The Effects of Culture on Authentication Cognitive Dimensions

  • Mona A. MohamedEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 903)


The purpose of this research is to answer the question: does selecting images from one’s culture improve the memorability of Recognition-Based Graphical Password (RBG-P)? The results show that the failure rate of authentication increases through the progression of consecutive three phases. The findings also suggest that cultural groups with higher number of images selected from own culture, inclined to experience lower failure rates and vice versa. In fact, the ISGs that selected from their own culture showed approximately half the means of failure of the groups that selected from other cultures. Resultantly, culture has significant effects on the password memorization, therefore, the designer must be motivated to provide cross-cultural interfaces that reduce the risk and improve usability of RBG-P which minimize the frustration associated with login failures. The quick depreciation of the success rate with the progress of the phases suggests the possibility of memory decay due to temporal effects.


Culture Deflection point Mental model Memorability Confounded effects Memory decay Trade-off ∙ image sequence Culturally-oriented memorization 


  1. 1.
    Jingbo, Y., Pingping, S.: A secure strong password authentication protocol. Paper Presented at the 2nd International Conference on Software Technology and Engineering (ICSTE), vol. 2, pp. V2-355–V352-357 (2010)Google Scholar
  2. 2.
    Lashkari, A., Farmand, S.: A survey on usability and security features in graphical user authentication algorithms. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 9(9), 196–205 (2009)Google Scholar
  3. 3.
    Lashkari, A.H., Zakaria, O.B., Farmand, S., Saleh, R.: Shoulder surfing attack in graphical password authentication. (IJCSIS) Int. J. Comput. Sci. Inf. Secur. 6(2), 145–154 (2009)Google Scholar
  4. 4.
    Suo, X.: A design and analysis of graphical password. (Master of Science), Georgia State University (2006)Google Scholar
  5. 5.
    Barate, A.K., Shinde, S.S.: Graphical password system using different techniques–a review. Int. J. Eng. Trends Technol. (IJETT) 9(11), 536–539 (2014)Google Scholar
  6. 6.
    Sahu, S., Singh, A.: Enhanced user graphical password authentication with an usability and memorability. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(6), 477–484 (2015)Google Scholar
  7. 7.
    Bhusari, V.: Graphical authentication based techniques. Int. J. Sci. Res. Publ. 3(7), 31–38 (2013)Google Scholar
  8. 8.
    Rasekgala, M.; Ewert, S.; Sanders, I., Fogwill, T.: Requirements for secure graphical password schemes. Paper Presented at the IST-Africa Le Meridien Ile Maurice, pp. 1–10 (2014)Google Scholar
  9. 9.
    Bhusari, V.: Graphical authentication based techniques. Int. J. Sci. Res. Publ. 3(7), 31–38 (2013)Google Scholar
  10. 10.
    Forget, A., Chiasson, S., van Oorschot, P.C., Biddle, R.: Persuasion for stronger passwords: motivation and pilot study. In: Persuasive Technology. Lecture Notes in Computer Science, vol. 5033, pp. 140–150 (2008)CrossRefGoogle Scholar
  11. 11.
    Aljahdali, H., Poet, R.: The affect of familiarity on the usability of recognition-based graphical password. Paper Presented at the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1528–1534 (2013)Google Scholar
  12. 12.
    Hofstede, G., Bond, M.H.: Hofstede’s cultural dimensions: an independent validation using Rokeach’s value survey. J. Cross-Cult. Psychol. Mark. 15(4), 417–433 (1984)CrossRefGoogle Scholar
  13. 13.
    Van der Henst, J.-B.: Mental model theory versus the inference rule approach in relational reasoning. Think. Reason. 8(3), 193–203 (2002)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.e-Business and Technology ManagementTowson UniversityTowsonUSA

Personalised recommendations