Nudges for privacy and security: Understanding and assisting users' choices online

A Acquisti, I Adjerid, R Balebako… - ACM Computing …, 2017 - dl.acm.org
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …

Syspal: System-guided pattern locks for android

G Cho, JH Huh, J Cho, S Oh, Y Song… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
To improve the security of user-chosen Android screen lock patterns, we propose a novel
system-guided pattern lock scheme called" SysPal" that mandates the use of a small number …

Sweet-spotting security and usability for intelligent graphical authentication mechanisms

M Belk, A Pamboris, C Fidas, C Katsini… - Proceedings of the …, 2017 - dl.acm.org
This paper investigates the trade-off between security and usability in recognition-based
graphical authentication mechanisms. Through a user study (N= 103) based on a real usage …

Composition policies for gesture passwords: User choice, security, usability and memorability

GD Clark, J Lindqvist… - 2017 IEEE Conference on …, 2017 - ieeexplore.ieee.org
Research on gesture passwords suggest they are highly usable and secure, leading them to
be proposed as a strong alternative authentication method for touchscreen devices …

Exploring the potential of geopass: A geographic location-password scheme

MN Al-Ameen, M Wright - Interacting with Computers, 2017 - academic.oup.com
Password schemes based on online map locations are an emerging topic in authentication
research. GeoPass is a promising such scheme, as it provides satisfactory resilience against …

[PDF][PDF] ChoCD: usable and secure graphical password authentication scheme

RR Afandi, MZ Jali - Indian Journal of Science and Technology, 2017 - researchgate.net
Since designing effective graphical password authentication schemes is of vital important,
this paper attempts to address the need by providing a new way for designing and …

Effects of human cognitive differences on interaction and visual behavior in graphical user authentication

M Belk, C Fidas, C Katsini, N Avouris… - … –INTERACT 2017: 16th …, 2017 - Springer
This paper discusses two user studies to investigate whether human cognitive differences
affect user interaction and visual behavior within recognition-based graphical authentication …

Multimedia Approaches for Improving Children's Privacy and Security Knowledge and Persuading Behaviour Change

L Zhang-Kennedy - 2017 - repository.library.carleton.ca
Abstract By grades 4 to 11, 98% of Canadian children have Internet access outside of
school. Computer security and privacy technology reduces children's online risks, but the …

Enhancing usability and security through alternative authentication methods

NJ Van Balen - 2017 - scholarworks.wm.edu
With the expanding popularity of various Internet services, online users have be-come more
vulnerable to malicious attacks as more of their private information is accessible on the …

[PDF][PDF] Graphical Password Using Captcha

YCS Reddy, MV Rao, MK Rao, CVP Kumar, AA Sai - download.garuda.kemdikbud.go.id
In this 21st century one of the main issues to tackle was Cyber Security attack. We have
numerous authentication processes like two key factor passwords, graphical passwords and …