DeepAI AI Chat
Log In Sign Up

That's Not Me! Designing Fictitious Profiles to Answer Security Questions

by   Nicholas Micallef, et al.

Although security questions are still widely adopted, they still have several limitations. Previous research found that using system-generated information to answer security questions could be more secure than users' own answers. However, using system-generated information has usability limitations. To improve usability, previous research proposed the design of system-generated fictitious profiles. The information from these profiles would be used to answer security questions. However, no research has studied the elements that could influence the design of fictitious profiles or systems that use them to answer security questions. To address this research gap, we conducted an empirical investigation through 20 structured interviews. Our main findings revealed that to improve the design of fictitious profiles, users should be given the option to configure the profiles to make them relatable, interesting and memorable. We also found that the security questions currently provided by websites would need to be enhanced to cater for fictitious profiles.


A Serious Game Design: Nudging Users' Memorability of Security Questions

Security questions are one of the techniques used to recover passwords. ...

Open Data and Quantitative Techniques for Anthropology of Road Traffic

What kind of questions about human mobility can computational analysis h...

A Model for Enhancing Human Behaviour with Security Questions: A Theoretical Perspective

Security questions are one of the mechanisms used to recover passwords. ...

Involving Users in the Design of a Serious Game for Security Questions Education

When using security questions most users still trade-off security for th...

Changing users' security behaviour towards security questions: A game based learning approach

Fallback authentication is used to retrieve forgotten passwords. Securit...

SandBlaster: Reversing the Apple Sandbox

In order to limit the damage of malware on Mac OS X and iOS, Apple uses ...

Autonomy, Authenticity, Authorship and Intention in computer generated art

This paper examines five key questions surrounding computer generated ar...