Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3340631.3394859acmconferencesArticle/Chapter ViewAbstractPublication PagesumapConference Proceedingsconference-collections
research-article

A Cross-cultural Perspective for Personalizing Picture Passwords

Published: 13 July 2020 Publication History

Abstract

Picture passwords, which require users to draw selections on images as their secret password, typically provide globalized solutions without taking into consideration that people across diverse cultures exhibit differences within interactive systems. Aiming to shed light on the effects of culture towards users' interactions within picture password schemes, we conducted a between-subjects cross-cultural (Eastern vs. Western) study (n=67). Users created a password on a picture illustrating content highly related to their daily-life experiences (culture-internal) vs. a picture illustrating the same daily-life experiences, but in a different cultural context (culture-external). Results revealed that people across cultures exhibited differences in visual processing, comprehension, and exploration of the picture content prior to making their password selections. The observed differences can be accounted by considering sociocultural theories highlighting the holistic preference of Eastern populations compared to the analytic preference of Western populations. Qualitative data also triangulate the findings by exposing the likeability and users' engagement towards the picture content familiar to individual's culture. Findings underpin the necessity to consider cultural differences in the design of personalized picture passwords.

Supplementary Material

VTT File (3340631.3394859.vtt)
MP4 File (3340631.3394859.mp4)
Supplemental Video

References

[1]
Yang Wang, Huichuan Xia, and Yun Huang. 2016. Examining American and Chinese Internet Users' Contextual Privacy Preferences of Behavioral Advertising. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16). ACM, 539--552.
[2]
Jialiu Lin, Michael Benisch, Norman Sadeh, Jianwei Niu, Jason Hong, Banghui Lu, and Shaohui Guo. 2013. A comparative study of location-sharing privacy preferences in the United States and China. Personal Ubiquitous Comput. 17, 4 (April 2013), 697--711.
[3]
Yang Wang, Gregory Norice, and Lorrie Faith Cranor. 2011. Who is concerned about what? A study of American, Chinese and Indian users' privacy concerns on social network sites. In Trust and Trustworthy Computing, Springer, 146--153.
[4]
Chen Zhao, Pamela Hinds, and Ge Gao. 2012. How and to whom people share: the role of culture in self-disclosure in online communities. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work (CSCW '12). ACM, 67--76.
[5]
Sunil Chaudhary, Yan Zhao, Eleni Berki, Juri Valtanen, Linfeng Li, Marko Helenius, and Stylianos Mystakidis. 2015. A cross-cultural and gender-based perspective for online security: Exploring knowledge, skills and attitudes of higher education students. IADIS International Journal on WWW/Internet, 13(1).
[6]
Marian Harbach, Alexander De Luca, Nathan Malkin, and Serge Egelman. 2016. Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, 4823--4827.
[7]
Yukiko Sawaya, Mahmood Sharif, Nicolas Christin, Ayumu Kubota, Akihiro Nakarai, and Akira Yamada. 2017. Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, 2202--2214.
[8]
Robert Biddle, Sonia Chiasson, and Paul C. van Oorschot. 2012. Graphical passwords: Learning from the first twelve years. ACM Comput. Surv. 44, 4, Article 19 (September 2012), 41 pages.
[9]
Paul C. van Oorschot and Julie Thorpe. 2011. Exploiting predictability in click-based graphical passwords. J. Comput. Secur. 19, 4 (December 2011), 669--702.
[10]
Julie Thorpe and Paul C. van Oorschot. 2007. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07). USENIX Association, Article 8, 1--16.
[11]
Andreas Bulling, Florian Alt, and Albrecht Schmidt. 2012. Increasing the security of gaze-based cued-recall graphical passwords using saliency masks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, 3011--3020.
[12]
Florian Alt, Stefan Schneegass, Alireza Sahami Shirazi, Mariam Hassib, and Andreas Bulling. 2015. Graphical Passwords in the Wild: Understanding How Users Choose Pictures and Passwords in Image-based Authentication Schemes. In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI '15). ACM, 316--322.
[13]
Angela H. Gutchess and Allie Indeck. 2009. Cultural influences on memory. Progress in brain research, 178, 137--150.
[14]
Takahiko Masuda and Richard E. Nisbett. 2001. Attending holistically versus analytically: Comparing the context sensitivity of Japanese and Americans. Journal of personality and social psychology, 81(5), 922--934.
[15]
Peter R. Millar, Sarah J. Serbun, Akash Vadalia, and Angela H. Gutchess. 2013. Cross-cultural differences in memory specificity. Culture and Brain, 1(2--4), 138--157.
[16]
Richard E. Nisbett and Takahiko Masuda. 2003. Culture and point of view. Proceedings of the National Academy of Sciences, 100(19), 11163--11170.
[17]
Fred C. J. Stevens, Charles D. Kaplan, Rudolph W. H. M. Ponds, Joseph P. M. Diederiks, and Jellemer Jolles. 1999. How ageing and social factors affect memory. Age and ageing, 28(4), 379--384.
[18]
Barbara Rogoff and Jayanthi Mistry. 1985. Memory development in cultural context. In Cognitive Learning and Memory in Children. Springer.
[19]
Kiemute Oyibo, Rita Orji, and Julita Vassileva. 2018. Developing Culturally Relevant Design Guidelines for Encouraging Physical Activity: a Social Cognitive Theory Perspective. Journal of Healthcare Informatics Research, 2(4), 319--352.
[20]
Lidia Oshlyansky, Harold Thimbleby, and Paul Cairns. 2004. Breaking affordance: culture as context. In Proceedings of the third Nordic conference on Human-computer interaction (NordiCHI '04). ACM, 81--84.
[21]
Vanessa Evers, Agnes Kukulska-Hulme, and Ann Jones. 1999. Cross-cultural understanding of interface design: A cross-cultural analysis of icon recognition. In Proceedings of the International Workshop on Internationalisation of Products and Systems. IWIPS 1999.
[22]
Ann Nosseir, Richard Connor, and Mark Dunlop. 2005. Internet authentication based on personal history-A feasibility test. In Proceedings of Customer Focused Mobile Services Workshop at WWW2005. ACM.
[23]
Sauvik Das, Eiji Hayashi, and Jason I. Hong. 2013. Exploring capturable everyday memory for autobiographical authentication. In Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing (UbiComp '13). ACM, 211--220.
[24]
Hani Moaiteq Aljahdali and Ron Poet. 2013. The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom. In Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM '13). IEEE, 1528--1534.
[25]
Simon S. Woo, Ron Artstein, Elsi Kaiser, Xiao Le, and Jelena Mirkovic. 2019. Using Episodic Memory for User Authentication. ACM Trans. Priv. Secur. 22, 2, Article 11 (April 2019), 34 pages.
[26]
Supriya Singh, Anuja Cabraal, Catherine Demosthenous, Gunela Astbrink, and Michele Furlong. 2007. Password sharing: implications for security design based on social practice. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '07). ACM, 895--904.
[27]
Supriya Singh, Anuja Cabraal, Catherine Demosthenous, Gunela Astbrink, and Michele Furlong. 2007. Security design based on social and cultural practice: sharing of passwords. In International Conference on Usability and Internationalization, Springer, 476--485.
[28]
Hani Moaiteq Aljahdali and Ron Poet. 2014. Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks. In Proceedings of the 7th International Conference on Security of Information and Networks (SIN '14). ACM, 272--278.
[29]
Ülkü Arslan Aydin, Cengiz Acartürk, and Kürat Çaltay. 2013. The Role of Visual Coherence in Graphical Passwords. In Proceedings of the Annual Meeting of the Cognitive Science Society (Vol. 35).
[30]
Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, and Hongxin Hu. 2013. On the security of picture gesture authentication. In Proceedings of the 22nd USENIX conference on Security (SEC'13). USENIX Association, 383--398.
[31]
Darren Davis, Fabian Monrose, and Michael K. Reiter. 2004. On user choice in graphical password schemes. In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, 11.
[32]
Martin Mihajlov, Borka Jerman-Blai, and Anita Ciunova Shuleska. 2016. Why that Picture? Discovering Password Properties in Recognition-Based Graphical Authentication. Elsevier IJHCS, 32(12), 975--988.
[33]
Miriam Erez and Efrat Gati. 2004. A Dynamic, Multi-Level Model of Culture: From the Micro Level of the Individual to the Macro Level of a Global Culture. Applied Psychology: An International Review 53, 4, 583--598.
[34]
Martin Mihajlov and Borka Jerman-Blai?. 2011. On designing usable and secure recognition-based graphical authentication mechanisms. Interact. Comput. 23, 6 (November 2011), 582--593.
[35]
Eiji Hayashi, Rachna Dhamija, Nicolas Christin, and Adrian Perrig. 2008. Use Your Illusion: secure authentication usable anywhere. In Proceedings of the 4th symposium on Usable privacy and security (SOUPS '08). ACM, 35--45.
[36]
Eiji Hayashi, Jason Hong, and Nicolas Christin. 2011. Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, 2055--2064.
[37]
Katherine M. Everitt, Tanya Bragin, James Fogarty, and Tadayoshi Kohno. 2009. A comprehensive study of frequency, interference, and training of multiple graphical passwords. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '09). ACM, 889--898.
[38]
Sonia Chiasson, Robert Biddle, and Paul C. van Oorschot. 2007. A second look at the usability of click-based graphical passwords. In Proceedings of the 3rd symposium on Usable privacy and security (SOUPS '07). ACM, 1--12.
[39]
Paul Dunphy and Jeff Yan. 2007. Do background images improve "draw a secret" graphical passwords? In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, 36--47.
[40]
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, and Nasir Memon. 2005. Authentication using graphical passwords: effects of tolerance and image choice. In Proceedings of the 2005 symposium on Usable privacy and security (SOUPS '05). ACM, 1--12.
[41]
Christina Katsini, Christos Fidas, George E. Raptis, Marios Belk, George Samaras, and Nikolaos Avouris. 2018. Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, Paper 87, 1--14.
[42]
George E. Raptis, Christina Katsini, Marios Belk, Christos Fidas, George Samaras, and Nikolaos Avouris. 2017. Using Eye Gaze Data and Visual Activities to Infer Human Cognitive Styles: Method and Feasibility Studies. In Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization (UMAP '17). ACM, 164--173.
[43]
Jeff Johnson, Steve Seixeiro, Zachary Pace, Giles van der Bogert, Sean Gilmour, Levi Siebens, Ken Tubbs. 2014. U.S. Patent 8650636, DC: U.S. Patent and Trademark Office.
[44]
Ziming Zhao, Gail-Joon Ahn, and Hongxin Hu. 2015. Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. Journal of ACM Transactions on Information and System Security (TISSEC) 17, 4, Article 14 (April 2015), 37 pages.
[45]
Federico Perazzi, Philipp Krahenbuhl, Yael Pritch, and Alexander Hornung. 2012. Saliency filters: Contrast based filtering for salient region detection. IEEE Conference on Computer Vision and Pattern Recognition, 733--740.
[46]
Maurizio Cardaci, Vito Di Gesu, Maria Petrou, and Marco Elio Tabacchi. 2009. A fuzzy approach to the evaluation of image complexity. Fuzzy Sets and Systems 160, 10 (May 2009), 1474--1484.
[47]
Argyris Constantinides, Christos Fidas, Marios Belk, and Andreas Pitsillides. 2019. "I Recall this Picture": Understanding Picture Password Selections based on Users' Sociocultural Experiences. In IEEE/WIC/ACM International Conference on Web Intelligence (WI '19). ACM, 408--412.
[48]
Argyris Constantinides, Marios Belk, Christos Fidas, and Andreas Pitsillides. 2020. An eye gaze-driven metric for estimating the strength of graphical passwords based on image hotspots. In Proceedings of the 25th International Conference on Intelligent User Interfaces (IUI '20). ACM, 33--37.
[49]
Ara Norenzayan, Edward E. Smith, Beom Jun Kim, and Richard E. Nisbett. 2002. Cultural preferences for formal versus intuitive reasoning. Cognitive science 26, no. 5 (2002): 653--684.
[50]
Shinobu Kitayama, Sean Duffy, Tadashi Kawamura, and Jeff T. Larsen. 2003. Perceiving an object and its context in different cultures: A cultural look at new look. Psychological science 14, no. 3 (2003): 201--206.
[51]
William L. Phillips. 2019. Cross?cultural differences in visual perception of color, illusions, depth, and pictures. Cross-Cultural Psychology: Contemporary Themes and Perspectives (2019): 287--308.
[52]
Marios Belk, Christos Fidas, Panagiotis Germanakos, and George Samaras. 2017. The interplay between humans, technology and user authentication: A cognitive processing perspective. Computers in Human Behavior, 76, 184--200.
[53]
Paul C. van Oorschot, Amirali Salehi-Abari, and Julie Thorpe. 2010. Purely Automated Attacks on PassPoints-Style Graphical Passwords. In IEEE Transactions on Information Forensics and Security 5, 3, 393--405.
[54]
Argyris Constantinides, Marios Belk, Christos Fidas, and George Samaras. 2018. On Cultural-centered Graphical Passwords: Leveraging on Users' Cultural Experiences for Improving Password Memorability. In Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization (UMAP '18). ACM, 245--249.
[55]
Endel Tulving. 1972. Episodic and semantic memory. Organization of memory, 1, 381--403.
[56]
Karen Renaud. 2009. On user involvement in production of images used in visual authentication. Journal of Visual Languages and Computing 20, 1, 1--15.
[57]
Argyris Constantinides, Christos Fidas, Marios Belk, and George Samaras. 2018. On sociocultural-centered graphical passwords: an initial framework. In Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct (MobileHCI '18). ACM, 277--284.
[58]
Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, and Cormac Herley. 2013. Does my password go up to eleven? the impact of password meters on password selection. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). ACM, 2379--2388.
[59]
Angela Martina Sasse, Sacha Brostoff, and Dirk Weirich. 2001. Transforming the 'weakest link'-a human/computer interaction approach to usable and effective security. BT technology journal, 19(3), 122--131.
[60]
Jeff Yan, Alan Blackwell, Ross Anderson, and Alasdair Grant. 2004. Password memorability and security: Empirical results. IEEE Security & privacy, 2(5), 25--31.
[61]
Rilla Khaled, Ronald Fischer, James Noble, and Robert Biddle. 2008. A qualitative study of culture and persuasion in a smoking cessation game. In International Conference on Persuasive Technology (pp. 224--236). Springer, Heidelberg.
[62]
Hiroaki Kimura and Tatsuo Nakajima. 2011. Designing Persuasive Applications to Motivate Sustainable Behavior in Collectivist Cultures. PsychNology Journal, 9(1), 7--28.
[63]
Nitish Singh, Georg Fassott, Hongxin Zhao, and Paul D. Boughton. 2006. A cross-cultural analysis of German, Chinese and Indian consumers' perception of web site adaptation. Journal of Consumer Behaviour, 5(1), 56--68.
[64]
Rita Orji and Regan L. Mandryk. 2014. Developing culturally relevant design guidelines for encouraging healthy eating behavior. Int. J. Hum.-Comput. Stud. 72, 2 (February 2014), 207--223.
[65]
Kiemute Oyibo, Rita Orji, and Julita Vassileva. 2017. The Influence of Culture in the Effect of Age and Gender on Social Influence in Persuasive Technology. In Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization (UMAP '17). ACM, 47--52.
[66]
Argyris Constantinides, Marios Belk, Christos Fidas, and Andreas Pitsillides. 2019. On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords. In Proceedings of the 27th ACM Conference on User Modeling, Adaptation and Personalization (UMAP '19). ACM, 201--205.

Cited By

View all
  • (2023)Security and Usability of a Personalized User Authentication Paradigm: Insights from a Longitudinal Study with Three Healthcare OrganizationsACM Transactions on Computing for Healthcare10.1145/35646104:1(1-40)Online publication date: 27-Feb-2023
  • (2023)Smart home cybersecurity awareness and behavioral incentivesInformation & Computer Security10.1108/ICS-03-2023-003231:5(545-575)Online publication date: 2-Jun-2023
  • (2021)Difficulties of Measuring Culture in Privacy StudiesProceedings of the ACM on Human-Computer Interaction10.1145/34795225:CSCW2(1-26)Online publication date: 18-Oct-2021
  • Show More Cited By

Index Terms

  1. A Cross-cultural Perspective for Personalizing Picture Passwords

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      UMAP '20: Proceedings of the 28th ACM Conference on User Modeling, Adaptation and Personalization
      July 2020
      426 pages
      ISBN:9781450368612
      DOI:10.1145/3340631
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 July 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cultural differences
      2. picture passwords
      3. user authentication

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      UMAP '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 162 of 633 submissions, 26%

      Upcoming Conference

      UMAP '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)36
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Security and Usability of a Personalized User Authentication Paradigm: Insights from a Longitudinal Study with Three Healthcare OrganizationsACM Transactions on Computing for Healthcare10.1145/35646104:1(1-40)Online publication date: 27-Feb-2023
      • (2023)Smart home cybersecurity awareness and behavioral incentivesInformation & Computer Security10.1108/ICS-03-2023-003231:5(545-575)Online publication date: 2-Jun-2023
      • (2021)Difficulties of Measuring Culture in Privacy StudiesProceedings of the ACM on Human-Computer Interaction10.1145/34795225:CSCW2(1-26)Online publication date: 18-Oct-2021
      • (2021)A Comparative Study among Different Computer Vision Algorithms for Assisting Users in Picture Password CompositionAdjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization10.1145/3450614.3464474(357-362)Online publication date: 21-Jun-2021
      • (2021)Diversity-aware Recommendations for Social Justice? Exploring User Diversity and Fairness in Recommender SystemsAdjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization10.1145/3450614.3463293(404-410)Online publication date: 21-Jun-2021
      • (2021)Better, Funner, Stronger: A Gameful Approach to Nudge People into Making Less Predictable Graphical Password ChoicesProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445658(1-17)Online publication date: 6-May-2021
      • (2021)Easy-Auth: Graphical Password Authentication using a Randomization Method2021 IEEE Latin-American Conference on Communications (LATINCOM)10.1109/LATINCOM53176.2021.9647825(1-6)Online publication date: 17-Nov-2021
      • (2021)Understanding Insider Attacks in Personalized Picture Password SchemesHuman-Computer Interaction – INTERACT 202110.1007/978-3-030-85610-6_42(722-731)Online publication date: 30-Aug-2021
      • (2021)An Empirical Study of Picture Password Composition on SmartwatchesHuman-Computer Interaction – INTERACT 202110.1007/978-3-030-85610-6_37(655-664)Online publication date: 30-Aug-2021
      • (2021)Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof SchemesHCI for Cybersecurity, Privacy and Trust10.1007/978-3-030-77392-2_5(66-75)Online publication date: 24-Jul-2021
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media