Abstract
Participants were trained on how to use a mnemonic strategy for memorizing assigned passwords or for generating new passwords. Memory for these passwords was examined at short and long recall delays. There was a significant interaction between type of password and recall delay for both the amount of time and number of attempts needed for participants to accurately recall their passwords. Participants trained in how to use the mnemonic technique to generate their own passwords were able to recall them more quickly and accurately than participants who were trained in how to use the mnemonic technique to memorize their assigned passwords. The impact of self-generated passwords on memory was discussed as well as the relative value of the mnemonic training strategy. Areas of future research were identified that may lead to the development of mnemonic training strategies to better enable users to recall their passwords.
Chapter PDF
Similar content being viewed by others
References
Florêncio, D., Herley, C.: A Large Scale Study of Web Password Habits. In: Proceedings of the Sixteenth International World Wide Web Conference, WWW 2007, Banff, BC, pp. 657–666 (2007)
Adams, A., Sasse, M.A.: Users Are Not the Enemy. Communications of the ACM 42, 40–46 (1999)
DeAngeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems. Intl. J. of Human-Computer Studies 63, 128–152 (2005)
Ives, B., Walsh, K.R., Schneider, H.: The Domino Effect of Password Reuse. Communications of the ACM 47, 75–78 (2004)
Stubblefield, A., Simon, D.R.: Inkblot Authentication. Technical Report: Microsoft Corporation (2007)
Tullis, T.S., Tedesco, D.P.: Using Personal Photos as Pictorial Passwords. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems, pp. 1841–1844. ACM Press, New York (2005)
Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: PassPoints: Design & Longitudinal Evaluation of a Graphical Password System. Intl. J. of Human-Computer Studies 63, 102–127 (2005)
Morris, R., Thompson, K.: Password Security: A Case History. Communications of the ACM 22, 594–597 (1979)
Vu, K.-P.L., Bhargav, A., Proctor, R.W.: Imposing Password Restrictions for Multiple Accounts: Impact on Generation and Recall of Passwords. In: Proceedings of the 47th annual meeting of the Human Factors and Ergonomics Society, HFES, California, pp. 1331–1335 (2003)
Vu, K.-P.L., Proctor, R.W., Bhargav-Spantzel, A., Tai, B.-L., Cook, J., Schultz, E.E.: Improving Password Security and Memorability to Protect Personal and Organizational Information. Intl. J. of Human-Computer Studies 65, 744–757 (2007)
Proctor, R.W., Lien, M.-C., Vu, K.-P.L., Schultz, E.E., Salvendy, G.: Improving Computer Security for Authentication of Users: Influence of Proactive Password Restrictions. J. of Behavior Research Methods, Instruments, & Computers 34, 163–169 (2002)
Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password Memorability and Security: Empirical Results. IEEE Security & Privacy 2, 25–31 (2004)
Bellezza, F.S.: Mnemonic Devices: Classification, Characteristics, and Criteria. Review of Educational Research 51, 247–275 (1981)
Slamecka, N.J., Graf, P.: The Generation Effect: Delineation of a Phenomenon. J. of Experimental Psychology: Human Learning & Memory 4, 592–604 (1978)
Rogers, T.B., Kuiper, N.A., Kirker, W.S.: Self-reference and the Encoding of Personal Information. J. of Personality and Social Psychology 35, 677–688 (1977)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nelson, D.L., Vu, KP.L. (2009). Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords. In: Smith, M.J., Salvendy, G. (eds) Human Interface and the Management of Information. Designing Information Environments. Human Interface 2009. Lecture Notes in Computer Science, vol 5617. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02556-3_78
Download citation
DOI: https://doi.org/10.1007/978-3-642-02556-3_78
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02555-6
Online ISBN: 978-3-642-02556-3
eBook Packages: Computer ScienceComputer Science (R0)