A Study of Perceptions of Graphical Passwords

ABSTRACT

Depending on the graphical password schema, the key-space can be even bigger than alpha-numeric passwords. However, in conventional passwords, users will re-use letters within a password. This study investigates graphical passwords for symbol-reuse and finds that users do not re-use symbols with the same frequency as conventional passwords. The user-selected key- space for graphical passwords is smaller than theoretically expected. This study also reports on perceptions of graphical passwords: 52% of people do not support the use of graphical passwords within their organization. Furthermore, 57% of respondents do not support the use of such technology in their financial institutions.


AUTHORS

Photo of Dr. Renier van Heerden

Council for Scientific and Industrial Research, Pretoria,
Univeristy of the Western Cape, Computer Science Department, Bellville,
South Africa

Dr. Renier van Heerden is the Cybersecurity Manager at SANReN, heading up the proactive, academic sector, and coordinating CSIRT. The following domains are his interests: password security, network attack, network ontologies, and cyber security training. Prior to joining the CSIR, he worked as a software engineer in advanced optics applications for South African based Denel Optronics and as a lecturer at the University of Pretoria. Dr. van Heerden obtained a degree in Electronic Engineering and a Master’s degree in Computer Engineering at the University of Pretoria and a PhD at Rhodes University.

Photo of Johannes Vorster

University of Liverpool

Johannes Vorster is a researcher and systems architect working in the banking sector. His research interests include information security, financial modelling, astronomy, and artificial intelligence.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com