Top Banner
1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart Schechter Robert W. Reeder Symposium on Usable Privacy and Security (SOUPS), 2009 Presented by: Payas Gupta
39

1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Dec 15, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

1 + 1 = YouMeasuring the comprehensibility of metaphors

for configuring backup authentication

Stuart Schechter Robert W. ReederSymposium on Usable Privacy and Security (SOUPS),

2009

Presented by:Payas Gupta

Page 2: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Why backup authentication?

• No good backup authentication system till date

• Commonly used– Email based authentication (Gmail)– Personal authentication questions

(Hotmail)

Page 3: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Email based authentication

• Popular but of limited use

Page 4: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Why good backup authentication?

• Cases like - Republican vice president candidate Sarah Palin’s Yahoo! account

• 20% of users forget their answers within six months

• 17% of answers guessed by acquaintances

• 13% of answers were easily cracked by 5 most popular responses

Page 5: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

One-size-fits-all

• One-size-fits-all approach will never work

• Some have little to protect• Some have critical information

• More tasks and if she fails then?• Less tasks and if attackers gets access

then?

Page 6: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Exam Metaphor

Page 7: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Evidence Scale Metaphor

Page 8: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Screenshots presented

• Windows Live ID – password reset

• SplendMail– Short exam P5 form– Short exam P10 form– Long exam– Evidence scale form

Page 9: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Windows Live ID password reset

Page 10: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Short exam P5 form

Page 11: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Short exam P10 form

Page 12: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Long exam form

Page 13: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Evidence scale form

Page 14: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Questions accompanying screenshots

• One-or-both questions for both the Live ID and P5 form.– To change her password, will [Windows

Live|SplendMail] require Jane to establish her identity using both the e-mail address and the question, or is one of the two enough?

• Answer options – one, probably one, not sure, probably both, both

Page 15: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

–Will Jane be able to change her password after performing all of the following actions (and only those actions) to prove her identity to [Windows Live|SplendMail]?

• Answer options - yes, probably, not sure, probably not, and no.

Page 16: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Mechanism comprehension

• Answer options - definitely A, probably A, not sure, probably B, and definitely B.

Page 17: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Zero-centered five point scale

• Integers from -2 to 2 scale• For example, if the correct answer to a

question was yes, a participant would receive – 2 points yes– 1 for probably yes– 0 for not sure– -1 for probably not– -2 for no.

Page 18: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Participant Demographics

• Total 18– Age between 30 and 48– 7 female 11 male– 12 have Live Id accounts

Page 19: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Hypothesis 1

• When presented short exam P5, which describes how each authentication mechanism will be used, Live ID users are better able to comprehend the use of these mechanisms than when presented with Live ID's password-reset settings form.

Page 20: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Hypothesis 2

• Live ID users comprehend the evidentiary requirements of authentication in the short exam form as well as they do for Live ID's current password reset settings form.

Page 21: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

2b

Page 22: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

2c

Page 23: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

2d

Page 24: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Hypothesis 3

• Comprehension of the exam metaphor decreases as more authentication mechanisms are configured.

Page 25: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Hypothesis 4

• The evidence scale form, which does not require mental math, is more comprehensible than the exam form, which does.

Page 26: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Hypothesis 5

• Users prefer the exam form to the evidence scale form, or vice versa.

Page 27: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.
Page 28: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Result: Hypothesis 1

• When presented short exam P5, which describes how each authentication mechanism will be used, Live ID users are better able to comprehend the use of these mechanisms than when presented with Live ID's password-reset settings form.Not Significant

Page 29: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Result: Hypothesis 2

• Live ID users comprehend the evidentiary requirements of authentication in the short exam form as well as they do for Live ID's current password reset settings form.

Strongly significant

Page 30: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Somewhat Significant

Page 31: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

• The difference in the mean scores for the hardest questions about the exam and the mean scores and the three simple questions about the Live ID screenshot is statistically significant -- in favour of the exam.

Page 32: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Result: Hypothesis 3

• Comprehension of the exam metaphor decreases as more authentication mechanisms are configured.

Page 33: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Result: Hypothesis 3

• 18 participants– only 5 of 54 total responses on the longer

exam were imperfect (either incorrect or not provided with full confidence).

• Not only was there no evidence of a decrease in comprehension, but the learning effect might well have increased comprehension.

Not Significant

Page 34: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Result: Hypothesis 4

• The evidence scale form, which does not require mental math, is more comprehensible than the exam form, which does.

Reject This: Exam form more

comprehensible

Page 35: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Result: Hypothesis 5

• Users prefer the exam form to the evidence scale form, or vice versa.– Exam was better

Page 36: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Limitation/Future Work

• How points would be assigned to authentication tasks in the exam metaphor?

• The effect of user demographics?

Page 37: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Conclusion

• Looked into--If users cannot understand whether one or both of two tasks is required to authenticate, how could they be expected to understand which of 5 tasks would be sufficient

• User authentication is, after all, a complex process.

• 15 of our 18 participants answered all eight questions about the exam metaphor perfectly.

Page 38: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.

Conclusion cont…

• Only one of the 18 participants missed more than one question.

Page 39: 1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart SchechterRobert W. Reeder Symposium on Usable Privacy.