Towards an effective recognition graphical password mechanism based on cultural familiarity

Text-based passwords for authentication are exposed to the dictionary attack as users tend to create weak passwords for easy memorability. When dealing with user’s authentication, pictures are more likely to be simply remembered in comparison with words. Hence, this study aimed to determine the typ...

Full description

Saved in:
Bibliographic Details
Main Author: Shaban, Abdullah Ibrahim
Format: Thesis
Language:eng
eng
Published: 2017
Subjects:
Online Access:https://etd.uum.edu.my/6558/1/s814886_01.pdf
https://etd.uum.edu.my/6558/2/s814886_02.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.6558
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
advisor Zakaria, Nur Haryani
topic T58.5-58.64 Information technology
spellingShingle T58.5-58.64 Information technology
Shaban, Abdullah Ibrahim
Towards an effective recognition graphical password mechanism based on cultural familiarity
description Text-based passwords for authentication are exposed to the dictionary attack as users tend to create weak passwords for easy memorability. When dealing with user’s authentication, pictures are more likely to be simply remembered in comparison with words. Hence, this study aimed to determine the types of pictures in accordance to users’ cultural background. It also investigated the relationship between the choices of password and the cultural familiarity along with the effect of Graphical Password (GP) on security and usability. A list of guidelines was proposed for the recognition of graphical passwords. This is believed to increase the security as well as usability. A total of 40 students were recruited to build a GP database. Further, an evaluation was conducted to investigate users’ familiarity and recognition of the GP from the database using 30 other respondents. The results showed that the 30 participants positively responded to the familiar pictures in accordance to their cultures. The result of successful login rate was 79.51% which indicates that cultural-based GP has increased the respondents’ familiarity by promoting their memorability. Further, the respondents who chose familiar GP had higher guessing attack rate than the unfamiliar GP. Finally, a total of 8 guidelines were established based on the aspects that correspond to the users’ preferences for choosing and processing GP. These guidelines can be used by graphical password system designers to develop effective GP systems
format Thesis
qualification_name masters
qualification_level Master's degree
author Shaban, Abdullah Ibrahim
author_facet Shaban, Abdullah Ibrahim
author_sort Shaban, Abdullah Ibrahim
title Towards an effective recognition graphical password mechanism based on cultural familiarity
title_short Towards an effective recognition graphical password mechanism based on cultural familiarity
title_full Towards an effective recognition graphical password mechanism based on cultural familiarity
title_fullStr Towards an effective recognition graphical password mechanism based on cultural familiarity
title_full_unstemmed Towards an effective recognition graphical password mechanism based on cultural familiarity
title_sort towards an effective recognition graphical password mechanism based on cultural familiarity
granting_institution Universiti Utara Malaysia
granting_department Awang Had Salleh Graduate School of Arts & Sciences
publishDate 2017
url https://etd.uum.edu.my/6558/1/s814886_01.pdf
https://etd.uum.edu.my/6558/2/s814886_02.pdf
_version_ 1747828091424604160
spelling my-uum-etd.65582021-08-18T06:54:39Z Towards an effective recognition graphical password mechanism based on cultural familiarity 2017 Shaban, Abdullah Ibrahim Zakaria, Nur Haryani Awang Had Salleh Graduate School of Arts & Sciences Awang Had Salleh Graduate School of Arts and Sciences T58.5-58.64 Information technology Text-based passwords for authentication are exposed to the dictionary attack as users tend to create weak passwords for easy memorability. When dealing with user’s authentication, pictures are more likely to be simply remembered in comparison with words. Hence, this study aimed to determine the types of pictures in accordance to users’ cultural background. It also investigated the relationship between the choices of password and the cultural familiarity along with the effect of Graphical Password (GP) on security and usability. A list of guidelines was proposed for the recognition of graphical passwords. This is believed to increase the security as well as usability. A total of 40 students were recruited to build a GP database. Further, an evaluation was conducted to investigate users’ familiarity and recognition of the GP from the database using 30 other respondents. The results showed that the 30 participants positively responded to the familiar pictures in accordance to their cultures. The result of successful login rate was 79.51% which indicates that cultural-based GP has increased the respondents’ familiarity by promoting their memorability. Further, the respondents who chose familiar GP had higher guessing attack rate than the unfamiliar GP. Finally, a total of 8 guidelines were established based on the aspects that correspond to the users’ preferences for choosing and processing GP. These guidelines can be used by graphical password system designers to develop effective GP systems 2017 Thesis https://etd.uum.edu.my/6558/ https://etd.uum.edu.my/6558/1/s814886_01.pdf text eng public https://etd.uum.edu.my/6558/2/s814886_02.pdf text eng public masters masters Universiti Utara Malaysia Adebola, Obasan, Owohunwa, Patrick, & Sikiru, Abdulazeez. GRAPHICAL PASSWORD AUTHENTICATION METHODS IN INFORMATION SECURITY. Journal of Physical Science and Innovation, 6(2), 2014. Aljahdali, Hani Moaiteq, & Poet, Ron. (2014a). Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords. Paper presented at the Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on. Aljahdali, Hani Moaiteq, & Poet, Ron. (2014b). Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks. Paper presented at the Proceedings of the 7th International Conference on Security of Information and Networks. Aljahdali, Hani Moaiteq, & Poet, Ron. (2014c). Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords. Paper presented at the Proceedings of the 7th International Conference on Security of Information and Networks. Almuairfi, Sadiq, Veeraraghavan, Prakash, & Chilamkurti, Naveen. (2013). A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Mathematical and Computer Modelling, 58(1), 108-116. Ávila, Ismael, Menezes, Ewerton, & Braga, Alexandre Melo. (2013). Strategy to Support the Memorization of Iconic Passwords. Emerging Research and Trends in Interactivity and the Human-Computer Interface, 239. Baddeley, Alan D. (1997). Human memory: Theory and practice: Psychology Press. Bellare, Mihir, Ristenpart, Thomas, & Tessaro, Stefano. (2012). Multi-instance security and its application to password-based cryptography Advances in Cryptology–CRYPTO 2012 (pp. 312-329): Springer. Biddle, R, Chiasson, S, & Oorschot, PCv. Graphical Passwords: Learning from the First Generation. 2009: Ottawa: Canada. Biddle, R, Chiasson, S, & van Oorschot, P. (2010). Graphical passwords: Learning from the first twelve years,‖ in ACM Computing Surveys. Carleton Univ. Biddle, Robert, Chiasson, Sonia, & Van Oorschot, Paul C. (2012). Graphical passwords: Learning from the first twelve years. ACM Computing Surveys (CSUR), 44(4), 19. Brooke, J. 1996. SUS–A quick and dirty usability scale. Usability Evaluation in Industry. Brostoff, Sacha, & Sasse, M Angela. (2000). Are Passfaces more usable than passwords? A field trial investigation People and Computers XIV—Usability or Else! (pp. 405-424): Springer. Catuogno, Luigi, & Galdi, Clemente. (2014). Analysis of a two-factor graphical password scheme. International Journal of Information Security, 13(5), 421-437. Cavalcante, Rodolfo Carneiro, Bittencourt, Ig Ibert, da Silva, Alan Pedro, Silva, Marlos, Costa, Evandro, & Santos, Robério. (2012). A survey of security in multi-agent systems. Expert Systems with Applications, 39(5), 4835-4846. Chang, Ting-Yi, Tsai, Cheng-Jung, & Lin, Jyun-Hao. (2012). A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. Journal of Systems and Software, 85(5), 1157-1165. Chaturvedi, Smita, & Sharma, Rekha. (2015). Securing Text & Image Password Using the Combinations of Persuasive Cued Click Points with Improved Advanced Encryption Standard. Procedia Computer Science, 45, 418-427. Checkoway, Harvey, Pearce, Neil, & Kriebel, David. (2004). Research methods in occupational epidemiology (Vol. 34): Oxford University Press. Chin, John P, Diehl, Virginia A, & Norman, Kent L. (1988). Development of an instrument measuring user satisfaction of the human-computer interface. Paper presented at the Proceedings of the SIGCHI conference on Human factors in computing systems. Chowdhury, Soumyadeb. (2015). Exploring the memorability of multiple recognition-based graphical passwords and their resistance to guessability attacks. University of Glasgow. Chowdhury, Soumyadeb, Poet, Ron, & Mackenzie, Lewis. (2013). A comprehensive study of the usability of multiple graphical passwords Human-Computer Interaction–INTERACT 2013 (pp. 424-441): Springer. Colella, Antonio, & Colombini, Clara. (2012). Security paradigm in ubiquitous computing. Paper presented at the Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on. Conway, Martin A, & Dewhurst, Stephen A. (1995). The self and recollective experience. Applied Cognitive Psychology, 9(1), 1-19. Cranor, Lorrie Faith, & Garfinkel, Simson. (2005). Security and usability: designing secure systems that people can use: " O'Reilly Media, Inc.". Davis, Darren, Monrose, Fabian, & Reiter, Michael K. (2004). On User Choice in Graphical Password Schemes. Paper presented at the USENIX Security Symposium. De Angeli, A. et al. 2005. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies. 63(1-2). Dhanake, Mr Sagar A, Korade, Mr Umesh M, Shitole, Mr Chetan P, Kedar, Mr Sagar B, & Lomte, VM. (2014). Authentication Scheme for Session Password using matrix Colour and Text: IOSR-JCE/ISSN. Duggan, Geoffrey B, Johnson, Hilary, & Grawemeyer, Beate. (2012). Rational security: Modelling everyday password use. International journal of human-computer studies, 70(6), 415-431. Dunphy, Paul, Nicholson, James, & Olivier, Patrick. (2008). Securing passfaces for description. Paper presented at the Proceedings of the 4th symposium on Usable privacy and security. Eckhardt, Giana. (2002). Culture's consequences: Comparing values, behaviors, institutions and organisations across nations. Australian journal of management, 27(1), 89-94. Einwohner, R. L., Hollander, J. A., & Olson, T. 2000. ENGENDERING SOCIAL MOVEMENTS Cultural Images and Movement Dynamics. Gender & Society, 14(5) Eljetlawi, Ali Mohamed. (2008). Study and develop a new graphical password system. Universiti Teknologi Malaysia, Faculty of Computer Science and Information System. English, Rosanne. (2012). Modelling the security of recognition-based graphical password schemes. University of Glasgow. Ford, Gabrielle, Kotzè, Paula, & Marcus, Aaron. (2005). Cultural dimensions: Who is stereotyping whom. Internationalization, Online Communities and Social Computing: Design and Evaluation, 10, 1-10. Forsberg, Kevin, & Mooz, Harold. (1991). The relationship of system engineering to the project cycle. Paper presented at the INCOSE International Symposium. Frøkjær, E. et al. 2000. Measuring usability: are effectiveness, efficiency, and satisfaction really correlated? In Proceedings of the SIGCHI conference on human factors in computing systems. Fulkar, Ashwini, Sawla, Suchita, Khan, Zubin, & Solanki, Sarang. (2012). A study of graphical passwords and various graphical password authentication schemes. World, 1(1), 04-08. Gao, Haichang, Ren, Zhongjie, Chang, Xiuling, Liu, Xiyang, & Aickelin, Uwe. (2010). A new graphical password scheme resistant to shoulder-surfing. Paper presented at the Cyberworlds (CW), 2010 International Conference on. Gasti, Paolo, & Rasmussen, Kasper B. (2012). On the security of password manager database formats Computer Security–ESORICS 2012 (pp. 770-787): Springer. Gurav, Shraddha M, Gawade, Leena S, Rane, Prathamey K, & Khochare, Nilesh R. (2014). Graphical password authentication: Cloud securing scheme. Paper presented at the Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on. Hart, S. G. and Staveland, L. E. (1988). Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. Advances in Psychology. Herley, Cormac, Oorschot, PC, & Patrick, Andrew S. (2009). Passwords: If We're So Smart, Why Are We Still Using Them?, Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers: Springer-Verlag, Berlin, Heidelberg. Hlywa, Max, Biddle, Robert, & Patrick, Andrew S. (2011). Facing the facts about image type in recognition-based graphical passwords. Paper presented at the Proceedings of the 27th Annual Computer Security Applications Conference. Hong, Dawei, Man, Shushuang, Hawes, Barbra, & Matthews, Manton M. (2004). A Graphical Password Scheme Strongly Resistant to Spyware. Paper presented at the Security and Management. Hofstede, G. 2001. Culture’s consequences: Comparing values, behaviours, institutions, and organizations across nations. 2nd ed. Thousand Oaks, CA: Sage. Hui, Liew Tze, Bashier, Housam Khalifa, Hoe, Lau Siong, Michael, Goh Kah Ong, & Kwee, Wee Kouk. (2014). Conceptual framework for high-end graphical password. Paper presented at the Information and Communication Technology (ICoICT), 2014 2nd International Conference on. Jain, Anil, Bolle, Ruud, & Pankanti, Sharath. (2006). Biometrics: personal identification in networked society (Vol. 479): Springer Science & Business Media. Jiao, K. 2008. The influence of the cultural differences between the UK and Taiwan on Kellogg’s international marketing strategies. MA thesis, Bournemouth University Jali, Mohd, Furnell, Steven, & Dowland, Paul. (2011). Quantifying the effect of graphical password guidelines for better security Future Challenges in Security and Privacy for Academia and Industry (pp. 80-91): Springer. Janakiraman, Siva, Thenmozhi, K, Rayappan, John Bosco Balaguru, & Amirtharajan, Rengarajan. (2014). Graphical Password Authentication Scheme for Embedded Platform. Journal of Artificial Intelligence, 7(4), 161-171. Jansen, Wayne. (2004). Authenticating mobile device users through image selection. The Internet Society: Advances in Learning, Commerce and Security, 1, 183-194. Jebriel, Salem, & Poet, Ron. (2014). Automatic registration of user drawn graphical passwords. Paper presented at the Computer Science and Information Technology (CSIT), 2014 6th International Conference on. Jermyn, Ian, Mayer, Alain J, Monrose, Fabian, Reiter, Michael K, & Rubin, Aviel D. (1999). The Design and Analysis of Graphical Passwords. Paper presented at the Usenix Security. Johnson, Margaret L. (2004). Biometrics and the threat to civil liberties. Computer, 37(4), 90-92. Jusdanis, G. 2011. The necessary nation. Princeton University press. Kawagoe, Kyoji, Sakaguchi, Shinichi, Sakon, Yuki, & Huang, Hung-Hsuan. (2012). Tag association based graphical password using image feature matching. Paper presented at the Database Systems for Advanced Applications. Kawale, Nilesh, & Patil, Shubhangi. (2014). A Recognization Based Graphical Password System. International Journal of Current Engineering and Technology, 4(2). Khanh Dang, Tran, & Tri Dang, Tran. (2013). A survey on security visualization techniques for web information systems. International Journal of Web Information Systems, 9(1), 6-31. Khodadadi, Touraj, Alizadeh, Mojtaba, Gholizadeh, Somayyeh, Zamani, Mazdak, & Darvishi, Mahdi. (2015). Security Analysis Method of Recognition-Based Graphical Password. Jurnal Teknologi, 72(5). Khot, Rohit Ashok, Kumaraguru, Ponnurangam, & Srinathan, Kannan. (2012). WYSWYE: shoulder surfing defense for recognition based graphical passwords. Paper presented at the Proceedings of the 24th Australian Computer-Human Interaction Conference. Kitayama, Shinobu, Duffy, Sean, Kawamura, Tadashi, & Larsen, Jeff T. (2003). Perceiving an object and its context in different cultures A cultural look at new look. Psychological Science, 14(3), 201-206. Komanduri, Saranga, & Hutchings, Dugald R. (2008). Order and entropy in picture passwords. Paper presented at the Proceedings of graphics interface 2008. Kronenfeld, David B, Bennardo, Giovanni, de Munck, Victor C, & Fischer, Michael D. (2011). A companion to cognitive anthropology: John Wiley & Sons. Ku, Yunlim, Choi, Okkyung, Kim, Kangseok, Shon, Taeshik, Hong, Manpyo, Yeh, Hongjin, & Kim, Jai-Hoon. (2012). Extended OTP mechanism based on graphical password method Future Information Technology, Application, and Service (pp. 203-212): Springer. Kumari, Swati, & Oberoi, Ruhi Kaur. Defense against Shoulder Surfing Attack for Recognition Based Graphical Password. Lashkari, Arash Habibi, Manaf, Azizah Abdul, & Masrom, Maslin. (2011). A Secure Recognition Based Graphical Password by Watermarking. Paper presented at the Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on. Lashkari, Arash Habibi, Manaf, Azizah Abdul, Masrom, Maslin, & Daud, Salwani Mohd. (2011). Security evaluation for graphical password Digital Information and Communication Technology and Its Applications (pp. 431-444): Springer. Lonner, Walter J, Berry, John W, & Hofstede, Geert H. (1980). Culture's Consequences: International Differences in Work-Related Values. University of Illinois at Urbana-Champaign's Academy for Entrepreneurial Leadership Historical Research Reference in Entrepreneurship. Luvaas, Brent. (2013). DIY style: fashion, music and global digital cultures: A&C Black. Mathur, P. N. 1978. Barriers to effective visual communication. Media Asia, 3 Mayer, Richard E, & Moreno, Roxana. (2003). Nine ways to reduce cognitive load in multimedia learning. Educational psychologist, 38(1), 43-52. McCoy, Scott, Galletta, Dennis F, & King, William R. (2007). Applying TAM across cultures: the need for caution. European Journal of Information Systems, 16(1), 81-90. Mihajlov, Martin, & Jerman-Blažič, Borka. (2011). On designing usable and secure recognition-based graphical authentication mechanisms. Interacting with Computers, 23(6), 582-593. Mihajlov, Martin, Jerman-Blazič, Borka, & Ilievski, Marko. (2011). Recognition-Based Graphical Authentication with Single-Object Images. Paper presented at the Developments in E-systems Engineering (DeSE), 2011. Miller, S. (2006). Experimental Design & Statistics: New Essential Psychology : Routledge, 2 vol. 1. Monrose, Fabian, & Reiter, Michael K. (2005). Graphical passwords. Security and Usability, 147-164. Nicholson, James, Dunphy, Paul, Coventry, Lynne, Briggs, Pamela, & Olivier, Patrick. (2012). A security assessment of tiles: a new portfolio-based graphical authentication system. Paper presented at the CHI'12 Extended Abstracts on Human Factors in Computing Systems. Nisbett, Richard E, & Miyamoto, Yuri. (2005). The influence of culture: holistic versus analytic perception. Trends in cognitive sciences, 9(10), 467-473. Nisbett, Richard E, Peng, Kaiping, Choi, Incheol, & Norenzayan, Ara. (2001). Culture and systems of thought: holistic versus analytic cognition. Psychological review, 108(2), 291. Noiwan, Jantawan, & Norcio, Anthony F. (2006). Cultural differences on attention and perceived usability: Investigating color combinations of animated graphics. International journal of Human-computer studies, 64(2), 103-122 O’Sullivan, E, Rassel, GR, & Berner, M. (2003). Research Methods for Public Administrators . Addison Westely Longman: Inc. Olukayode, Obasan Adebola, Ithnin, Norafida, & Ogunnusl, Olumide Siemeon (2014).Memorability Rates of Graphical Password schemes. Journal of Theoretical & Applied Information Technology, 66(1). Parkin, Alan J. (1993). Memory: Phenomena, experiment and theory: Psychology Press. Perrig, Adrian. (2000). Shortcomings of password-based authentication: September. Pettersson, R. 1982. Cultural differences in the perception of image and color in pictures. Educational technology research and development, 30(1), Ploehn, Cathryn A, & Greene, Kristen K. (2015). The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords Human Aspects of Information Security, Privacy, and Trust (pp. 95-106): Springer. Poet, Ron, & Renaud, Karen. (2009). An algorithm for automatically choosing distractors for recognition based authentication using minimal image types. Ergonomics Open Journal, 2, 178-184. Prasad, PESN Krishna, Prasad, BDCN, Chakravarthy, ASN, & Avadhani, PS. (2012). Password Authentication using Context-Sensitive Associative Memory Neural Networks: A Novel Approach Advances in Computer Science and Information Technology. Computer Science and Engineering (pp. 454-468): Springer. Prasanth, N Narayanan, Azarudeen, K, Kabeer, M Gulam Ahamed, & Mohamed, J Gulam Peer. (2014). Enhanced Graphical Password Based Authentication Using Persuasive Cued Click-Points. i-Manager's Journal on Software Engineering, 8(3), 26. Qingxue, Liu. (2003). Understanding Different Cultural Patterns or Orientations Between East and West. Investigationes Linguisticae, 9. Raja, Kiran B, Raghavendra, R, Stokkenes, Martin, & Busch, Christoph. (2015). Multi-modal authentication system for smartphones using face, iris and periocular. Paper presented at the Biometrics (ICB), 2015 International Conference on. Raza, Mudassar, Iqbal, Muhammad, Sharif, Muhammad, & Haider, Waqas. (2012). A survey of password attacks and comparative analysis on methods for secure authentication. World Applied Sciences Journal, 19(4), 439-444. Renaud, Karen. (2009a). On user involvement in production of images used in visual authentication. Journal of Visual Languages & Computing, 20(1), 1-15. Renaud, Karen. (2009b). Web authentication using Mikon images. Paper presented at the Privacy, Security, Trust and the Management of e-Business, 2009. CONGRESS'09. World Congress on. Renaud, K. 2009c. On user involvement in production of images used in visual authentication, Journal of Visual Languages & Computing, vol. 20 Renaud, Karen, Mayer, Philip, Volkamer, Melanie, & Maguire, Joel. (2013). Are graphical authentication mechanisms as strong as passwords? Paper presented at the Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on. Roy, Jhulan, Barik, Mridul Sankar, & Mazumdar, Chandan. (2004). ESRML: a markup language for enterprise security requirement specification. Paper presented at the India Annual Conference, 2004. Proceedings of the IEEE INDICON 2004. First. Salim, Farzad, Reid, Jason, & Dawson, Ed. (2015). Authorization models for secure information sharing: A survey and research agenda. The ISC International Journal of Information Security, 2(2). Sarohi, Harsh Kumar, & Khan, Farhat Ullah. (2013). Graphical password authentication schemes: current status and key issues. Int. J. Eng. Innovative Technol.(IJEIT), 10(2). Simon, M, K. (2011) . Dissertation and scholarly research : Recipes for success (2011 ed). Seattle, WA: Dissertation Success, LLC. Sobrado, Leonardo, & Birget, JC. (2004). Graphical Passwords. The Rutgers Scholar: An Electronic Bulletin of Undergraduate Research, Volume 4, 2002. Straub, Detmar, Keil, Mark, & Brenner, Walter. (1997). Testing the technology acceptance model across cultures: A three country study. Information & management, 33(1), 1-11. Stubblefield, Adam, & Simon, Dan. (2004). Inkblot authentication. Microsoft Research. Sun, Hung-Min, Chen, Yao-Hsin, Fang, Chiung-Cheng, & Chang, Shih-Ying. (2012). PassMap: a map based graphical-password authentication system. Paper presented at the Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. Suo, Xiaoyuan, Zhu, Ying, & Owen, G Scott. (2005). Graphical passwords: A survey. Paper presented at the Computer security applications conference, 21st annual. Suo, Xiaoyuan, Zhu, Ying, & Owen, G Scott. (2006). Analysis and design of graphical password techniques Advances in Visual Computing (pp. 741-749): Springer. Suresh, S, & Prakash, G. (2015). On reviewing the limitations of graphical password scheme. Tao, Hai. (2006). Pass-Go, a new graphical password scheme. University of Ottawa. Thorpe, Julie, & Van Oorschot, Paul C. (2004). Towards secure design choices for implementing graphical passwords. Paper presented at the Computer Security Applications Conference, 2004. 20th Annual. Towhidi, Farnaz, & Masrom, Maslin. (2009). A Survey on Recognition Based Graphical User Authentication Algorithms. arXiv preprint arXiv:0912.0942. Towhidi, Farnaz, Masrom, Maslin, & Abdul Manaf, Azizah. (2013). An enhancement on passface graphical password authentication. Journal of Basic and Applied Scientific Research, 3(2), 135-141. Trompenaars, F. and Turner, C. H. 1997. Riding the waves of culture: Understanding cultural diversity in business. London: Nicholas Brealay. Tullis, Thomas S, & Tedesco, Donna P. (2005). Using personal photos as pictorial passwords. Paper presented at the CHI'05 extended abstracts on Human factors in computing systems. Umar, Mohammad Sarosh, Rafiq, Mohammad Qasim, & Ansari, Juned Ahmad. (2012). Graphical user authentication: A time interval based approach. Paper presented at the Signal Processing, Computing and Control (ISPCC), 2012 IEEE International Conference on. Vacca, John R. (2013). Managing information security: Elsevier. Vachaspati, PSV, Chakravarthy, ASN, & Avadhani, PS. (2013). A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords. International Journal of Computer Applications, 71(10). van Eekelen, Wouter AJ, van den Elst, John, & Khan, Vassilis-Javed. (2013). Picassopass: a password scheme using a dynamically layered combination of graphical elements. Paper presented at the CHI'13 Extended Abstracts on Human Factors in Computing Systems. Van Teijlingen, Edwin R, Rennie, Anne‐Marie, Hundley, Vanora, & Graham, Wendy. (2001). The importance of conducting and reporting pilot studies: the example of the Scottish Births Survey. Journal of advanced nursing, 34(3), 289-295. Venkatesh, Viswanath, & Davis, Fred D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management science, 46(2), 186-204. Venkatesh, Viswanath, Morris, Michael G, Davis, Gordon B, & Davis, Fred D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478. Vockell, EL. (2001). Educational Psychology: A Practical Approach (Online Ed.), Retrieved Feb 5, 2009. Vu, Kim-Phuong L, Proctor, Robert W, Bhargav-Spantzel, Abhilasha, Tai, Bik-Lam Belin, Cook, Joshua, & Schultz, E Eugene. (2007). Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies, 65(8), 744-757. Weidenbeck, Susan, Waters, Jim, Birget, Jean-Camille, Brodskiy, Alex, & Memon, Nasir. (2005). Authentication using graphical passwords: Basic results. Paper presented at the Proc. of the 11th Int’l Conf. on Human-Computer Interaction. Werner, Steffen, & Hoover, Connor. (2012). Cognitive approaches to password memorability–the possible role of story-based passwords. Paper presented at the Proceedings of the Human Factors and Ergonomics Society Annual Meeting. Wiedenbeck, Susan, Waters, Jim, Birget, Jean-Camille, Brodskiy, Alex, & Memon, Nasir. (2005). PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63(1), 102-127. Wright, Nicholas, Patrick, Andrew S, & Biddle, Robert. (2012). Do you see your password?: applying recognition to textual passwords. Paper presented at the Proceedings of the Eighth Symposium on Usable Privacy and Security. Yadav, Uma D, & Mohod, Prakash S. (2013). Adding Persuasive features in Graphical Password to increase the capacity of KBAM. Paper presented at the Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on. Yoon, J. 2008. Searching for an image conveying connotative meanings: An exploratory cross-cultural study. Library & Information Science Research, 30(4), Zakour, Amel Ben. (2004). Cultural differences and information technology acceptance. Paper presented at the Proceedings of the 7th annual conference of the Southern association for information systems. Zangooei, Toomaj, Mansoori, Masood, & Welch, Ian. (2012). A hybrid recognition and recall based approach in graphical passwords. Paper presented at the Proceedings of the 24th Australian Computer-Human Interaction Conference.