Gamifying authentication

@article{Kroeze2012GamifyingA,
  title={Gamifying authentication},
  author={Christien Kroeze and M. Olivier},
  journal={2012 Information Security for South Africa},
  year={2012},
  pages={1-8}
}
  • Christien Kroeze, M. Olivier
  • Published 2012
  • Computer Science
  • 2012 Information Security for South Africa
  • The fields of security and usability often conflict with each other. Security focuses on making systems difficult for attackers to compromise. However, doing this also increases difficulty for the user. Users in security are often seen as an obstacle - they are the weakest point of the system, willing to circumvent security policies in order to access their work faster. A large part of security is authentication: knowing who a user of a system is and denying access to unauthenticated users… CONTINUE READING
    12 Citations
    CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices
    • 1
    Gamification for Teaching and Learning Computer Security in Higher Education
    • 22
    • PDF
    Gamification of a Project Management System
    • 19
    Gamification in social media
    • 2
    • PDF

    References

    SHOWING 1-10 OF 59 REFERENCES
    Influencing users towards better passwords: persuasive cued click-points
    • 106
    • PDF
    Pretty good persuasion: a first step towards effective password security in the real world
    • 192
    • PDF
    Taking a graphical approach to the password
    • 42
    The Design and Analysis of Graphical Passwords
    • 915
    • PDF
    Moving from the design of usable security technologies to the design of useful secure applications
    • 130
    • PDF
    Persuasion as Education for Computer Security
    • 25
    • PDF
    Guest Editors' Introduction: Secure or Usable?
    • 49
    • PDF
    Password memorability and security: empirical results
    • 631
    • PDF
    Security in computing
    • 1,385
    • PDF