That's Not Me! Designing Fictitious Profiles to Answer Security Questions

08/24/2019
by   Nicholas Micallef, et al.
0

Although security questions are still widely adopted, they still have several limitations. Previous research found that using system-generated information to answer security questions could be more secure than users' own answers. However, using system-generated information has usability limitations. To improve usability, previous research proposed the design of system-generated fictitious profiles. The information from these profiles would be used to answer security questions. However, no research has studied the elements that could influence the design of fictitious profiles or systems that use them to answer security questions. To address this research gap, we conducted an empirical investigation through 20 structured interviews. Our main findings revealed that to improve the design of fictitious profiles, users should be given the option to configure the profiles to make them relatable, interesting and memorable. We also found that the security questions currently provided by websites would need to be enhanced to cater for fictitious profiles.

READ FULL TEXT
research
09/24/2017

A Serious Game Design: Nudging Users' Memorability of Security Questions

Security questions are one of the techniques used to recover passwords. ...
research
11/30/2021

Open Data and Quantitative Techniques for Anthropology of Road Traffic

What kind of questions about human mobility can computational analysis h...
research
09/24/2017

A Model for Enhancing Human Behaviour with Security Questions: A Theoretical Perspective

Security questions are one of the mechanisms used to recover passwords. ...
research
10/11/2017

Involving Users in the Design of a Serious Game for Security Questions Education

When using security questions most users still trade-off security for th...
research
09/24/2017

Changing users' security behaviour towards security questions: A game based learning approach

Fallback authentication is used to retrieve forgotten passwords. Securit...
research
03/06/2019

Autonomy, Authenticity, Authorship and Intention in computer generated art

This paper examines five key questions surrounding computer generated ar...
research
08/15/2016

SandBlaster: Reversing the Apple Sandbox

In order to limit the damage of malware on Mac OS X and iOS, Apple uses ...

Please sign up or login with your details

Forgot password? Click here to reset