{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:38Z","timestamp":1774946558462,"version":"3.50.1"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T00:00:00Z","timestamp":1372636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0949963"],"award-info":[{"award-number":["IIS-0949963"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Access. Comput."],"published-print":{"date-parts":[[2013,7]]},"abstract":"<jats:p>A wide variety of authentication mechanisms have been designed to ensure information security. Individuals with cognitive disabilities depend on computers and the Internet for a variety of tasks and, therefore, use authentication applications on an everyday basis. However, although there have been numerous studies investigating password usage by neurotypical users, there have been no research studies conducted to examine the use of authentication methods by individuals with cognitive disabilities. In this article, we systematically investigate how individuals with cognitive disabilities, specifically Down syndrome (DS), interact with various user authentication mechanisms. This research provides the first benchmark data on the performance of individuals with DS when using multiple authentication methods. It confirms that individuals with DS are capable of using the traditional alphanumeric passwords with reasonable efficiency. The passwords created by individuals with DS are of similar strength to those created by neurotypical people. Graphic passwords are not as effective as traditional alphanumeric and mnemonic passwords regarding efficiency, and are less preferred by the participants. Based on the findings of the study, we propose design guidelines that aim to assist both practitioners and researchers in designing and developing effective authentication applications that fit the specific needs of individuals with DS.<\/jats:p>","DOI":"10.1145\/2493171.2493173","type":"journal-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T19:12:41Z","timestamp":1374779561000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Investigating User Behavior for Authentication Methods"],"prefix":"10.1145","volume":"4","author":[{"given":"Yao","family":"Ma","sequence":"first","affiliation":[{"name":"Taiyuan University of Technology"}]},{"given":"Jinjuan","family":"Feng","sequence":"additional","affiliation":[{"name":"Towson University and UMBC"}]},{"given":"Libby","family":"Kumin","sequence":"additional","affiliation":[{"name":"Loyola University Maryland"}]},{"given":"Jonathan","family":"Lazar","sequence":"additional","affiliation":[{"name":"Harvard University and Towson University"}]}],"member":"320","published-online":{"date-parts":[[2013,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384945"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1044\/jshr.3706.1369"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of Human Computer Interaction, 405--424","author":"Brostoff Sacha","unstructured":"Sacha Brostoff and M. Angela Sasse . 2000. Are passfaces more usable than passwords? A field trial investigation . In Proceedings of Human Computer Interaction, 405--424 . Sacha Brostoff and M. Angela Sasse. 2000. Are passfaces more usable than passwords? A field trial investigation. In Proceedings of Human Computer Interaction, 405--424."},{"key":"e_1_2_1_5_1","volume-title":"Human Cognitive Abilities: A Survey of Factor-Analytic Studies","author":"Carroll John B.","unstructured":"John B. Carroll . 1993. Human Cognitive Abilities: A Survey of Factor-Analytic Studies . Cambridge University Press . John B. Carroll. 1993. Human Cognitive Abilities: A Survey of Factor-Analytic Studies. Cambridge University Press."},{"key":"e_1_2_1_6_1","first-page":"1301","article-title":"Improved national prevalence estimates for 18 selected major birth defects-United States, 1999--2001","volume":"54","author":"Centers for Disease Control and Prevention.","year":"2006","unstructured":"Centers for Disease Control and Prevention. 2006 . Improved national prevalence estimates for 18 selected major birth defects-United States, 1999--2001 . Morbid. Mortal. Weekly Rep. 54 , 1301 -- 1305 . Centers for Disease Control and Prevention. 2006. Improved national prevalence estimates for 18 selected major birth defects-United States, 1999--2001. Morbid. Mortal. Weekly Rep. 54, 1301--1305.","journal-title":"Morbid. Mortal. Weekly Rep."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653722"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/962755.963150"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 13th USENIX Security Symposium. 151--164","author":"Davis Darren","unstructured":"Darren Davis , Fabian Monrose , and Michael K. Reiter . 2004. On user choice in graphical password schemes . In Proceedings of the 13th USENIX Security Symposium. 151--164 . Darren Davis, Fabian Monrose, and Michael K. Reiter. 2004. On user choice in graphical password schemes. In Proceedings of the 13th USENIX Security Symposium. 151--164."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556262.1556312"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_2_1_13_1","first-page":"24","article-title":"Accessible authentication via tactile PIN entry","volume":"2","author":"Deyle Travis","year":"2006","unstructured":"Travis Deyle and Volker Roth . 2006 . Accessible authentication via tactile PIN entry . Comput. Graphics Topics 2 , 24 -- 26 . Travis Deyle and Volker Roth. 2006. Accessible authentication via tactile PIN entry. Comput. Graphics Topics 2, 24--26.","journal-title":"Comput. Graphics Topics"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 9th USENIX Security Symposium.","author":"Dhamija Rachna","year":"2000","unstructured":"Rachna Dhamija and Adrian Perrig . 2000 . D\u00e9j\u00e0 Vu: A user study using images for authentication . In Proceedings of the 9th USENIX Security Symposium. Rachna Dhamija and Adrian Perrig. 2000. D\u00e9j\u00e0 Vu: A user study using images for authentication. In Proceedings of the 9th USENIX Security Symposium."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518837"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414471.1414480"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1714458.1714460"},{"key":"e_1_2_1_18_1","volume-title":"Children with Down Syndrome: A Developmental Perspective","author":"Fowler Anne E.","unstructured":"Anne E. Fowler . 1990. Language abilities in children with Down syndrome: Evidence for a specific syntactic delay . In Children with Down Syndrome: A Developmental Perspective , Dante Cicchetti and Marjorie Beeghly Eds., Cambridge University Press , Cambridge, UK , 302--328. Anne E. Fowler. 1990. Language abilities in children with Down syndrome: Evidence for a specific syntactic delay. In Children with Down Syndrome: A Developmental Perspective, Dante Cicchetti and Marjorie Beeghly Eds., Cambridge University Press, Cambridge, UK, 302--328."},{"key":"e_1_2_1_19_1","volume-title":"Down Syndrome: Living and Learning in the Community","author":"Fowler Anne E.","unstructured":"Anne E. Fowler . 1995. Linguistic variability in persons with Down syndrome . In Down Syndrome: Living and Learning in the Community , Lynn Nadel and Donna Rosenthal Eds., Wiley-Liss Press , New York, NY , 121--131. Anne E. Fowler. 1995. Linguistic variability in persons with Down syndrome. In Down Syndrome: Living and Learning in the Community, Lynn Nadel and Donna Rosenthal Eds., Wiley-Liss Press, New York, NY, 121--131."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.03.007"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979242"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.19"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-011-0267-3"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/242896.242897"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3104\/reviews.110"},{"key":"e_1_2_1_27_1","first-page":"233","article-title":"Long-term memory for verbal and visual information in Down syndrome and Williams syndrome","volume":"43","author":"Jarrold Christopher","year":"2007","unstructured":"Christopher Jarrold , Alan D. Baddeley , and Caroline Phillips . 2007 . Long-term memory for verbal and visual information in Down syndrome and Williams syndrome : Performance on the Doors and People Test. Cortex 43 , 2, 233 -- 247 . Christopher Jarrold, Alan D. Baddeley, and Caroline Phillips. 2007. Long-term memory for verbal and visual information in Down syndrome and Williams syndrome: Performance on the Doors and People Test. Cortex 43, 2, 233--247.","journal-title":"Performance on the Doors and People Test. Cortex"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 8th USENIX Security Symposium. 1--14","author":"Jermyn Ian","unstructured":"Ian Jermyn , Alain Mayer , Fabian Monrose , Michael K. Reiter , and Aviel D. Rubin . 1999. The design and analysis of graphical passwords . In Proceedings of the 8th USENIX Security Symposium. 1--14 . Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin. 1999. The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium. 1--14."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878803.1878875"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1884164.1884212"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2009.11.001"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2835484.2835485"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143129"},{"key":"e_1_2_1_34_1","unstructured":"Jonathan Lazar Jinjuan Feng and Harry Hochheiser. 2010. Chapter 15: Working with research participants with impairments. In Research Methods in Human-Computer Interaction Wiley.  Jonathan Lazar Jinjuan Feng and Harry Hochheiser. 2010. Chapter 15: Working with research participants with impairments. In Research Methods in Human-Computer Interaction Wiley."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2049536.2049548"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2011.18"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384973"},{"key":"e_1_2_1_38_1","first-page":"153","article-title":"Short-term memory difficulties and Down syndrome","volume":"32","author":"Marcell Michael M.","year":"1988","unstructured":"Michael M. Marcell and Susan L. Weeks . 1988 . Short-term memory difficulties and Down syndrome . J. Mental Deficiency Res. 32 , 2, 153 -- 162 . Michael M. Marcell and Susan L. Weeks. 1988. Short-term memory difficulties and Down syndrome. J. Mental Deficiency Res. 32, 2, 153--162.","journal-title":"J. Mental Deficiency Res."},{"key":"e_1_2_1_39_1","volume-title":"Mental Wellness in Adults with Down Syndrome","author":"McGuire Dennis","unstructured":"Dennis McGuire and Brian Chicoine . 2006. Mental Wellness in Adults with Down Syndrome . Woodbine House , Bethesda, MD . Dennis McGuire and Brian Chicoine. 2006. Mental Wellness in Adults with Down Syndrome. Woodbine House, Bethesda, MD."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.09.001"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240758"},{"key":"e_1_2_1_42_1","volume-title":"Graphical passwords","author":"Monrose Fabian","unstructured":"Fabian Monrose and Michael Reiter . 2005. Graphical passwords . In Security and Usability, Designing Secure Systems That People Can Use, Lorrie Faith Cranor and Simson Garfinkel Eds., O\u2019Reilly Press . Fabian Monrose and Michael Reiter. 2005. Graphical passwords. In Security and Usability, Designing Secure Systems That People Can Use, Lorrie Faith Cranor and Simson Garfinkel Eds., O\u2019Reilly Press."},{"key":"e_1_2_1_43_1","unstructured":"NDSC. 2013. Facts about Down syndrome. http:\/\/ndsccenter.org\/resources\/generalinformation\/facts-about-down-syndrome\/ (last accesed 3\/13).  NDSC. 2013. Facts about Down syndrome. http:\/\/ndsccenter.org\/resources\/generalinformation\/facts-about-down-syndrome\/ (last accesed 3\/13)."},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of Virtual Concept.","author":"Orozco Mauricio","year":"2006","unstructured":"Mauricio Orozco , Behzad Malek , Mohamad Eid , and Abdulmotaleb El Saddik . 2006 . Haptic-based sensible graphical password . In Proceedings of Virtual Concept. Mauricio Orozco, Behzad Malek, Mohamad Eid, and Abdulmotaleb El Saddik. 2006. Haptic-based sensible graphical password. In Proceedings of Virtual Concept."},{"key":"e_1_2_1_45_1","unstructured":"Passfaces Corporation. 2013. The science behind passfaces. http:\/\/www.passfaces.com\/published\/The&percnt;20Science&percnt;20Behind&percnt;20Passfaces.pdf (last accessed 1\/13).  Passfaces Corporation. 2013. The science behind passfaces. http:\/\/www.passfaces.com\/published\/The&percnt;20Science&percnt;20Behind&percnt;20Passfaces.pdf (last accessed 1\/13)."},{"key":"e_1_2_1_46_1","unstructured":"Passfault. 2012. http:\/\/www.passfault.com\/ (last accessed 12\/12).  Passfault. 2012. http:\/\/www.passfault.com\/ (last accessed 12\/12)."},{"key":"e_1_2_1_47_1","unstructured":"Password Meter. 2012. http:\/\/www.passwordmeter.com\/ (last accessed 12\/12).  Password Meter. 2012. http:\/\/www.passwordmeter.com\/ (last accessed 12\/12)."},{"key":"e_1_2_1_48_1","volume-title":"Chapter Six: Evaluating authentication mechanisms","author":"Renaud Karen","year":"2005","unstructured":"Karen Renaud . 2005 . Chapter Six: Evaluating authentication mechanisms . In Security and Usability, Designing Secure Systems That People Can Use, Lorrie Faith Cranor and Simson Garfinkel Eds., O\u2019Reilly Press . Karen Renaud. 2005. Chapter Six: Evaluating authentication mechanisms. In Security and Usability, Designing Secure Systems That People Can Use, Lorrie Faith Cranor and Simson Garfinkel Eds., O\u2019Reilly Press."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-009-0171-2"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1786774.1786776"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2141943.2141945"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/14640747308400340"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.27"},{"key":"e_1_2_1_55_1","volume-title":"Idioms and Phrases Index","author":"Urdang Laurence","unstructured":"Laurence Urdang . 1983. Idioms and Phrases Index . Gale Research Co. Press , Detroit, MI . Laurence Urdang. 1983. Idioms and Phrases Index. Gale Research Co. Press, Detroit, MI."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1972.tb00068.x"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630023"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639642.1639689"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90115-A"}],"container-title":["ACM Transactions on Accessible Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2493171.2493173","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2493171.2493173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:33Z","timestamp":1750235973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2493171.2493173"}},"subtitle":["A Comparison between Individuals with Down Syndrome and Neurotypical Users"],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":60,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["10.1145\/2493171.2493173"],"URL":"https:\/\/doi.org\/10.1145\/2493171.2493173","relation":{},"ISSN":["1936-7228","1936-7236"],"issn-type":[{"value":"1936-7228","type":"print"},{"value":"1936-7236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7]]},"assertion":[{"value":"2012-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}