skip to main content
10.1145/1477973.1477982acmconferencesArticle/Chapter ViewAbstractPublication PageschimitConference Proceedingsconference-collections
research-article

Network authentication using single sign-on: the challenge of aligning mental models

Authors Info & Claims
Published:14 November 2008Publication History

ABSTRACT

Healthcare organizations are struggling to meet industry best practices for information security as well as complying with regulatory requirements. Single sign-on technology is emerging as a leading technology for password authentication management and promises to improve security while curbing system maintenance costs. While the technology seems to be a simple viable solution for authentication, when placed in context, many socio-technical complexities emerge. One of these complexities is that of the mismatch between the users' mental models and the system model.

This study was a 15-month ethnographic field study that followed the implementation of a single sign-on system in a hospital environment. It resulted in the finding that the misaligned mental models caused difficulties not only for the user but for the system administrators. The findings also indicate that not only was the user's mental model of the technology inaccurate, but the presentation of the technology by the information technology group contributed to this misaligned understanding. The end result was dissatisfaction with the new technology for both end users and the system administrators.

In order to address the critical issue of mental model misalignment in the implementation of SSO technology, practitioners must first gain an understanding of the preexisting mental models had by the target users regarding authentication and then use this information to guide implementation of the new technology.

References

  1. The New Oxford American Dictionary. McKean, E. ed., Oxford University Press, 2005.Google ScholarGoogle Scholar
  2. Webster's New Millennium Dictionary of English, Preview Edition. Kipfer, B. A. ed., Lexico Publishing Group, Long Beach, 2007.Google ScholarGoogle Scholar
  3. Adams, A. and Sasse, M. A. Users are not the enemy. Communications of the ACM, 42 (12). 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Anchan, D. and Pegah, M. Regaining single sign-on taming the beast. Proceedings of the 31st annual ACM SIGUCCS conference on User services. 166--171. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bardram, E. The trouble with login: on usability and computer security in ubiquitous computing. Personal Ubiquitous Computing., 9 (6). 357--367. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Borgman, C. The users mental model of an information retrieval system: an experiment on a prototype online catalog. International Journal of Human-Computer Studies, 51 (2). 435--452. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Carroll, J and Olson, J. "Mental Models in Human-Computer Interaction" in Handbook of Human-Computer Interaction, M Helander (ed), Elsevier, 1988Google ScholarGoogle Scholar
  8. Fein, R. M., Olson, G. M. and Olson, J. S. A mental model can help with learning to operate a complex device. Conference on Human Factors in Computing Systems. 157--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ives, B., Walsh, K. R. and Schneider, H. The domino effect of password reuse. Communications of the ACM, 47 (4). 75--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jøsang, A., J. Fabre, et al. Trust Requirements in Identity Management. Australasian Information Security Workshop, Newcastle, Australia, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. McDaniel, S. What's Your Idea of a Mental Model. Boxes and Arrows.Google ScholarGoogle Scholar
  12. Norman, D. The Design of Everyday Things. Doubleday/Currency, New York, 1988.Google ScholarGoogle Scholar
  13. Norman, D. A. and Collyer, B. The design of everyday things. Basic Books New York, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Patton, M. Q. Qualitative evaluation and research methods.Google ScholarGoogle Scholar
  15. Pellissier, S. V. Effective Authentication in a Medical Environment - Business Case Analysis. ATI IPT Technical Report 01-01. DAMD17-99-C-9001, Frederick, MD, USA, 2001.Google ScholarGoogle Scholar
  16. Preece, Rogers, & Sharp. Interaction design: Beyond human-computer interaction. John Wiley & Sons, Inc, 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Sasse, M. A. Eliciting and Describing Users' Models of Computer Systems Computer Science, University of Birmingham, Birmingham, UK, 1997.Google ScholarGoogle Scholar
  18. Shneiderman, B. Designing the user interface: strategies for effective human-computer interaction. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Van Der Veer, Gerrit and Melguize, Maria,(2003) "Mental Models', In J. A. Jacko and A. Sears (EDS.), The Human Computer Interaction Handbook, p 52--80, Mahwah, NJ: Lawrence Associates Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Yan, J., Blackwell, A., Anderson, R. and Grant, A. Password memorability and security: empirical results. Security & Privacy Magazine, IEEE, 2 (5). 25--31. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Network authentication using single sign-on: the challenge of aligning mental models

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHiMiT '08: Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
      November 2008
      82 pages
      ISBN:9781605583556
      DOI:10.1145/1477973

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 November 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate15of43submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader