TY - GEN
T1 - "My name is my password:" Understanding children's authentication practices
AU - Ratakonda, Dhanush Kumar
AU - French, Tyler
AU - Fails, Jerry Alan
N1 - Publisher Copyright:
© 2019 Association for Computing Machinery.
PY - 2019/6/12
Y1 - 2019/6/12
N2 - Children continue to use technology at an increasing rate more and more of which require authentication via usernames and passwords.We seek to understand how children ages 5-11 years old create and use their credentials. We investigate children's username and password understanding and practices from the perspective of both children and adults within the context of three security categories: credential composition (e.g. length of password), performance (e.g. time to enter), and credential mechanisms (e.g; a pattern or characters). We conducted a semi-structured interview with 22 children and an online survey with 33 adult participants (parents and teachers) to determine their practices and involvement in facilitating authentication for their children. Our study illustrates how children have a limited understanding of authentication, and that there are differences between children's and adult's understanding of good authentication and security practices, and what they actually do.
AB - Children continue to use technology at an increasing rate more and more of which require authentication via usernames and passwords.We seek to understand how children ages 5-11 years old create and use their credentials. We investigate children's username and password understanding and practices from the perspective of both children and adults within the context of three security categories: credential composition (e.g. length of password), performance (e.g. time to enter), and credential mechanisms (e.g; a pattern or characters). We conducted a semi-structured interview with 22 children and an online survey with 33 adult participants (parents and teachers) to determine their practices and involvement in facilitating authentication for their children. Our study illustrates how children have a limited understanding of authentication, and that there are differences between children's and adult's understanding of good authentication and security practices, and what they actually do.
KW - Authentication for children
KW - Memorability
KW - Security strength
UR - http://www.scopus.com/inward/record.url?scp=85068795435&partnerID=8YFLogxK
U2 - 10.1145/3311927.3325327
DO - 10.1145/3311927.3325327
M3 - Conference contribution
AN - SCOPUS:85068795435
T3 - Proceedings of the 18th ACM International Conference on Interaction Design and Children, IDC 2019
SP - 501
EP - 507
BT - Proceedings of the 18th ACM International Conference on Interaction Design and Children, IDC 2019
T2 - 18th ACM International Conference on Interaction Design and Children, IDC 2019
Y2 - 12 June 2019 through 15 June 2019
ER -