Published: June 22, 2014
Author(s)
Kristen Greene (NIST), Melissa Gallagher (Rice University), Brian Stanton (NIST), Paul Lee (NIST)
Conference
Name: Second International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014)
Dates: 06/22/2014 - 06/27/2014
Location: Heraklion, Crete, Greece
Citation: HAS 2014: Human Aspects of Information Security, Privacy, and Trust, vol. 8533, pp. 160-171
Given the numerous constraints of onscreen keyboards, such as smaller keys and lack of tactile feedback, remembering and typing long, complex passwords—an already burdensome task on desktop computing systems—becomes nearly unbearable on small mobile touchscreens. Complex passwords require numerous screen depth changes and are problematic both motorically and cognitively. Here we present baseline data on device- and age-dependent differences in human performance with complex passwords, providing a valuable starting dataset to warn that simply porting password requirements from one platform to another (i.e., desktop to mobile) without considering device constraints may be unwise.
Given the numerous constraints of onscreen keyboards, such as smaller keys and lack of tactile feedback, remembering and typing long, complex passwords—an already burdensome task on desktop computing systems—becomes nearly unbearable on small mobile touchscreens. Complex passwords require numerous...
See full abstract
Given the numerous constraints of onscreen keyboards, such as smaller keys and lack of tactile feedback, remembering and typing long, complex passwords—an already burdensome task on desktop computing systems—becomes nearly unbearable on small mobile touchscreens. Complex passwords require numerous screen depth changes and are problematic both motorically and cognitively. Here we present baseline data on device- and age-dependent differences in human performance with complex passwords, providing a valuable starting dataset to warn that simply porting password requirements from one platform to another (i.e., desktop to mobile) without considering device constraints may be unwise.
Hide full abstract
Keywords
passwords; authentication; security; memory; mobile text entry; typing; touchscreens; smartphones; tablets
Control Families
None selected