Memorability of Alphanumeric and Composite Scene Authentication (CSA) Passcodes Over Extended Retention Intervals

Author(s):  
Korey Johnson ◽  
Steffen Werner

Current authentication strategies seek to increase security by requiring users to create more secure alphanumeric passwords. Unfortunately, the inverse relationship between alphanumeric password security and memorability prevents users from being able to create a password that is both secure and memorable. Graphical user authentication mechanisms have been explored as a means to maintain security while enhancing memorability of passcodes. Current approaches often use unrelated picture sets from which participants have to remember a subset, with mixed results. The study outlined in this paper seeks to further validate the Composite Scene Authentication (CSA) graphical passcode mechanism (Johnson & Werner, 2006). Extending retention intervals and increasing the variability of stimuli clearly demonstrated the superiority of CSA over alphanumerical passwords. In addition, we manipulated the mode of presentation (serial vs. composite) to assess the memorability of stimuli presented in different temporal formats. In the current study CSA passcodes consisting of nine categorical dimensions were compared to nine character alphanumeric passwords. Participants showed a strong advantage in passcode retention of graphical passcodes for both modes of presentation. This effect grew larger with increasing retention intervals. At the longest retention interval (6 weeks), only 10 (12%) participants were able to produce their alphanumerical password vs. 50 (60%) participants who were still able to produce the correct graphical passcode.

2021 ◽  
Author(s):  
Emily Rebecca Spearing ◽  
Kimberley A. Wade

A growing body of research suggests that confidence judgements can provide a useful indicator of memory accuracy under some conditions. One factor known to affect eyewitness accuracy, yet rarely examined in the confidence-accuracy literature, is retention interval. Using calibration analyses, we investigated how retention interval affects the confidence-accuracy relationship for eyewitness recall. In total, 611 adults watched a mock crime video and completed a cued-recall test either immediately, after 1 week, or after 1 month. Long (1 month) delays led to lower memory accuracy, lower confidence judgements, and impaired the confidence-accuracy relationship compared to shorter (immediate and 1 week) delays. Long-delay participants who reported very high levels of confidence tended to be over-confident in the accuracy of their memories compared to other participants. Self-rated memory ability, however, did not predict eyewitness confidence or the confidence-accuracy relationship. We discuss the findings in relation to cue-utilization theory and a retrieval-fluency account.


Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security provided by such a password (because they are more difficult to violate or “crack”). However, such passwords tend to be more difficult for end users to remember, particularly when the password does not spell a recognizable word (or includes non-alphanumeric characters such as punctuation marks or other symbols). Conversely, when end users select their own more easily remembered passwords, the passwords may also be easier to crack. This study presents a new approach to entering passwords, which combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords as well as high-protection, assigned-password procedures. The present study investigates trade-offs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all password procedures tested to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared with that high-security password. Further research will be conducted to investigate long-term benefits.


1984 ◽  
Vol 59 (3) ◽  
pp. 959-965 ◽  
Author(s):  
Robert M. Godley ◽  
Robert E. Estes ◽  
Glenn P. Fournet

Researchers have continued to echo McGeoch and Irion's (1952) statement concerning the superiority of the auditory modality for young children and the visual modality for older children in paired-associate learning despite conflicting results. In the present study, in which the performance of second and fifth grade children on a paired-associate task under 6 different modes of presentation was compared, mode of presentation did not vary as a function of age. The picture/sound combined condition was superior to the sound and printed/spoken-word conditions but provided no advantage over the picture condition alone. No significant differences were found among the printed-word, spoken-word, and combined printed/spoken-word conditions. Difficulties in making comparisons among studies because methods differed and implications for further research were discussed.


Perception ◽  
10.1068/p6970 ◽  
2011 ◽  
Vol 40 (11) ◽  
pp. 1290-1308 ◽  
Author(s):  
Patrick Garrigan ◽  
Philip J Kellman

In early cortex, visual information is encoded by retinotopic orientation-selective units. Higher-level representations of abstract properties, such as shape, require encodings that are invariant to changes in size, position, and orientation. Within the domain of open, 2-D contours, we consider how an economical representation that supports viewpoint-invariant shape comparisons can be derived from early encodings. We explore the idea that 2-D contour shapes are encoded as joined segments of constant curvature. We report three experiments in which participants compared sequentially presented 2-D contour shapes comprised of constant curvature (CC) or non-constant curvature (NCC) segments. We show that, when shapes are compared across viewpoint or for a retention interval of 1000 ms, performance is better for CC shapes. Similar recognition performance is observed for both shape types, however, if they are compared at the same viewpoint and the retention interval is reduced to 500 ms. These findings are consistent with a symbolic encoding of 2-D contour shapes into CC parts when the retention intervals over which shapes must be stored exceed the duration of initial, transient, visual representations.


Author(s):  
G. Neil Martin ◽  
Sharon J. Sadler ◽  
Clare E. Barrett ◽  
Alison Beaven

AbstractPsychological studies of responses to humor employ a variety of different recording methods and modes of presentation, but few have addressed whether these methodological differences affect people's responses to comedy. In the present study, participants' expressive (laughter and smiling) and cognitive (ratings of funniness and enjoyment) responses to a popular British comedy program presented via videotape, audiotape, or in script form were measured. Behavioral response was recorded either covertly or overtly by a video camera. Mode of presentation significantly affected behavioral response: the videotape and the audiotape conditions generated significantly greater laughter and smiling than did the script condition. Although the presence of the camera was not regarded as obtrusive, its presence did inhibit laughter and depressed enjoyment (but not amusement). The paper suggests that research using humorous material should carefully consider the mode of presentation and the behavioral recording conditions employed.


2018 ◽  
Vol 20 (1) ◽  
Author(s):  
Rika Butler ◽  
Martin Butler

Background: Online security is a growing concern and user authentication through passwords remains an important mechanism to protect online assets. Research to date has highlighted the need to address human behaviour but without an indication of where the emphasis of security education, training and awareness (SETA) initiatives should be, beyond improved password practices. Objectives: The aim of this study was to, through analysis of the password behaviour of South African online consumers: (1) understand the prevalence of poor password practices among consumers overall and (2) identify specific password deficiencies prevalent among different demographic groups to be focus areas for tailored intervention programmes. Method: The study uses a quantitative research approach. An online survey was used to gather demographic data, perceptions about online security and applied password practices. A sample of 737 valid responses was analysed for this research. Results: Based on the descriptive analysis of the responses three key observations were made. Firstly, there is a distinct difference in the incidence of poor password practices for all respondents and thus support for tailored interventions. Secondly, there are variances between the practices within different demographic groups that could be used for customisation of interventions. Finally, the different poor practices cannot be uniquely attributed to one particular set of demographics. Conclusion: The study concluded that to improve computer password security in South Africa, password SETA programmes should be customised for areas where individual needs exist and not merely per password practice or demographic group.


2008 ◽  
pp. 2114-2129
Author(s):  
Merrill Warkentin

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


1975 ◽  
Vol 41 (1) ◽  
pp. 119-124
Author(s):  
Jack Leavitt ◽  
Terry Ball

A 4 × 4 factorial design with repeated measures across retention intervals and instructions was employed to determine the effect of instruction on recall ability of movement information from short-term motor memory. Each of the 16 Ss received all 16 possible treatment combinations. While both retention interval and instruction showed significant effects, there was no significant interaction. The reverse-order instruction was affected by the length of the retention interval while the no-prior-item, last-distance, and drop instructions were uninfluenced. No evidence supported the trace-decay hypothesis of forgetting. Ss seem easily able to remove information from memory or ignore information input so it is not represented in memory.


1969 ◽  
Vol 25 (2) ◽  
pp. 567-574 ◽  
Author(s):  
Gerald Lazar

2 experiments, using paired adjectives, examined the effect of successive recall trials (SRC) that occurred immediately after OL on retention. Retention was measured after 0-, 24-, and 48-hr. retention intervals. The first experiment varied SRC trials (0 vs 10) following OL, and retention interval (0 vs 24 hr.). Exp. II extended the first by increasing the amount of post-OL SRC (0, 10, and 20 trials) and by increasing the retention interval (24 vs 48 hr.). Both experiments measured retention over 10 SRC trials. Correct recall was facilitated by post-OL SRC and increased during SRC trials after 24- and 48-hr. retention intervals. The results suggest that both associative and warm-up processes operate during SRC.


1969 ◽  
Vol 24 (1) ◽  
pp. 31-34 ◽  
Author(s):  
John A. Mills ◽  
Gordon Winocur

6 24-word English sentences were made up, 2 representing each of 3 levels of meaningfulness. Meaningfulness was defined in terms of the Thorndike-Lorge frequency of the words making up the sentences. The sentences were mounted on memory drums and learned by serial anticipation to a criterion of 100% correct responses or to a lower criterion, equivalent across level of meaningfulness. The retention intervals were 20 min. and 24 hr., the former providing a control for post-criterial drop. The measure of retention was the number of items lost during the interval. The main effects for both retention interval and meaningfulness were significant as was the interaction term between level of learning and retention interval. Because there were no significant interaction terms involving meaningfulness, it was concluded that the main effect for meaningfulness was an artifact resulting from differing degrees of associative strength at the end of learning. This conclusion was reinforced by scrutiny of 24-hr. loss scores, corrected for post-criterial drop.


Sign in / Sign up

Export Citation Format

Share Document