552
Views
36
CrossRef citations to date
0
Altmetric
Original Articles

Now what was that password again? A more flexible way of identifying and authenticating our seniors

&
Pages 309-322 | Published online: 12 Jul 2007

References

  • Akatsu , H. and Miki , H. 2004 . Usability Research for the elderly people . Oki Technical Review , 71 ( 3 ) : 54 – 57 .
  • Becker , S. A. 2004 . A study of web usability for older adults seeking online health resources . ACM Transactions on Computer – Human Interaction , 11 ( 4 ) : 387 – 406 .
  • Botwinick , J. 1967 . Cognitive Processes in Maturity and Old Age , New York : Springer .
  • Brennan , Z. 1997 . Oldmobiles roll up for grey drivers . The Sunday Times , 28 December : 13
  • Brostoff , S. and Sasse , A. 2000 . “ Are passfaces more usable than passwords? A field trial investigation ” . In People and Computers XIV – Usability or Else! , Edited by: McDonald , S. 405 – 424 . Berlin : Springer . Proceedings of HCI 2000
  • Cattan , M. , White , M. , Bond , J. and Learmouth , A. 2005 . Preventing social isolation and loneliness among older people: A systematic review of health promotion interventions . Ageing and Society , 25 ( 3 ) : 357 – 376 .
  • Chadwick-Dias , A. , McNulty , M. and Tullis , T. . Web usability and age: How design changes can improve performance . Proceedings of the 2003 conference on Universal Usability . November 10 – 11 , Vancouver, British Columbia, Canada. pp. 30 – 37 . ACM Press .
  • Chen , H. L. 1994 . Hearing in the elderly. Relation of hearing loss, loneliness, and self-esteem . Gerontological Nursing , 20 ( 6 ) : 22 – 28 .
  • Chisnell , D. , Lee , A. and Redish , J. 2004 . Design Web Sites for Older Users: Comparing AARP's Studies to Earlier Findings . http://www.aarp.org/olderwiserwired/oww-features/Articles/a2004-03-03-comparison-studies.html. Retrieved 13 April 2005
  • Chisnell , D. and Redish , J. 2005 . Who is the Older Adult in your Audience? . Intercom , http://www.stc.org/intercom/PDFs/2005/200501_10.pdf. Retrieved 13 April 2005
  • Clark , D. J. 2002 . Older adults living through and with their computers . CIN: Computers, Informatics and Nursing , 20 ( 3 ) : 117 – 124 .
  • Cohen , G. and Burke , D. M. 1993 . Memory for proper names: A review . Memory , 1 : 249 – 263 .
  • Cox , B. 2002 . Hijacking and fraud plague ebay users. ECommerce . http://www.internetnews.com/ec-news/article.php/1480591. Accessed 21 Nov 2005
  • Craik , F. and Bialystok , E. 2006 . Cognition through the lifespan: Mechanisms of change . TRENDS in Cognitive Sciences , 10 ( 3 ) : 131 – 138 .
  • Czaja , S. J. 1996 . “ Aging and acquisition of computer skills ” . In Aging and Skilled Performance: Advances in Theory and Applications , Edited by: Rogers , W. A. , Fisk , A. D. and Walker , N. 201 – 221 . Mahwah, New Jersey : Lawrence Erlbaum Associates .
  • De Angeli , A. , Coutts , M. , Coventry , L. and Johnson , G. I. . VIP: A visual approach to user authentication . Proceedings of the Working Conference on Advanced Visual Interfaces AVI, 2002 . pp. 316 – 323 . Trento, , Italy : ACM Press .
  • De Angeli , A. , Coventry , L. , Johnson , G. and Renaud , K. 2005 . Is a picture really worth a thousand words? Reflecting on the usability of graphical authentication systems . International Journal of Human – Computer Studies: Special Issue on HCI research on Privacy and Security , 63 ( 1 – 2 ) : 128 – 152 .
  • Deloitte . 2005 . Global security survey . http://www.deloitte.com/dtt/cda/doc/content/us_fsi_150606globalsecuritysurvey(1).pdf#search=%22global%20security%20survey%20deloitte%22. Accessed: September 2006
  • Dening , T. and Barapatre , C. 2004 . Mental health and the ageing population . The Journal of the British Menopause Society , 10 ( 2 ) : 49 – 53 .
  • Dhamija , R. and Perrig , A. . Déjà vu: A user study using images for authentication . Proceedings of USENIX Security Symposium . Denver, Colorado. pp. 45 – 58 .
  • Doran , G. D. 1999 . Touchy subject-biometric technology: Is it time for your computer to get to know you? . http://www.findarticles.com/p/articles/mi_m0DTI/is_4_27/ai_60036365. Accessed: September 2006. Entrepreneur Magazine
  • DTI . 2005 . Information security factsheet. Department of Trade and Industry . http://www.dti.gov.uk/files/file9937.pdf?pubpdfdload=05%2F612. Accessed: September 2006
  • Engardio , P. and Matlack , C. 2005 . Global aging . Business Week , JANUARY 31, http://www.businessweek.com/magazine/content/05_05/b3918011.htm. Accessed: September 2006
  • Fox , S. 2001 . Wired seniors . A fervent few, inspired by family ties. Technical report, Pew Internet and American Life Project. http://www.pewinternet.org/pdfs/PIP_Wired_Seniors_Report.pdf. Accessed May 2006
  • Gill , J. 2004 . Design of smart card systems to meet the needs of disabled and elderly persons . Tiresias.org Scientific and Technological Reports. http://www.tiresias.org/reports/ecart.htm. Accessed: September 2006
  • Goldberg , E. 2005 . The Wisdom Paradox , New York : Gotham Books .
  • Goodman , J. , Brewster , S. and Gray , P. . Connecting elders by facilitating mobility . Position paper at workshop on Home Technologies to Keep Elders Connected at CHI 2004 . Vienna, Austria. Edited by: Lundell , J. , Morris , M. and Intille , S.
  • Hawthorn , D. 2000 . Possible implications of aging for interface designers . Interacting with Computers , 12 : 507 – 528 .
  • Hawthorn , D. . How universal is good design for older users? . CUU '03: Proceedings of the 2003 Conference on Universal usability . November 10 – 11 , Vancouver, British Columbia, Canada. pp. 38 – 45 . ACM Press .
  • Heckman , J. G. , Lang , C. J. and Neundorfer , B. 2001 . Recognition of familiar handwriting in stroke and dementia . Neurology , 57 ( 11 ) : 2128 – 2131 .
  • Jackson , G. R. and Owsley , C. 2003 . Visual dysfunction, neurodegenerative diseases and aging . Neurology and Clinical Neurophysiology , 21 ( 3 ) : 709 – 728 .
  • Kelley , C. L. and Charness , N. 1995 . Issues in training older adults to use computers . Behaviour and Information Technology , 14 : 107 – 120 .
  • Kiel , J. M. 2005 . The digital divide: Internet and e-mail use by the elderly . Medical Informatics and the Internet in Medicine , 30 ( 1 ) : 19 – 23 .
  • Knoblich , G. and Prinz , W. 2001 . Recognition of self-generated actions from kinematic displays of drawing . Journal of Experimental Psychology: Human Perception and Performance , 27 : 456 – 465 .
  • Laguna , K. and Babcock , R. 1997 . Computer anxiety in young and older adults: Implications for human computer interactions in older populations . Computers in Human Behavior , 13 ( 3 ) : 317 – 326 .
  • Levenshtein , V. I. 1965 . Binary codes capable of correcting deletions, insertions and reversals . Doklady Akademii Nauk SSSR , 163 ( 4 ) : 845 – 848 . also Soviet Physics Doklady, 10(8) pp. 707 – 710, Februray 1966
  • Lindeman , E. 1947 . “ Methods of democratic adult education ” . In Learning Democracy: Eduard Lindeman on Adult Education and Social Change , Edited by: Brookfield , S. 53 – 59 . London : Croom Helm .
  • Logan , J. M. , Sanders , A. L. , Snyder , A. Z. , Morris , J. C. and Buckner , R. L. 2005 . Under-recruitment and nonselective recruitment: dissociable neural mechanisms associated with aging . Neuron , 33 ( 5 ) : 827 – 840 .
  • Longcamp , M. , Anton , J. L. , Roth , M. and Velay , J. L. 2003 . Visual presentation of single letters activates a premotor area involved in writing . Neuroimage , 19 ( 4 ) : 1492 – 1500 .
  • Maddox , G. and Douglas , E. 1974 . Aging and individual differences . Journal of Gerontology , 29 : 555 – 563 .
  • Mather , M. and Carstensen , L. 2005 . Aging and motivated cognition: The positivity effect in attention and memory . TRENDS in Cognitive Sciences , 9 ( 10 ) : 496 – 502 .
  • Mazaux , J. M. , Dartigues , J. F. , Letenneur , L. , Darriet , D. , Wiart , L. , Gagnon , M. , Commenges , D. and Boller , F. 1995 . Visuo-spatial attention and psychomotor performance in elderly community residents: Effects of age, gender, and education . Journal Clinical and Experimental Psychology , 17 ( 1 ) : 71 – 81 .
  • McAvoy , L. 1979 . The leisure preferences, problems, and needs of the elderly . Journal of Leisure Research , 11 ( 1 ) : 40 – 47 .
  • McCrae , N. , Murray , J. , Banerjee , S. , Huxley , P. , Bhugra , D. , Tylee , A. and Macdonald , A. 2005 . They're all depressed, aren't they? A qualitative study of social care workers and depression in older adults . Aging Mental Health , 9 ( 6 ) : 508 – 516 .
  • McMellon , C. A. and Schiffman , L. G. 2002 . Cybersenior empowerment: How some older individuals are taking control of their lives . Journal of Applied Gerontology , 21 ( 2 ) : 157 – 175 .
  • Merriam , S. B. and Cunningham , P. M. , eds. 1990 . Handbook of Adult and Continuing Education , San Fransisco : Jossey, Bass .
  • Morris , J. M. 1994 . Computer training needs of older adults . Educational Gerontology , 20 : 541 – 555 .
  • NIA and NLM . 2002 . Making your web site senior friendly . Technical report, National Institute on Aging and National Library of Medicine. http://www.nlm.nih.gov/pubs/checklist.pdf. Accessed May 2006
  • O'Neill , L. The implications of an aging population on interface design , Department of Informatics, Sussex University 2000, Master's thesis
  • Pennebaker , K. and Stone , L. 2003 . Words of wisdom: Language use over the life span . Journal of Personality and Social Psychology , 85 ( 2 ) : 291 – 301 .
  • Pfleeger , C. P. and Pfleeger , S. L. 2003 . Security in Computing , 3rd edn , Upple Saddle River, NJ : Prentice Hall .
  • Pokomy , J. , Smith , V. C. and Lutze , M. 1987 . Aging of the human lens . Applied Optics , 26 : 1437 – 1440 .
  • Ranzijn , R. , Keeves , J. , Luszcz , M. and Feather , N. T. 1998 . The role of self-perceived usefulness and competence in the self-esteem of elderly adults: Confirmatory factor analyses of the Bachman revision of Rosenberg's self-esteem scale . Psychological Sciences and Social Sciences , 53 ( 2 ) : 96 – 104 .
  • Rash , W. 2002 . Password chaos threatens e-commerce . ZDNet , http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2847895,00.html. Accessed: September 2006
  • Renaud , K. . A visuo-biometric authenticaton mechanism for older users . Proceedings of British HCI . Sept 5 – 9 2005 . pp. 167 – 182 . Edinburgh : Napier University .
  • Rensink , R. A. 2002 . Change detection . Annual Review of Psychology , 53 : 245 – 277 .
  • Roberts , P. 2001 . Electronic media and the ties that bind . Generations , 25 ( 2 ) : 96 – 98 .
  • Salthouse , T. A. 1985 . “ Speed of behavior and its implications for cognition ” . In Handbook of the Psychology of Aging , 2nd edn. , Edited by: Birren , J. E. and Schaie , K. W. 400 – 426 . New York : Van Nostrand Reinhold .
  • Seki , K. , Yajima , M. and Sugishita , M. 1995 . The efficacy of kinesthetic reading treatment for pure alexia . Neuropsychologica , 33 ( 5 ) : 595 – 609 .
  • Shapiro , P. 1995 . Computers use and the elderly . Web Document. Written for the Washington Apple Pi Journal. http://www.his.com/pshapiro/computers.and.elderly.html. Accessed: September 2006
  • Srihari , S. N. , Cha , S. -H. , Arora , H. and Lee , S. . Individuality of handwriting . Proceedings of the Sixth International Conference on Document Analysis and Recognition (ICDAR 01) . pp. 106 – 109 . Seattle, WA : IEEE Computer Society .
  • Stankov , L. 1988 . Aging, attention and intelligence . Psychology and Aging , 3 ( 1 ) : 59 – 74 .
  • Stewart , T. 1997 . Why do older workers have problems with technology? . Journal Human Ergology , 26 ( 2 ) : 185 – 192 .
  • Timmerman , S. 1998 . The role of information technology in older adult learning . New Directions for Adult and Continuing Education , 77 : 61 – 71 .
  • Treisman , A. and Davies , A. 1976 . “ Dividing attention to ear and eye ” . In Attention and Performance , Edited by: Kornblulm , S. 101 – 117 . New York : Academic Press .
  • Trostel , P. A. and Taylor , G. A. 2001 . Theory of time preference . Economic Inquiry , 39 ( 3 ) : 379 – 395 .
  • van Iwaarden , J. and van der Wiele , T. 2003 . Applying SERVQUAL to web sites: An exploratory study . International Journal of Quality and Reliability Management , 20 ( 8 ) : 919 – 935 .
  • W3 . 1999 . Web content accessibility guidelines . World Wide Web Consortium. http://www.w3.org/TR/WAI-WEBCONTENT/. Accessed: September 2006
  • Walker , T. 2001 . Fighting security breaches and cyberattacks with two-factor authentication technology . Information Systems Control Journal , 2 http://www.isaca.org/Template.cfm?Section=Home&CONTENTID=17187&TEMPLATE=/ContentManagement/ContentDisplay.cfm
  • Weinshall , D. 2004 . “ Secure authentication schemes suitable for an associative memory ” . Hebrew University, Leibniz Center for Research in Computer Science . Technical Report TR 2004-30
  • Witty , R. J. and Brittain , K. 2004 . “ Automated password reset can cut it service desk costs ” . Gartner Report
  • Zimmer , A. 1982 . Do we see what makes our script characteristic – or do we only feel it? Modes of sensory control in handwriting . Psychological Research , 44 ( 2 )

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.