{"id":"https://openalex.org/W2742205201","doi":"https://doi.org/10.1145/3106426.3106488","title":"Sweet-spotting security and usability for intelligent graphical authentication mechanisms","display_name":"Sweet-spotting security and usability for intelligent graphical authentication mechanisms","publication_year":2017,"publication_date":"2017-08-10","ids":{"openalex":"https://openalex.org/W2742205201","doi":"https://doi.org/10.1145/3106426.3106488","mag":"2742205201"},"language":"en","primary_location":{"id":"doi:10.1145/3106426.3106488","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3106426.3106488","pdf_url":null,"source":{"id":"https://openalex.org/S4306524158","display_name":"Proceedings of the International Conference on Web Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Web Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071818231","display_name":"Marios Belk","orcid":"https://orcid.org/0000-0001-6200-0178"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Marios Belk","raw_affiliation_strings":["Cognitive UX GmbH, Heidelberg, Germany"],"affiliations":[{"raw_affiliation_string":"Cognitive UX GmbH, Heidelberg, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073811431","display_name":"Andreas Pamboris","orcid":null},"institutions":[{"id":"https://openalex.org/I34771391","display_name":"University of Cyprus","ror":"https://ror.org/02qjrjx09","country_code":"CY","type":"education","lineage":["https://openalex.org/I34771391"]},{"id":"https://openalex.org/I4210108889","display_name":"University of Central Lancashire Cyprus","ror":"https://ror.org/020ps3a34","country_code":"CY","type":"education","lineage":["https://openalex.org/I185852735","https://openalex.org/I4210108889"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Andreas Pamboris","raw_affiliation_strings":["University of Central Lancashire and University of Cyprus, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"University of Central Lancashire and University of Cyprus, Nicosia, Cyprus","institution_ids":["https://openalex.org/I4210108889","https://openalex.org/I34771391"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050671131","display_name":"Christos Fidas","orcid":"https://orcid.org/0000-0001-6111-0244"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Fidas","raw_affiliation_strings":["University of Patras, Patras, Greece"],"affiliations":[{"raw_affiliation_string":"University of Patras, Patras, Greece","institution_ids":["https://openalex.org/I174878644"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090690337","display_name":"Christina Katsini","orcid":"https://orcid.org/0000-0003-4418-7199"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christina Katsini","raw_affiliation_strings":["University of Patras, Patras, Greece"],"affiliations":[{"raw_affiliation_string":"University of Patras, Patras, Greece","institution_ids":["https://openalex.org/I174878644"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033822411","display_name":"Nikolaos Avouris","orcid":"https://orcid.org/0000-0001-5408-1844"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Nikolaos Avouris","raw_affiliation_strings":["University of Patras, Patras, Greece"],"affiliations":[{"raw_affiliation_string":"University of Patras, Patras, Greece","institution_ids":["https://openalex.org/I174878644"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088484575","display_name":"George Samaras","orcid":null},"institutions":[{"id":"https://openalex.org/I34771391","display_name":"University of Cyprus","ror":"https://ror.org/02qjrjx09","country_code":"CY","type":"education","lineage":["https://openalex.org/I34771391"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"George Samaras","raw_affiliation_strings":["University of Cyprus, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"University of Cyprus, Nicosia, Cyprus","institution_ids":["https://openalex.org/I34771391"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5071818231"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.2669,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.97084548,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"252","last_page":"259"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9531999826431274,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7914708852767944},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7557711601257324},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6966097354888916},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5968618392944336},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.5023434162139893},{"id":"https://openalex.org/keywords/human-computer-interaction-in-information-security","display_name":"Human-computer interaction in information security","score":0.46879228949546814},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4483524560928345},{"id":"https://openalex.org/keywords/web-usability","display_name":"Web usability","score":0.4277683198451996},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3501349091529846},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.20428314805030823},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.0777914822101593},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.06885313987731934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7914708852767944},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7557711601257324},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6966097354888916},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5968618392944336},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5023434162139893},{"id":"https://openalex.org/C6353995","wikidata":"https://www.wikidata.org/wiki/Q17027910","display_name":"Human-computer interaction in information security","level":5,"score":0.46879228949546814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4483524560928345},{"id":"https://openalex.org/C4237393","wikidata":"https://www.wikidata.org/wiki/Q1636686","display_name":"Web usability","level":3,"score":0.4277683198451996},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3501349091529846},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.20428314805030823},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0777914822101593},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.06885313987731934}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3106426.3106488","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3106426.3106488","pdf_url":null,"source":{"id":"https://openalex.org/S4306524158","display_name":"Proceedings of the International Conference on Web Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Web Intelligence","raw_type":"proceedings-article"},{"id":"pmh:oai:clok.uclan.ac.uk:20191","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402361","display_name":"CLOK (University of Central Lancashire)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I185852735","host_organization_name":"University of Lancashire","host_organization_lineage":["https://openalex.org/I185852735"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W32152403","https://openalex.org/W32836389","https://openalex.org/W1485033854","https://openalex.org/W1503108337","https://openalex.org/W1921097329","https://openalex.org/W1972287692","https://openalex.org/W1980432433","https://openalex.org/W1986488765","https://openalex.org/W1987516957","https://openalex.org/W2001539236","https://openalex.org/W2007524456","https://openalex.org/W2014538668","https://openalex.org/W2032007354","https://openalex.org/W2059866486","https://openalex.org/W2082198354","https://openalex.org/W2087697043","https://openalex.org/W2106247215","https://openalex.org/W2113266120","https://openalex.org/W2116371103","https://openalex.org/W2123144012","https://openalex.org/W2126453598","https://openalex.org/W2611225687","https://openalex.org/W2733044547","https://openalex.org/W4244109911"],"related_works":["https://openalex.org/W2899155876","https://openalex.org/W4312686479","https://openalex.org/W2751474","https://openalex.org/W3212363454","https://openalex.org/W2265559340","https://openalex.org/W4205845590","https://openalex.org/W2504368592","https://openalex.org/W2075589668","https://openalex.org/W3165016276","https://openalex.org/W2016308011"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,29,41,54,88,93,106],"trade-off":[4],"between":[5,79,128],"security":[6,30,70,80,129],"and":[7,32,65,81,113,130],"usability":[8,82],"in":[9,57,83,116],"recognition-based":[10],"graphical":[11,63,84,119],"authentication":[12,85,120],"mechanisms.":[13],"Through":[14],"a":[15,21,35,76],"user":[16,121],"study":[17,107],"(N=103)":[18],"based":[19],"on":[20,68,87],"real":[22],"usage":[23],"scenario,":[24],"it":[25,52],"draws":[26],"insights":[27],"about":[28],"strength":[31],"memorability":[33],"of":[34,43,90,105],"chosen":[36],"password":[37],"with":[38],"respect":[39],"to":[40,46,98],"amount":[42],"images":[44],"presented":[45,97],"users":[47,99],"during":[48],"sign-up.":[49],"In":[50],"particular,":[51],"reveals":[53],"users'":[55],"predisposition":[56],"following":[58],"predictable":[59],"patterns":[60],"when":[61,100],"selecting":[62],"passwords,":[64],"its":[66],"effect":[67],"practical":[69],"strength.":[71],"It":[72],"also":[73],"demonstrates":[74],"that":[75],"\"sweet-spot\"":[77],"exists":[78],"approaches":[86],"basis":[89],"adjusting":[91],"accordingly":[92],"image":[94],"grid":[95],"size":[96],"creating":[101],"passwords.":[102],"The":[103],"results":[104],"can":[108],"be":[109],"leveraged":[110],"by":[111],"researchers":[112],"practitioners":[114],"engaged":[115],"designing":[117],"intelligent":[118],"interfaces":[122],"for":[123],"striking":[124],"an":[125],"appropriate":[126],"balance":[127],"usability.":[131]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
