology/approach
The researchers used a between-group design with two groups of 50 participants from China and the Kingdom of Saudi Arabia, using a webtool and two questionnaires to test two hypotheses in a four-week long study.
Findings
The results showed that culture has significant effects on RBG-P memorability, including both recognition and recall of images. It was also found that the login success rate depreciated quickly as time progressed, which indicates the memory decay and its effects on the visual memory.
Research limitations/implications
Collectively, these results can be used to design universal RBG-Ps with maximal password deflection points. For better cross-cultural designs, designers must allow users from different cultures to personalize their image selections based on their own cultures.
Practical implications
The RBG-P interfaces developed without consideration for users’ cultures may lead to the construction of passwords that are difficult to memorize and easy to attack. Thus, the incorporation of cultural images is indispensable for improving the authentication posture.
Social implications
The development of RBG-P with cultural considerations will make it easy for the user population to remember the password and make it more expensive for the intruder to attack.
Originality/value
This study provides an insight for RBG-P developers to produce a graphical password platform that increases the memorability factor.
Subject
General Computer Science,Information Systems
Reference93 articles.
1. A discussion about culture and information security policy compliance: a Sub-culturally bound determinant – redefining the Hofstede hypothesis;Issues in Information Systems,2015
2. Aljahdali, H. and Poet, R. (2013), “The affect of familiarity on the usability of recognition-based graphical passwords,” paper presented at the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC.
3. Aljahdali, H. and Poet, R. (2014), “Challenge set designs and user guidelines for usable and secured recognition-based graphical passwords”, paper presented at the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing.
4. Avatars and embodied agents in experimental information systems research: a systematic review and conceptual framework;Australasian Journal of Information Systems,2019
5. Aljaroodi, H.M., Chiong, R. and Adam, M.T.P. (2017), “Designing persuasive avatars in mhealth for arabic culture: a qualitative study”, paper presented at the Australasian Conference on Information Systems, Hobart.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献