Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3311927.3325354acmconferencesArticle/Chapter ViewAbstractPublication PagesidcConference Proceedingsconference-collections
abstract

Children's Authentication: Understanding and Usage

Published: 12 June 2019 Publication History

Abstract

With the widespread infusion of technology into society, children (ages 5-11) not only interact with technology but are also required to create and use credentials in order to authenticate and use various platforms. My primary goal with this research is to investigate children's understanding and practices in terms of creating and using credentials -- across the globe. I describe an initial study conducted via semi-structured interviews with children and an online survey with adults (parents and teachers), that help us to understand the adult's understanding of authentication and the role they play in children's credential creation and usage. Results shows that children have limited knowledge and understanding of credential creation and usage and that there is also a gap in adult's theoretical knowledge and practical implementations.

References

[1]
Sonia Chiasson, Alain Forget, Elizabeth Stobert, P.C. van Oorschot, and Robert Biddle. 2009. Multiple Password Interference in Text Passwords and Click-based Graphical Passwords. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09). ACM, New York, NY, USA, 500--511.
[2]
Jasper Cole, Greg Walsh, and Zach Pease. 2017. Click to Enter: Comparing Graphical and Textual Passwords for Children. In Proceedings of the 2017 Conference on Interaction Design and Children - IDC '17. ACM Press, Stanford, California, USA, 472--477.
[3]
Serge Egelman and Eyal Peer. 2015. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 2873--2882.
[4]
Tatiana Gossen, Juliane Hobel, and Andreas Nurnberger. 2014. A Comparative Study About Children's and Adults' Perception of Targeted Web Search Engines. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 1821--1824.
[5]
Priya Kumar, Shalmali Milind Naik, Utkarsha Ramesh Devkar, Marshini Chetty, Tamara L. Clegg, and Jessica Vitak. 2017. 'No Telling Passcodes Out Because They're Private': Understanding Children's Mental Models of Privacy and Security Online. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (Dec. 2017), 1--21.
[6]
Dev Raj Lamichhane and Janet C. Read. 2017. Investigating Children's Passwords using a Game-based Survey. In Proceedings of the 2017 Conference on Interaction Design and Children - IDC '17. ACM Press, Stanford, California, USA, 617--622.
[7]
Sumbal Maqsood, Robert Biddle, Sana Maqsood, and Sonia Chiasson. 2018. An exploratory study of children's online password behaviours. In Proceedings of the 17th ACM Conference on Interaction Design and Children - IDC '18. ACM Press, Trondheim, Norway, 539--544.
[8]
Diogo Marques, Luís Duarte, and Luís Carriço. 2012. Privacy and secrecy in ubiquitous text messaging. In Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services companion - MobileHCI '12. ACM Press, San Francisco, California, USA, 95.
[9]
Janet C. Read and Brendan Cassidy. 2012. Designing Textual Password Systems for Children. In Proceedings of the 11th International Conference on Interaction Design and Children (IDC '12). ACM, New York, NY, USA, 200--203.

Cited By

View all
  • (2023)Framework for Multi-factor Authentication with Dynamically Generated PasswordsAdvances in Information and Communication10.1007/978-3-031-28073-3_39(563-576)Online publication date: 2-Mar-2023
  • (2021)Authentication Mechanisms and Classification: A Literature SurveyIntelligent Computing10.1007/978-3-030-80129-8_69(1051-1070)Online publication date: 6-Jul-2021

Index Terms

  1. Children's Authentication: Understanding and Usage

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IDC '19: Proceedings of the 18th ACM International Conference on Interaction Design and Children
    June 2019
    787 pages
    ISBN:9781450366908
    DOI:10.1145/3311927
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 June 2019

    Check for updates

    Author Tags

    1. Authentication for children
    2. security mechanisms

    Qualifiers

    • Abstract
    • Research
    • Refereed limited

    Conference

    IDC '19
    Sponsor:
    IDC '19: Interaction Design and Children
    June 12 - 15, 2019
    ID, Boise, USA

    Acceptance Rates

    IDC '19 Paper Acceptance Rate 41 of 124 submissions, 33%;
    Overall Acceptance Rate 172 of 578 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)13
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 22 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Framework for Multi-factor Authentication with Dynamically Generated PasswordsAdvances in Information and Communication10.1007/978-3-031-28073-3_39(563-576)Online publication date: 2-Mar-2023
    • (2021)Authentication Mechanisms and Classification: A Literature SurveyIntelligent Computing10.1007/978-3-030-80129-8_69(1051-1070)Online publication date: 6-Jul-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media