A Study of Perceptions of Graphical Passwords

ABSTRACT

Depending on the graphical password schema, the key-space can be even bigger than alpha-numeric passwords. However, in conventional passwords, users will re-use letters within a password. This study investigates graphical passwords for symbol-reuse and finds that users do not re-use symbols with the same frequency as conventional passwords. The user-selected key- space for graphical passwords is smaller than theoretically expected. This study also reports on perceptions of graphical passwords: 52% of people do not support the use of graphical passwords within their organization. Furthermore, 57% of respondents do not support the use of such technology in their financial institutions.


AUTHORS

Photo of Renier van Heerden

Council for Scientific and Industrial Research
Department of Electrical, Electronic and Computer Engineering University of Pretoria
South Africa

Dr. Renier van Heerden is a senior researcher at the Council for Scientific and Industrial Research (CSIR) in Pretoria, South Africa in the field of cyber security. His interests fall into the following domains: password security, network attack, and network ontologies. Prior to joining the CSIR, he worked as a software engineer in advanced optics applications for South-African-based Denel Optronics and as a Lecturer at the University of Pretoria. Renier obtained a degree in Electronic Engineering, a Master’s in Computer Engineering at the University of Pretoria and PhD at Rhodes University. Renier also obtained protea colours in Mindsport, Wargaming and was the 2010 and 2011 national champion for the Ancients discipline. Currently he is an active participant in the Flames of War wargaming community.

Photo of Johannes Vorster

University of Liverpool

Johannes Vorster is a researcher and systems architect working in the banking sector. His research interests include information security, financial modelling, astronomy, and artificial intelligence.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com