skip to main content
10.1145/2307096.2307125acmotherconferencesArticle/Chapter ViewAbstractPublication PagesidcConference Proceedingsconference-collections
research-article

Designing textual password systems for children

Published: 12 June 2012 Publication History

Abstract

This paper describes two studies that looked at passwords for children. The first examined what children knew about the creation of textual passwords and then a second, follow on study, investigated the passwords that children chose to use. The two studies show that children have some understanding of how to make a good textual password but that the passwords they use are often in contradiction to their own knowledge of best practice. Based on the findings from these two studies, the authors propose three key design principles for systems that require textual passwords for children and where no alternative is available.

References

[1]
Dourish, P., et al., Security in the Wild: user strategies for managing security as an everyday, practical problem, Personal and Ubiquitous Computing, 8, pages. 391--401, 2004.
[2]
Gaw, S. and E. W. Felten. Password Management Strategies for Online Accounts In Proc of SOUPS. ACM Press, Pittsburgh, 2006.
[3]
Microsoft, Encourage children and teens to keep passwords secret.
[4]
Singh, S., et al. Password Sharing: Implications for Security Design Based on Social Practice In Proc of CHI 2007. ACM Press, San Jose, California, 2007.
[5]
Weiss, R. and A. De Luca. PassShapes - Utilizing Stroke Based Authentication to Increase Password Memorability In Proc of Nordichi 2008. ACM Press, Lund, Sweden, 2008.
[6]
Wiedenbeck, S., et al. Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice In Proc of SOUPS ACM Press, Pittsburgh, 2005.

Cited By

View all

Index Terms

  1. Designing textual password systems for children

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    IDC '12: Proceedings of the 11th International Conference on Interaction Design and Children
    June 2012
    399 pages
    ISBN:9781450310079
    DOI:10.1145/2307096
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • didactalab: didactalab
    • IMIS: Institut für Multimediale und Interaktive Systeme

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 June 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. child computer interaction
    2. children
    3. passwords
    4. security

    Qualifiers

    • Research-article

    Conference

    IDC '12
    Sponsor:
    • didactalab
    • IMIS

    Acceptance Rates

    Overall Acceptance Rate 172 of 578 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 14 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media