Perbedaan Beban Kognitif pada Penggunaan Kata Sandi Berbasis Pola Garis dan Angka
Abstract
Most applications require users to enter a password in order to use those applications. One type of the passwords used on smartphones is based on certain line pattern. The pattern of lines that make up the password is essentially an image similar to a sequence of numbers arranged in a particular order. Just when users need to memorize a series of numbers, "memorizing" the line pattern also gives cognitive load to certain level. This study observed the cognitive load experienced by users when they were using line pattern-based password as compared to numeric-based password. The research method employed in this study was a scenario-based experiment followed by a survey to self-report the cognitive load experienced by the user after they run the scenario. Cognitive load experienced by users were reported by users themselves. The subjects of the study were 67 undergraduate and master students. They were voluntarily participated in this research. The result obtained from this study indicated that the cognitive load experienced by users when they used the pattern of the line based password was smaller than the number-based password.
References
H. Gao and X. Liu, ―A new graphical password scheme against spyware by using CAPTCHA,‖ Proc. 5th Symp. Usable Priv. Secur. - SOUPS ’09, p. 1, 2009.
L. Wang, X. Chang, Z. Ren, H. Gao, X. Liu, and U. Aickelin, ―Against spyware using CAPTCHA in graphical password scheme,‖ Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, pp. 760–767, 2010,
A. E. Dirik, N. Memon, and J.-C. Birget, ―Modeling user choice in the PassPoints graphical password scheme,‖ SOUPS ’07 Proc. 3rd Symp. Usable Priv. Secur., pp. 20–28, 2007.
H. Gao, Z. Ren, X. Chang, X. Liu, and U. Aickelin, ―A new graphical password scheme resistant to shoulder-surfing,‖ Proc. - 2010 Int. Conf. Cyberworlds, CW 2010, pp. 194–199, 2010.
J. Thorpe, B. MacRae, and A. Salehi-Abari, ―Usability and security evaluation of GeoPass: a geographic location-password scheme,‖ Proc. Ninth Symp. Usable Priv. Secur. - SOUPS ’13, vol. 2, p. 1, 2013.
T. Kwon and S. Na, ―TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems,‖ Comput. Secur., vol. 42, pp. 137–150, 2014.
S. Uellenbeck, M. Dürmuth, C. Wolf, and T. Holz, ―Quantifying the security of graphical passwords: the case of android unlock patterns,‖ Proc. 2013 ACM SIGSAC Conf. Comput. Commun. Secur. - CCS ’13, vol. 44, no. 4, pp. 161–172, 2013.
E. von Zezschwitz, A. De Luca, P. Janssen, and H. Hussmann, ―Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns,‖ Proc. ACM CHI’15 Conf. Hum. Factors Comput. Syst., vol. 1, pp. 2339–2342, 2015.
Q. Yan, J. Han, Y. Li, and R. H. Deng, ―On Limitations of Designing Leakage-Resilient Password Systems : Attacks, Principles and Usability,‖ 19th Netw. Distrib. Syst. Secur. Symp., 2012.
P. Andriotis, T. Tryfonas, and G. Oikonomou, ―Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method,‖ Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8533 LNCS, pp. 115–126, 2014.
A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann, ―Touch me once and I know it’s you! Implicit authentication based on touch screen patterns,‖ Chi 2012, pp. 987–996, 2012.
P. Andriotis, T. Tryfonas, G. Oikonomou, and C. Yildiz, ―A pilot study on the security of pattern screen-lock methods and soft side channel attacks,‖ ACM WiSec, p. 1, 2013.
A. Ottensooser, A. Fekete, H. A. Reijers, J. Mendling, and C. Menictas, ―Making Sense of Business Process Descriptions : An Experimental Comparison of Graphical and Textual Notations,‖ J. Syst. Softw., vol. 85, no. 3, pp. 596–606, 2012.
J. C. M. Van Weert, G. van Noort, N. Bol, L. van Dijk, K. Tates, and J. Jansen, ―Tailored information for cancer patients on the Internet: Effects of visual cues and language complexity on information recall and satisfaction,‖ Patient Educ. Couns., vol. 84, no. 3, pp. 368–378, 2011.
C. Malamed, ―What is cognitive load ? Interactions Between WM and LTM.‖ [Online], http://theelearningcoach.com/learning/what-iscognitive-load/, tanggal akses 4 Mei 2017.
J. Swezller, ―Cognitive Load Theory, Learning Difficulty, and Instructional Design,‖ Learning and Inst., vol. 4, pp. 295–312, 1994.
J. J. G. van Merrienboer and P. Ayres, ―Research on Cognitive Load Theory and Its Design Implications for E-Learning,‖ Educ. Technol. Res. Dev., vol. 53, no. 3, pp. 5–13, 2005.
F. Biocca, F. Biocca, C. Owen, and A. Tang, ―Attention Issues in Spatial Information Systems : Directing Mobile Users ’Visual Attention Using Augmented Reality Attention Issues in Spatial Information Systems : Directing Mobile Users ’ Visual Attention Using Augmented Reality,‖ J. Manag. Inf. Syst., vol. 23, no. 4, pp. 163–184, 2007.
F. D. Davis, ―Perceived Usefulness , Perceived Ease Of Use , And User Accep,‖ MIS Q., vol. 13, no. 3, pp. 319–339, 1989.
F. D. Davis, R. P. Bagozzi, and P. R. Warshaw, ―User Acceptance Of Computer Technology : A Comparison Of Two,‖ Manage. Sci., vol. 35, no. 8, pp. 982–1003, 1989.
I. Ajzen, ―The Theory of Planned Behavior,‖ Organ. Behav. Hum. Decis. Process., vol. 50, pp. 179–211, 1991.
C. Fornell, G. J. Tellis, and G. M. Zinkhan, ―Validity Assessment: A Structural Equations Approach Using Partial Least Squares. An assessment of Marketing Thought and Practice,‖ Proc. American Marketing Association Educator’s Conf., vol. 48, pp. 405-409, 1982.
D. George and P. Mallery, SPSS for Windows step by step: A simple guide dan reference. 11.0 update (4th ed.). Boston: Allyn & Bacon, 2003.
© Jurnal Nasional Teknik Elektro dan Teknologi Informasi, under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License.