...

อิทธิพลของประเภทรูปภาพที่มีผลตnอการจดจํารูป

by user

on
Category: Documents
16

views

Report

Comments

Transcript

อิทธิพลของประเภทรูปภาพที่มีผลตnอการจดจํารูป
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
°·š›·¡¨…°Šž¦³Á£š¦¼ ž£µ¡š¸É¤¸Ÿ¨˜n °„µ¦‹—‹Îµ¦¼ ž£µ¡
¦´˜œµª¨¸ Á‡¦º °­ª´­—·1Í
–´“›œœšr ®Š­rª¦· š›·Í2
š‡´—¥n °
ž´ ‹‹»œ´ „µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ˜´ª°´„¬¦ÁžÈ œš¸Éœ·¥¤¤µ„ Á¡ºÉ°‡ªµ¤ž¨°—£´¥…°Š…o °¤¼¨‹µ„„µ¦
˦„¦¦¤ ˜n¤¸…o°‹Îµ„´—š¸É­Îµ‡´ ‡º°ž´ ®µ„µ¦¨º¤¦®´­Ÿnµœ ‹¹Š¤¸Ÿo «¼ ¹„¬µª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ¦¼ ž£µ¡
×¥°o µŠ°·ŠŠµœª·‹¥´ šµŠ—o µœ‹·˜ª·š¥µš¸É„¨nµªªnµ ¤œ»¬¥r­µ¤µ¦™‹—‹ÎµÂ¨³¦³¨¹„™¹Š¦¼ž£µ¡Å—o —¸„ªnµ˜´ª°´„¬¦ ˜n¥Š´ Ťn
¤¸…o°­¦»žªnµ¦¼ž£µ¡ž¦³Á£šÄ—Á®¤µ³­¤š¸É­—» Šµœª·‹¥´ œ¸ ʋ¹Š¤¸ª˜´ ™»ž¦³­Š‡rÁ¡ºÉ°«¹„¬µž´ ‹‹´¥ž¦³Á£š…°Š¦¼ ž£µ¡ ×¥
šÎµ„µ¦š—¨°Š„´ž¦³µ„¦Â¨³„¨»¤n ˜´ª°¥nµŠ‹Îµœªœ şŚ ‡œ Ž¹ŠÉ „µ¦š—¨°Š¤¸¦¼žÂÁžÈ œÁ„¤‹Îµ¦¼ž£µ¡Â¨³˜ÎµÂ®œnŠ
Á¡ºÉ°Áž¦¸ ¥Áš¸¥¦³®ªnµŠ¦¼ž£µ¡Ä®œo µ»‡‡¨š¸É¤¸ºÉ°Á­¸¥Š, ĝ®œo µ»‡‡¨š´ªÉ Ş, Ÿ¨Å¤o ¨³œµ¤›¦¦¤ Ÿ¨„µ¦š—¨°Š
¡ªnµ ž¦³Á£š…°Š¦¼ ž£µ¡Å¤n¤¸Ÿ¨˜n°Áª¨µš¸Éčo Ĝ„µ¦‹Îµ ˜n­nŠŸ¨˜n°Áª¨µš¸Éčo Ĝ„µ¦¦³¨¹„¨³‹Îµœªœ¦¼ ž£µ¡š¸É
¦³¨¹„Å—o °¥nµŠ¤¸œ¥´ ­Îµ‡´š¸É¦³—´‡ªµ¤ÁºÉ°¤´œÉ šŝ ×¥¦¼ž£µ¡š¸Éčo Áª¨µÄœ„µ¦¦³¨¹„œo °¥š¸É­—» ¨³‹Îµœªœ¦¼ ž£µ¡
š¸Éž¦³µ„¦Â¨³„¨»¤n ˜´ª°¥nµŠ¦³¨¹„Å—o ¤µ„š¸É­—» ‡º° ¦¼ž£µ¡Ÿ¨Å¤o
‡Îµ­Îµ‡´ „µ¦¡·­‹¼ œr˜ª´ ˜œ ¦®´­Ÿnµœ¦¼ž£µ¡ ž¦³Á£š…°Š¦¼ž£µ¡ „µ¦¦³¨¹„¦¼ž£µ¡
1,
œ´„«¹„¬µÂ¨³°µ‹µ¦¥r£µ‡ª·µª·š¥µ„µ¦‡°¤¡·ªÁ˜°¦r ‡–³ª·š¥µ«µ­˜¦r ¨³Áš‡ÃœÃ¨¥¸¤®µª·š¥µ¨´¥›¦¦¤«µ­˜¦r «¼œ¥r¦´Š­·˜
E-PDLO [email protected], [email protected]
197
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
Abstract
Nowadays, traditional alphanumeric password is the most widely used authentication for
protecting private or secret data from attack. However, forgetting password is one of the main
problems. Therefore, the graphical password was proposed for alternative. Psychological studies have
shown that people can remember images better than text. However, there has been no research that
aims to study which type of images are suitable to be used as a graphical password. Therefore, the
objective of this research was to investigate the effects of image types, including fruit, abstraction,
famous people
s face and ordinary people
s face, on usability. $ total of 72 participants were invited to
play game in remembering images and its position. The experimental results showed that the type of
images did not affect the average time to remember image and its position, but it affected the average
time to recognize and the number of recognized images and its position significantly at 95% confident
level. The image in fruit category gained the highest number of recognition while utilized the lowest
recognition time.
Keyword: $uthentication *raphical Password Type of image 5ecognize image
šœÎµ
ž´ ‹‹»œ´ „µ¦¡·­‹¼ œr ˜ª´ ˜œÁ¡ºÉ°Á…o µÄo Šµœ¦³˜nµŠÇ š¸É¤¸„µ¦‹Îµ„´—­·š›·Í Ĝ„µ¦Á…o µÄo Šµœ ¤¸‡ªµ¤­Îµ‡´
°¥nµŠ¤µ„ Á¡ºÉ°žo°Š„´œ…o °¤¼¨‹µ„„µ¦Ã‹¦„¦¦¤…°Š„¨»¤n Ÿ¼oŤnž¦³­Š‡r—¸ „µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ˜´ª°´„¬¦ÁžÈ œš¸É
œ·¥ ¤¤µ„ ¨³‹µ„„µ¦«¹„ ¬µŠµœª· ‹´¥ š¸É Ÿnµ œ¤µ¡ªnµ Ÿ¼oÄ o ­nª œÄ®n œ· ¥ ¤˜´ŠÊ ¦®´­ Ÿnµ œÁ¡ºÉ ° Ä®o ‹Î µ Šn µ ¥ Adams
&Sasse, 1999, ŜŘ-ŜŞ Ánœ „µ¦˜´Š¦®´
Ê ­Ÿnµœ­´œÇ
Ê Šnµ¥Ç Ž¹ÉŠ¦®´­ŸnµœÁ®¨nµœ¸ Ê Šnµ¥˜n°„µ¦‡µ—Á—µ…°ŠŸ¼oš¸É˜o°Š„µ¦
˦„¦¦¤…o °¤¼¨ µŠ¦³‹¹Š¤¸„µ¦˜´Š„‘Á„–”r
Ê
­Îµ®¦´„µ¦˜´Š¦®´
Ê ­Ÿnµœ Á¡ºÉ°Ä®o Ÿo ļ o ­¦o µŠ¦®´­Ÿnµœš¸É¥µ„˜n°„µ¦‡µ—
Á—µ®¦º °„µ¦Ã‹¦„¦¦¤¤µ„…¹ ʜ Ĝ…–³Á—¸¥ª„´œ¦®´­ŸnµœÁ®¨nµœ´œÊ „È¥µ„˜n°„µ¦‹—‹Îµ®¦º °„µ¦¦³¨¹„¦®´­Ÿnµœœ´œ…°Š
Ê
Ÿ¼očo ŠµœÁnœ Á—¸¥ª„´œ Ÿ¼očo Šµœ­nª œÄ®n ‹¹ ŠÂ„o ž´ ®µ„µ¦¨º¤¦®´­Ÿnµ œ—o ª¥ª·›¸„µ¦‹—´œš¹„ ®¦º °Äo ¦®´­ Ÿnµœ»—
Á—¸¥ª„´œ„´š»„´¸…°ŠŸ¼očo Šµœ Dhamija & Perrig, 2000, 4; Kotadia, 2005) Ž¹ÉŠª·›¸„µ¦œ¸ Ê¥·ÉŠÁžÈ œ„µ¦Á¡·É¤‡ªµ¤
Á­¸¥É Š˜n°„µ¦™¼„˦„¦¦¤
˜n°¤µ‹¹ŠÁ¦·É ¤¤¸Ÿo š¼ ε„µ¦«¹„¬µ ×¥°o µŠ°·ŠŠµœª·‹¥´ šµŠ—o µœ‹·˜ª·š¥µš¸É„¨nµªªnµ ¤œ»¬¥r­µ¤µ¦™‹—‹ÎµÂ¨³
¦³¨¹„™¹Š¦¼ ž£µ¡Å—o —¸„ªnµ˜´ª°´„¬¦ Shepard, 197, 15-163) ‹¹ŠÁ¦·É ¤¤¸Ÿo ‡¼ ·—‡o œÂ¨³°°„ª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œ
¦®´­Ÿnµœ¦¼ ž£µ¡ Á¡ºÉ°Â„o ž´®µÁ¦ºÉ °Š„µ¦‹Îµ¦®´­Ÿnµœ…°ŠŸ¼očo Šµœ ¤¸Šµœª·‹´¥®¨µ¥Šµœš¸É¸ ÊÄ®o Á®Èœªnµ ¦®´­Ÿnµœ
¦¼ ž£µ¡œ´œ¤¸
Ê ž¦³­·š›·£µ¡¤µ„„ªnµ¦®´­Ÿnµœ˜´ª°´„¬¦š´ŠšµŠ—o
Ê
µœ„µ¦Äo Šµœ 8sability) ¨³—o µœ‡ªµ¤ž¨°—£´¥
Security) Ž¹ŠÉ ™º°ÁžÈ œ­·ŠÉ ­Îµ‡´­Îµ®¦´„µ¦¡·­‹¼ œr˜ª´ ˜œ
Ê
Šµœª·‹¥´ š¸ÉŸµn œ¤µ¤¸„µ¦«¹„¬µÁ„¸É¥ª„´„µ¦°°„¦®´­Ÿnµœ¦¼ž£µ¡Ä®o ¤¸ž¦³­·š›·£µ¡¤µ„¥·ÉŠ…¹ ʜš´Š…œµ—
…°Š„¦· —, ‹Îµœªœ¦¼ž£µ¡š¸ÉÁ®¤µ³­¤­Îµ®¦´„µ¦œÎµÅž­¦o µŠÁžÈ œ¦®´­Ÿnµœ¦¼ž£µ¡ ¨³ ž¦³Á£š…°Š¦¼ ž£µ¡š¸ÉœÎµ¤µÄo
Ĝ„µ¦­¦o µŠ¦®´­Ÿnµœ ŗo „n ¦¼ ž£µ¡Ä®œo µ»‡‡¨ ¦¼ ž£µ¡œµ¤›¦¦¤ ¦¼ ž£µ¡š·ªš´«œr ¦¼ ž£µ¡­´˜ªr ¦¼ ž£µ¡„µ¦r ˜¼œ
¦¼ ž£µ¡Ÿ¨Å¤o ¦¼ ž£µ¡ªµ—°ºÉœÇ ²¨² ˜n¥Š´ Ťn¤¸…o°­¦» žªnµž¦³Á£š…°Š¦¼ ž£µ¡š¸É™¼„œÎµ¤µÄo Ĝ„µ¦­¦o µŠ¦®´­Ÿnµœ
¦¼ž£µ¡š¸ÉÁ®¤µ³­¤š¸É­—» ‡º°¦¼ž£µ¡ž¦³Á£šÄ—
198
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
ª´˜™»ž¦³­Š‡r
Á¡ºÉ°šÎµ„µ¦«¹„¬µ™¹Šž´ ‹‹´¥ž¦³Á£š…°Š¦¼ž£µ¡š¸ÉšÎµÄ®o ¦®´­Ÿnµœ¦¼ž£µ¡¤¸ž¦³­·š›·£µ¡„µ¦Äo Šµœ­¼Š­»—
ššªœª¦¦–„¦¦¤
„µ¦¡·­‹¼ œr˜´ª˜œÂ¦®´­Ÿnµœ¦¼ ž£µ¡Å—o ™¼„‹ÎµÂœ„ž¦³Á£š˜µ¤¨´„¬–³„µ¦‹Î µ£µ¡…°Š¤œ»¬¥rÁžÈ œ 2
ž¦³Á£š‡º° „µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ¦¼ ž£µ¡Ã—¥°µ«´¥ª·›¸„µ¦¦¼o ‹ÎµÅ—o 5ecognition based techniTue) ¨³
„µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ¦¼ ž£µ¡Ã—¥°µ«´¥ª·›¸„µ¦¦³¨¹„Å—o 5ecall based technique)Dhamija& Perrig,
2000,4; Suo et al., 2005; van 2orschot & Thorpe, 2005; :iedenbeck, :aters, %irget, %rodskiy, &
Memon, 2005a,102-127)
„µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ¦¼ ž£µ¡Ã—¥°µ«´¥ª·›¸„µ¦¦¼o ‹ÎµÅ—o 5ecognition based technique) ÁžÈ œ
ª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œš¸ÉÄ®o Ÿo ļ o ¦o ¼‹Îµ¦¼ž£µ¡š¸ÉÁžÈ œ¦®´­Ÿnµœš¸ÉÁ¨º°„Ūo ˜ŠÂ˜n
´ Ê …œ˜°œ„µ¦¨Šš³Á¸
´Ê
¥œ Á¤ºÉ°Ÿ¼očo ˜o°Š„µ¦¡·­‹¼ œr
˜´ª˜œÁ¡ºÉ°Á…o µ­¼¦n ³ Ÿ¼očo ‹³˜o °Š¦³»®¦º °Á¨º°„¦¼ ž£µ¡š¸ÉÁžÈ œ¦®´­Ÿnµœ‹¹Š‹³¡·­‹¼ œr˜ª´ ˜œ­ÎµÁ¦È ‹Â¨³Á…o µÄo Šµœ¦³
ŗo ˜ª´ °¥nµŠŠµœª·‹¥´ „µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ¦¼ž£µ¡Ã—¥°µ«´¥ª·›¸„µ¦¦¼o‹ÎµÅ—o 5ecognition based technique)
ŗo „n
Hash Visualization Perrig & Song, 1999,131-138) ¨³ Deja Vu Dhamija & Perrig, 2000,4)ÁžÈ œ
ª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ¦¼ž£µ¡ ץčo ¦¼ž£µ¡œµ¤›¦¦¤š¸É™„¼ ­¦o µŠ…¹ ʜ¤µ‹µ„ Hash function ÁžÈ œ¦¼ ž£µ¡
œµ¤›¦¦¤š¸ÉŤn¤¸‡ªµ¤®¤µ¥ Ž¹ÉŠ°o µŠ°·ŠŠµœª·‹¥´ šµŠ—o µœ‹·˜ª·š¥µš¸É„¨nµªªnµ ¤œ»¬¥r­µ¤µ¦™¦³»®¦º °‹ÎµÂœ„¦¼ ž¦n µŠ
Á¦…µ‡–·˜ ¦¼ žÂ ¨³­¸Å—o Boynton & Boss, 1971,173; 5eynolds, :hite, & Hilgendorf, 1972,227-236;
:illiams, 1966,315-318) ¨³„µ¦Á¨º°„čo ¦¼ž£µ¡œµ¤›¦¦¤š¸ÉŤn¤¸‡ªµ¤®¤µ¥Â¨³¤¸„µ¦¨´„¬–³…°Š¦¼ ž£µ¡
¦¼ ž¦n µŠ ¨³­¸š¸É°›·µ¥Å—o ¥µ„œ´œÊ šÎµÄ®o Ÿo ļ o š¸ÉÁžÈ œÁ‹o µ…°Š¦®´­Ÿnµœ Ťn­µ¤µ¦™™nµ¥š°—¦¼ ž¦n µŠ¨´„¬–³…°Š¦¼ ž£µ¡
Á¡ºÉ°°„Ä®o Ÿo ¼°ºÉœš¦µÅ—o °¥nµŠ´—Á‹œ ®¦º °Å¤n­µ¤µ¦™‹—´œš¹„¦®´­ŸnµœÅ—o —oª¥ „µ¦‹Î µ¦¼ ž£µ¡œµ¤›¦¦¤Ánœœ¸ Ê
‹ÎµÁžÈ œ‹³˜o °ŠÄo „µ¦‹Îµ£µ¡ Ž¹ÉŠÁžÈ œ‡ªµ¤š¦Š‹ÎµÁŒ¡µ³˜´ª ¥µ„š¸É‹³™nµ¥š°—Åž¥´ŠŸ¼o°ºÉœÅ—o ¦¼ ž£µ¡ž¦³Á£šœ¸ ʋ¹Š¤¸
‡ªµ¤ž¨°—£´¥­¼Š„ªnµ¦¼ž£µ¡ž¦³Á£š°ºÉœÇ
ª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œ…°Š Picture Password -ansen, *avrila, Korolev, Ayers, & Swanstrom, 2003)
Ÿ¼očo ‹³˜o °ŠÁ¨º°„›¸¤Theme) …°Š¦¼ž£µ¡ Ánœ š³Á¨, ¤ª ²¨² Ž¹ŠÉ ˜n¨³›¸¤ž¦³„°Åž—o ª¥¦¼ ž£µ¡Á¨È„Njεœªœ 30
¦¼ž Ÿ¼očo ‹³˜o °Š‡¨·„š¸É¦¼ž£µ¡Á¨È„Ç Á®¨nµœ´œÊ Á¡ºÉ°„ε®œ—ÁžÈ œ¦®´­Ÿnµœ
ª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œ…°Š Sobrado¨³ Birget Sobrado & Birget, 2002; :iedenbeck, :aters,
Sobrado, & Birget, 2006) ¤¸šŠ®¤—
´Ê
3¦¼ žÂ:iedenbeck et al., 2006)ŗo „nConvex Hull Click Scheme,
Movable frame scheme ¨³Intersection scheme ×¥š´ŠÊ 3 ¦¼ žÂœ¸ Êčo ª·›¸„µ¦Â­—Š¦¼ ž£µ¡…œµ—Á¨È„ ‹Îµœªœ
®¨µ¥¦o °¥¦¼ž£µ¡œ®œo µ‹°š¸É¤¸…œµ—‹Îµ„´—šÎµÄ®o Á„·—‡ªµ¤Â°°´—¨³Äo ¦³¥³Áª¨µœµœÄœ„µ¦¤°Š®µ¦¼ž£µ¡
Passface 5eal8ser, 2005) ¨³ S-PassfaceTowhidi et al., 2013) ÁžÈ œª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œÂ
¦®´­Ÿnµœ¦¼ž£µ¡ ץčo ¦¼ž£µ¡Ä®œo µ»‡‡¨š´ªÉ Ş ×¥¤¸Âœª‡·—¤µ‹µ„Šµœª·‹¥´ …°Š Valentine Valentine, 1998)
š¸É­¦»žÅ—o ªµn ¤œ»¬¥r­µ¤µ¦™‹—‹ÎµÂ¨³¦³¨¹„™¹ŠÄ®œo µ…°Š¤œ»¬¥r—oª¥„´œÅ—o —¸„ªnµ¦¼ž£µ¡ž¦³Á£š°ºÉœÇ Ž¹ŠÉ Šµœª·‹¥´ …°Š
Towhidi ¨³ Masrom Towhidi & Masrom, 2009) ŗo šÎµ„µ¦«¹„¬µÂ¨³Å—o …o°­¦»žªnµ Passface čo Šnµ¥ Á…o µÄ‹Šnµ¥
¨³‹—‹Îµ¦®´­ŸnµœÅ—o Šnµ¥ Ĝ…–³Á—¸¥ª„´œ„Ȥ¸Šµœª·‹¥´ …°Š Hayashi, Dhamija, Christin¨³ Perrig Hayashi,
Dhamija, Christin, & Perrig, 2008) ¨³ Hafiz, Abdullah, Ithnin¨³ Mammi Hafiz, Abdullah, Ithnin, &
199
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
Mammi, 2008) ¡ªnµ Ÿ¼očo Šµœ­nªœÄ®n¤„´ Á¨º°„¦¼ž£µ¡Ä®œo µ»‡‡¨š¸É¤¸Áº Ê°µ˜·Á—¸¥ª„´œ®¦º °Ä„¨o Á‡¸¥Š„´˜œÁ°Š
®¦º °Á¨º°„¦¼ž£µ¡Ä®œo µ»‡‡¨š¸É¦o ¼­„¹ ªnµ¤¸Á­œn®r—Š¹ —¼—Ä‹
„µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ¦¼ ž£µ¡Ã—¥°µ«´¥ª·›¸„µ¦¦³¨¹„Å—o 5ecall based technique) ÁžÈ œ„µ¦
¡·­‹¼ œr˜ª´ ˜œš¸ÉÄ®o Ÿo ļ o Šµœ­¦o µŠ®¦º °Á¨º°„¦®´­Ÿnµœ—o ª¥˜œÁ°Š ×¥…´œ˜°œÄœ„µ¦¡·
Ê
­‹¼ œr˜ª´ ˜œÁ¡ºÉ°Á…o µ­¼¦n ³ Ÿ¼očo
‹³˜o °ŠšÎµ˜µ¤ª·›¸„µ¦Â¨³…´œÊ ˜°œ„µ¦­¦o µŠ¦®´­ŸnµœÄ®o Á®¤º°œ„´š¸É­¦o µŠÅªo Ĝ…´œÊ ˜°œ„µ¦¨Šš³Á¸¥œ ˜´ª°¥nµŠ
Šµœª·‹¥´ „µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ¦¼ž£µ¡Ã—¥°µ«´¥ª·›¸„µ¦¦³¨¹„Å—o Recall based technique) ŗo „n
Blonder Blonder, 1996), PassPoints Birget, Hong, & Memon, 2003,168; :iedenbeck, :aters,
Birget, Brodskiy, & Memon, 2005b,102-127) ¨³ VisKey Sfr, 2005) ÁžÈ œª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œÃ—¥Äo Áš‡œ·‡
„µ¦„ε®œ—‹»—œ¦¼ ž£µ¡Ä—Ç Ánœ ¦¼ ž£µ¡ªµ— ®¦º °¦¼ ž£µ¡ª·ª Á¡ºÉ°Äo ÁžÈ œ¦®´­Ÿnµœ ×¥Ÿ¼očo ‹³˜o °Š‡¨·„š¸É‹»—œ
¦¼ž£µ¡˜µ¤¨Îµ—´Ä®o ™„¼ ˜o °Š‹¹Š‹³¡·­‹¼ œr˜ª´ ˜œ­ÎµÁ¦È ‹
V-*2 Passlogix, 2005) ÁžÈ œª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œš¸ÉÄ®o Ÿo ļ o ‹—´ „µ¦„´ª´˜™»œ¦¼ ž£µ¡ ×¥ª·›¸„µ¦‡¨·„®¦º °
¨µ„ªµŠ Drag and drop) Á¡ºÉ°­¦o µŠÁ¦ºÉ °Š¦µª®¦º °¨Îµ—´­Îµ®¦´Äo ÁžÈ œ¦®´­Ÿnµœ Ánœ „µ¦Á¨º°„­·ÉŠ…°Š‹µ„˜¼oÁ¥ÈœÅž
ªµŠœÁ˜µ° ®¦º °„µ¦‹»n¤Ÿ´„¨ŠÄœœÎ ʵ ÁžÈ œ˜o œ
ª´¦· œš¦r ¤›»¦­¡Š«r¡œ´ ›r ¨³–´“›œœšr ®Š­rª¦· š›·Í›¦ª´¦· œš¦r ¤›»¦­¡Š«r¡œ´ ›r & –´“›œœšr ®Š­rª¦· š›·Í›¦,
2556,24-33)ŗo Á­œ°ª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ¦¼ ž£µ¡ ץčo ¦¼ž£µ¡„µ¦r ˜¼œ ץčo œª‡·—‹µ„Šµœª·‹´¥
ToonPasswords Hinds & Ekwueme, 2007) Ž¹ÉŠ„¨nµªªnµ ¤œ»¬¥r š»„Á¡«š»„ª´¥¥n°¤¦¼o ‹´„˜´ª„µ¦r ˜¼œÂ¨³¤¸
‡ªµ¤‡»oœÁ‡¥ ®¦º °¤¸„µ¦r ˜œ¼ š¸Éž¦³š´Ä‹
´ œr ¨³–´“›œœšr ®Š­rª¦· š›·Í›¦ °œ»¡Š«r °›·„ªŠ«rª·ª•
´ œr & –´“›œœšr ®Š­rª¦· š›·Í›¦,
°œ»¡Š«r °›·„ªŠ«rª·ª•
2556,462-471 )ŗo šÎµ„µ¦«¹„¬µÁ·Š­Îµ¦ª‹Á„¸É¥ª„´ž´ ‹‹´¥Äœ„µ¦°°„ª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œÂ¦®´­Ÿnµœ¦¼ ž£µ¡
Äo ˜µ¦µŠ„¦· — ×¥Ÿ¨„µ¦­Îµ¦ª‹­¦» žÅ—o ªnµ ž¦³Á£š…°Š¦¼ ž£µ¡ Ÿ¨„µ¦­Îµ¦ª‹¡ªnµ ŗo „n ¦¼ ž£µ¡­·ÉŠ¤¸¸ª·˜
ŗo ¦´„µ¦Ã®ª˜ÁžÈ œ°´œ—´®œ¹ŠÉ ¨³¦¼ž£µ¡ª´˜™»Å—o ¦´„µ¦Ã®ª˜ÁžÈ œ°´œ—´š¸É­°Š ­—ŠÄ®o Á®Èœªnµ Ÿ¼očo ¤¸‡ªµ¤¡¹Š¡°Ä‹
Ĝ„µ¦Äo ¦¼ž£µ¡¦¼ž›¦¦¤¤µ„„ªnµ¦¼ž£µ¡œµ¤›¦¦¤Äœ„µ¦­¦o µŠ¦®´­Ÿnµœ¦¼ž£µ¡
Á„¦¸ ¥ŠÅ„¦ ¤³ÃœÄ‹ ¨³–´“›œœšr ®Š­rª¦· š›·Í›¦ Á„¦¸ ¥ŠÅ„¦ ¤³ÃœÄ‹ &–´“›œœšr ®Š­rª¦· š›·Í›¦, 2556,453461) ŗo šÎµ„µ¦š—¨°ŠÁ¡ºÉ°«¹„¬µ°·š›· ¡¨…°Š¦¼ žÂ˜µ¦µŠ„¦· —¨³¦¼ žÂ¦¼ ž£µ¡š¸É¤¸Ÿ¨˜n°„µ¦‹—‹Îµ¦®´­Ÿnµœ
¦¼ ž£µ¡ ×¥ž´ ‹‹´¥—o µœ¦¼ ž£µ¡Å—o šÎµ„µ¦«¹„¬µÁž¦¸ ¥Áš¸¥ ¦¼ ž£µ¡Ä®œo µ»‡‡¨Â¨³¦¼ ž£µ¡°ºÉœÇŸ¨„µ¦š—¨°Š
¡ªnµ ž¦³µ„¦Â¨³„¨»¤n ˜´ª°¥nµŠÄo Áª¨µÄœ„µ¦‹Îµ¦¼ž£µ¡Ä®œo µ»‡‡¨¤µ„„ªnµ¦¼ž£µ¡°ºÉœÇ¨³‹µ„Ÿ¨„µ¦­Îµ¦ª‹
‡ªµ¤¡¹Š¡°Ä‹ ¡ªnµŸ¼očo ­ªn œÄ®n¤¸‡ªµ¤¡¹Š¡°Ä‹˜n°¦¼ ž£µ¡Ä®œo µ»‡‡¨¤µ„š¸É­—» ¨³¦¼ ž£µ¡Ÿ¨Å¤o ÁžÈ œ°´œ—´
­°Š
‹µ„„µ¦«¹„¬µŠµœª·‹´¥š¸ÉÁ„¸É ¥ª…o °Š ¡ªnµ ž¦³Á£š…°Š¦¼ ž£µ¡š¸ÉœÎµ ¤µÄo Ĝ„µ¦­¦o µŠ¦®´­Ÿnµœ ŗo  „n
¦¼ž£µ¡Ä®œo µ»‡‡¨, ¦¼ž£µ¡œµ¤›¦¦¤, ¦¼ž£µ¡š·ªš´«œr, ¦¼ž£µ¡­´˜ªr, ¦¼ž£µ¡„µ¦r ˜œ¼ , ¦¼ ž£µ¡Ÿ¨Å¤o , ¦¼ ž£µ¡ªµ—
°ºÉœÇ ²¨² Ťn¤¸Šµœª·‹¥´ ė„¨nµªªnµž¦³Á£š…°Š¦¼ž£µ¡š¸É™„¼ œÎµ¤µÄo Ĝ„µ¦­¦o µŠ¦®´­Ÿnµœ¦¼ž£µ¡š¸ÉÁ®¤µ³­¤š¸É­—» ‡º°
¦¼ž£µ¡ž¦³Á£šÄ— Ÿ¼oª·‹¥´ ‹¹ŠÅ—o šÎµ„µ¦š—¨°ŠÁ¡ºÉ°®µ¦¼ž£µ¡š¸ÉÁ®¤µ³­¤­Îµ®¦´„µ¦œÎµ¤µ­¦o µŠÁžÈ œ¦®´­Ÿnµœ
ª·›¸„µ¦ª·‹´¥
­¤¤˜·“µœ
Šµœª·‹´¥œ¸ ʚε„µ¦š—¨°ŠÁ¡ºÉ°«¹„¬µž¦³Á£š…°Š¦¼ ž£µ¡š¸É¤¸°·š›·Ÿ¨˜n°„µ¦Äo Šµœ…°Šª·›¸„µ¦¡·­‹¼ œr˜ª´ ˜œ
¦®´­Ÿnµœ¦¼ž£µ¡ ×¥¤¸­¤¤˜·“µœªnµ Ÿ¼očo Šµœ­µ¤µ¦™¦³¨¹„¦¼ž£µ¡Ä®œo µ»‡‡¨Å—o —¸„ªnµ¦¼ž£µ¡ž¦³Á£š°ºÉœÇ
200
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
ž´ ‹‹´¥š¸É˜o°Š„µ¦«¹„¬µ
˜´ªÂž¦˜o œ ‡º° ž¦³Á£š…°Š¦¼ž£µ¡ ŗo „n ¦¼ž£µ¡Ä®œo µ»‡‡¨š¸É¤¸ ºÉ°Á­¸¥Š ¦¼ž£µ¡Ä®œo µ»‡‡¨š´ªÉ Ş
¦¼ž£µ¡Ÿ¨Å¤o ¨³¦¼ž£µ¡œµ¤›¦¦¤
˜´ªÂž¦˜µ¤ ŗo „nÁª¨µš¸Éčo Ĝ„µ¦‹Îµ¦¼ž£µ¡Â¨³˜ÎµÂ®œnŠ…°Š¦¼ž£µ¡œ˜µ¦µŠ„¦· — Áª¨µš¸Éčo Ĝ„µ¦¦³¨¹„¦¼ž£µ¡
¨³˜ÎµÂ®œnŠ ‹Îµœªœ¦¼ž£µ¡š¸ÉŸo ļ o ­µ¤µ¦™¦³¨¹„Å—o ¨³‡ªµ¤¡¹Š¡°Ä‹…°ŠŸ¼očo
Á‡¦ºÉ°Š¤º°š¸Éčo Ĝ„µ¦š—¨°Š
ަ„¦¤š¸Éčo Ĝ„µ¦š—¨°Šœ¸ ʤ¸¨„´ ¬–³ÁžÈ œÁ„¤‹Îµ¦¼ ž£µ¡ ™¼„¡´•œµ—o ª¥£µ¬µ ASP.NET C) ¨³
´œš¹„…o °¤¼¨¨Š“µœ…o °¤¼¨ MS SQL SERVER2008R2 ץަ„¦¤Á„¤‹Îµ£µ¡œ¸ ʋ³™¼„˜·—˜´Š¨Šœ
Ê
Server ¨³šÎµ
„µ¦š—¨°ŠŸnµœ :eb Browser
ž¦³µ„¦Â¨³„¨»n¤˜´ª°¥n µŠ
„µ¦š—¨°Šœ¸ Ê ¤¸ž¦³µ„¦Â¨³„¨»¤n ˜´ª°¥nµŠ 72 ‡œ ÁžÈ œµ¥ 37 ‡œ ¨³®·Š 35 ‡œ °µ¥»˜Îɵ„ªnµ 20 ž¸
‹Îµœªœ 18 ‡œ °µ¥»¦³®ªnµŠ 20-30 ž¸ ‹Îµœªœ 50 ‡œ °µ¥»¦³®ªnµŠ 31-40 ž¸ ‹Îµœªœ 3 ‡œ ¨³°µ¥»¦³®ªnµŠ 41-50
ž¸ ‹Îµœªœ 1 ‡œ ¦³—´„µ¦«¹„¬µ˜Îɵ„ªnµž¦· µ˜¦¸ 16 ‡œ ž¦· µ˜¦¸ 44 ‡œ ¨³­¼Š„ªnµž¦· µ˜¦¸ 12 ‡œ ÁžÈ œ
œ´„Á¦¸ ¥œœ´„«¹„¬µ 35 ‡œ …o µ¦µ„µ¦ 4 ‡œ ¡œ´„Šµœ¦· ¬´šÁ°„œ 22 ‡œ ›»¦„·‹­nªœ˜´ª 4 ‡œ ¦´‹o µŠ°·­¦³ 5 ‡œ
¨³°µ¸¡°ºÉœÇ 2 ‡œ
„µ¦°°„„µ¦š—¨°Š
„µ¦š—¨°Šœ¸ ʤ¸¨„´ ¬–³ÁžÈ œ„µ¦ª·‹¥´ Á·Šš—¨°ŠÂ :ithin Subject Design ×¥šÎµ„µ¦«¹„¬µž´ ‹‹´¥
ž¦³Á£š…°Š¦¼ž£µ¡ ×¥„µ¦š—¨°Šœ¸ ʤ¸¨„´ ¬–³ÁžÈ œÁ„¤‹Îµ¦¼ ž£µ¡Â¨³˜ÎµÂ®œnŠš¸Éž¦µ„’œ˜µ¦µŠ„¦· —…œµ— 4x4
Á„¦¸ ¥ŠÅ„¦ ¤³ÃœÄ‹ &–´“›œœšr ®Š­rª¦· š›·Í›¦, 2556,453-461; °œ»¡Š«r °›·„ªŠ«rª·ª•
´ œr &–´“›œœšr ®Š­rª¦· š›·Í›¦,
2556, 462-471) ‹Îµœªœ 6 ¦¼ž Á‹¦·  ˜»¨¥r¦µ´œ´¥ &–´“›œœšr ®Š­rª¦· š›·Í›¦, 2556,472-480) ¨³¦¼ ž£µ¡š¸ÉÁžÈ œ
˜´ªÁ¨º°„¤¸‹Îµœªœ 30 ¦¼ž ­—Šœ˜µ¦µŠ„¦· —…œµ— 5x6 °œ»¡Š«r °›·„ªŠ«rª·ª•
´ œr &–´“›œœšr ®Š­rª¦· š›·Í›¦, 2556,
462-471) šÎµ„µ¦´œš¹„Ÿ¨Áª¨µš¸Éčo Ĝ„µ¦‹Îµ¦¼ž£µ¡Â¨³˜ÎµÂ®œnŠ…°Š¦¼ž£µ¡œ˜µ¦µŠ„¦· — Áª¨µš¸Éčo Ĝ„µ¦¦³¨¹„
¦¼ž£µ¡Â¨³˜ÎµÂ®œnŠ ‹Îµœªœ¦¼ž£µ¡š¸ÉŸo ļ o ­µ¤µ¦™¦³¨¹„Å—o ¨³ª´—Ÿ¨‡ªµ¤¡¹Š¡°Ä‹—o ª¥Â­°™µ¤
ª·›¸„µ¦š—¨°Š
Ĝ˜n¨³Á„¤„¨»¤n ˜´ª°¥nµŠ‹³˜o °Š‹Îµ¦¼ž£µ¡Â¨³˜ÎµÂ®œnŠš´ŠÊ 6 £µ¡ ¨³Äœ®œo µ‹°­Îµ®¦´Ä­n‡Îµ˜° „¨»¤n
˜´ª°¥nµŠ‹³˜o °Š‡¨·„Á¨º°„¦¼žÂ¨o ª¨µ„¤µªµŠÄœ˜µ¦µŠ„¦· —š¸ÉÁžÈ œ‡Îµ˜°Ä®o ™„¼ ˜o °Šš´Š¦¼Ê ž£µ¡Â¨³˜ÎµÂ®œnŠ
Á„¤‹Îµ£µ¡š´ŠÊ 4 Á„¤œ´œÊ ˜n¨³Á„¤‹³¤¸ž¦³Á£š…°Š¦¼ ž£µ¡š¸É˜„˜nµŠ„´œ‡º° ¦¼ ž£µ¡Ä®œo µ»‡‡¨š¸É¤¸ºÉ°Á­¸¥Š
¦¼ ž£µ¡Ä®œo µ»‡‡¨š´ªÉ Ş ¦¼ ž£µ¡Ÿ¨Å¤o ¨³¦¼ ž£µ¡œµ¤›¦¦¤ ×¥¨Îµ—´…°ŠÁ„¤¦³®ªnµŠ„¨»¤n ˜´ª°¥nµŠœ´œ‹³™¼
Ê „
­»¤n ¨³Á¤ºÉ°Á¨nœÁ„¤‹Îµ£µ¡‡¦š´ŠÊ 4 £µ¡Â¨o ª¦³‹³Â­—Š®œo µ‹°Â­°™µ¤‡ªµ¤¡¹Š¡°Ä‹
201
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
£µ¡š¸É 1 ®œo µ‹°‹Îµ£µ¡Â¨³˜ÎµÂ®œn Š
£µ¡š¸É 2 ®œo µ‹°­Îµ®¦´Ä­n ‡µÎ ˜°
Ÿ¨„µ¦ª·‹´¥
Šµœª·‹¥´ œ¸ ʤ¸ª˜´ ™»ž¦³­Š‡rÁ¡ºÉ°šÎµ„µ¦«¹„¬µ™¹Šž´ ‹‹´¥ž¦³Á£š…°Š¦¼ž£µ¡š¸ÉšÎµÄ®o ¦®´­Ÿnµœ¦¼ž£µ¡¤¸
ž¦³­·š›·£µ¡„µ¦Äo Šµœ­¼Š­»— ×¥ª´—Ÿ¨‹µ„
1. Áª¨µš¸ÄÉ o Ĝ„µ¦‹Îµ¦¼ž£µ¡Â¨³˜ÎµÂ®œnŠ…°Š¦¼ž£µ¡œ˜µ¦µŠ„¦·—
‹µ„„µ¦ª·Á‡¦µ³®r‡nµ­™·˜· Mauchlyus : 0.900 ®¦º °‡nµ­™·˜·Å‡­Â‡ª¦r 7.315) ¨³¤¸‡nµ Sig. = 0.198
Ž¹ÉŠ¤µ„„ªnµ Į= 0.05 ‹¹Š­¦» žÅ—o ªnµ‡nµ‡ªµ¤Âž¦ž¦ªœ…°ŠÁª¨µš¸Éčo Ĝ„µ¦‹Îµ¦¼ ž£µ¡Â¨³˜ÎµÂ®œnŠ…°Š¦¼ ž£µ¡œ
˜µ¦µŠ„¦· — Ťn˜„˜nµŠ„´œ ¨³‹µ„Ÿ¨„µ¦ª·Á‡¦µ³®r‡nµ­™·˜· ) Sphericity Assumed) = 1.795, df. = 3, Mean
Square = 74.314 ¨³¤¸‡µn Sig. = 0.149 Ž¹ŠÉ ¤µ„„ªnµ Į= 0.05 ‹¹Š­¦»žÅ—o ªµn š´ŠÊ 4 „¨»¤n „µ¦š—¨°Š¤¸Áª¨µÁŒ¨¸¥É š¸Éčo
Ĝ„µ¦‹Îµ¦¼ž£µ¡Â¨³˜ÎµÂ®œnŠ…°Š¦¼ž£µ¡œ˜µ¦µŠ„¦· — Ťn˜„˜nµŠ„´œ
2. Áª¨µš¸ÄÉ o Ĝ„µ¦¦³¨¹„¦¼ž£µ¡Â¨³˜ÎµÂ®œnŠ
‹µ„„µ¦ª·Á‡¦µ³®r‡nµ­™·˜· Mauchlyus : = 0.696 ®¦º °‡nµ­™·˜·Å‡­Â‡ª¦r 25.310) ¨³¤¸‡nµ Sig. = 0.000
Ž¹ÉŠœo °¥„ªnµ Į= 0.05 ‹¹Š­¦» žÅ—o ªnµ‡nµ‡ªµ¤Âž¦ž¦ªœ…°ŠÁª¨µš¸Éčo Ĝ„µ¦¦³¨¹„¦¼ ž£µ¡Â¨³˜ÎµÂ®œnŠ ˜„˜nµŠ„´œ
°¥nµŠ¤¸œ¥´ ­Îµ‡´š¸É¦³—´‡ªµ¤ÁºÉ°¤´œÉ 95 Áž°¦r ÁŽÈœ˜r¨³‹µ„Ÿ¨„µ¦ª·Á‡¦µ³®r‡nµ­™·˜· F Sphericity Assumed) =
16.839, df. = 3, Mean Square = 4416.517 ¨³¤¸‡nµ Sig. = 0.000 Ž¹ÉŠœo °¥„ªnµ Į= 0.05 ‹¹Š­¦» žÅ—o ªnµš¸É¦³—´
‡ªµ¤ÁºÉ°¤´œÉ 95 Áž°¦r ÁŽÈœ˜ršŠ´ Ê 4 „¨»¤n „µ¦š—¨°Š¤¸Áª¨µš¸Éčo Ĝ„µ¦¦³¨¹„¦¼ ž£µ¡Â¨³˜ÎµÂ®œnŠÂ˜„˜nµŠ„´œ°¥nµŠ¤¸
œ´¥­Îµ‡´šµŠ­™·˜· ‹Îµœªœ 4 ‡¼n ‡º° „¨»¤n „µ¦š—¨°Š¦¼ ž£µ¡Ä®œo µ»‡‡¨š¸É¤¸ºÉ°Á­¸¥ŠÂ˜„˜nµŠ„´„¨»¤n „µ¦š—¨°Š
¦¼ ž£µ¡Ÿ¨Å¤o Mean Difference = 13.088, Sig. = 0.000), „¨»¤n „µ¦š—¨°Š¦¼ ž£µ¡Ä®œo µ»‡‡¨š¸É¤¸ºÉ°Á­¸¥Š
˜„˜nµŠ„´„¨»¤n „µ¦š—¨°Š¦¼ ž£µ¡œµ¤›¦¦¤ Mean Difference = 9.623, Sig. = 0.004), „¨»¤n „µ¦š—¨°Š
¦¼ž£µ¡Ä®œo µ»‡‡¨š´ªÉ ޘ„˜nµŠ„´„¨»¤n „µ¦š—¨°Š¦¼ ž£µ¡Ÿ¨Å¤o Mean Difference = 16.596, Sig. = 0.000)
¨³„¨»¤n „µ¦š—¨°Š¦¼ž£µ¡Ä®œo µ»‡‡¨š´ªÉ ޘ„˜nµŠ„´„¨»¤n „µ¦š—¨°Š¦¼ž£µ¡œµ¤›¦¦¤ Mean Difference =
13.131, Sig. = 0.000)
3. ‹Îµœªœ¦¼ž£µ¡š¸ÉŸo ļ o ­µ¤µ¦™¦³¨¹„Å—o
‹µ„„µ¦ª·Á‡¦µ³®r‡nµ­™·˜· Mauchlyus : = 0.975 ®¦º °‡nµ­™·˜·Å‡­Â‡ª¦r 1.756) ¨³¤¸‡nµ Sig. = 0.882
Ž¹ŠÉ ¤µ„„ªnµ Į= 0.05 ‹¹Š­¦»žÅ—o ªµn ‡nµ‡ªµ¤Âž¦ž¦ªœ…°Š‹Îµœªœ¦¼ž£µ¡š¸ÉŸo ļ o ­µ¤µ¦™¦³¨¹„Å—o Ťn˜„˜nµŠ„´œÂ¨³
‹µ„Ÿ¨„µ¦ª·Á‡¦µ³®r‡nµ­™·˜· F Sphericity Assumed) = 10.549, df. = 3, Mean Square = 17.528 ¨³¤¸‡nµ
Sig. = 0.000 Ž¹ŠÉ œo °¥„ªnµ Į= 0.05 ‹¹Š­¦»žÅ—o ªµn š¸É¦³—´‡ªµ¤ÁºÉ°¤´œÉ 95 Áž°¦r ÁŽÈœ˜ršŠ´ Ê 4 „¨»¤n „µ¦š—¨°Š¤¸‹Îµœªœ
¦¼ ž£µ¡š¸ÉŸo ļ o ­µ¤µ¦™¦³¨¹„Å—o ˜„˜nµŠ„´œ°¥nµŠ¤¸œ¥´ ­Îµ‡´šµŠ­™·˜· ‹Îµœªœ 4 ‡¼n ‡º° „¨»¤n „µ¦š—¨°Š¦¼ ž£µ¡
ĝ®œo µ»‡‡¨š¸É¤¸ºÉ°Á­¸¥ŠÂ˜„˜nµŠ„´„¨»¤n „µ¦š—¨°Š¦¼ ž£µ¡Ä®œo µ»‡‡¨š´ªÉ ŞMean Difference = 0.903, Sig.
= 0.000), „¨»¤n „µ¦š—¨°Š¦¼ ž£µ¡Ä®œo µ»‡‡¨š¸É¤¸ºÉ°Á­¸¥ŠÂ˜„˜nµŠ„´„¨»¤n „µ¦š—¨°Š¦¼ ž£µ¡œµ¤›¦¦¤ Mean
202
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
Difference = 0.750, Sig. = 0.010), „¨»¤n „µ¦š—¨°Š¦¼ ž£µ¡Ä®œo µ»‡‡¨š´ªÉ ޘ„˜nµŠ„´„¨»¤n „µ¦š—¨°Š
¦¼ ž£µ¡Ÿ¨Å¤o Mean Difference = 0.944, Sig. = 0.000) ¨³„¨»¤n „µ¦š—¨°Š¦¼ ž£µ¡Ÿ¨Å¤o ˜„˜nµŠ„´„¨»¤n „µ¦
š—¨°Š¦¼ž£µ¡œµ¤›¦¦¤ Mean Difference = 0.792, Sig. = 0.002)
4. ‡ªµ¤¡¹Š¡°Ä‹…°ŠŸ¼očo
ž¦³µ„¦Â¨³„¨»¤n ˜´ª°¥nµŠ¤¸‡ªµ¤¡¹Š¡°Ä‹˜n°¦¼ ž£µ¡Ÿ¨Å¤o Mean = 3.444, S.D. = 0.767), ¦¼ ž£µ¡
ĝ®œo µ»‡‡¨š¸É¤¸ºÉ°Á­¸¥Š Mean = 3.236, S.D. = 0.999), ¦¼ž£µ¡œµ¤›¦¦¤ Mean = 2.236, S.D. = 0.986) ¨³
¦¼ ž£µ¡Ä®œo µ»‡‡¨š´ªÉ ŞMean = 1.847, S.D. = 0.767) ˜µ¤¨Îµ—´œ°„‹µ„œ¸ ʟ¨„µ¦­Îµ¦ª‹¥´Š¡ªnµ ‹Îµœªœ
¦¼ž£µ¡š¸ÉŸo ļ o Šµœ¤¸‡ªµ¤¡¹Š¡°Ä‹¤µ„š¸É­—» ¤¸‡µn ÁŒ¨¸¥É 3.611 ¦¼ž
˜µ¦µŠš¸É 1­¦» žŸ¨„µ¦š—¨°Š
¦¼ž£µ¡
¦¼ ž£µ¡
¦¼ ž£µ¡
ĝ®œo µ»‡‡¨
ĝ®œo µ
Ÿ¨Å¤o
š¸É¤¸É °º Á­¸¥Š »‡‡¨š´ÉªÅž
15.665
16.719
15.861
14.268
­nªœÁ¸É¥ŠÁœ
¤µ˜¦“µœ S.D.)
7.555
9.401
8.856
7.378
Áª¨µÁŒ¨¸É¥
42.912
46.419
29.823
33.288
­nªœÁ¸É¥ŠÁœ
¤µ˜¦“µœ S.D.)
21.727
23.627
13.416
15.367
‡³ÂœœÁŒ¨¸É¥ ‫) ݔ‬
4.75
3.85
4.79
4
Áž°¦r ÁŽÈœ˜r‡ªµ¤
™¼„˜o °Š
79.17
64.17
79.83
66.67
­nªœÁ¸É¥ŠÁœ
¤µ˜¦“µœ S.D.)
1.766
2.18
1.883
1.993
‡ªµ¤¡¹Š¡°Ä‹ÁŒ¨¸É¥
3.236
1.847
3.444
2.236
0.999
0.898
0.767
0.986
ž¦³Á£š…°Š¦¼ ž£µ¡
Áª¨µš¸Éčo Ĝ„µ¦‹Îµ¦¼ž£µ¡Â¨³
˜ÎµÂ®œnŠ…°Š¦¼ž£µ¡œ˜µ¦µŠ„¦·—
Áª¨µš¸Éčo Ĝ„µ¦¦³¨¹„¦¼ž£µ¡Â¨³
˜ÎµÂ®œnŠ
‹Îµœªœ¦¼ž£µ¡š¸ÉŸo ļ o ­µ¤µ¦™
¦³¨¹„Å—o
‡ªµ¤¡¹Š¡°Ä‹…°ŠŸ¼očo
Áª¨µÁŒ¨¸É¥
¦¼ž£µ¡
œµ¤›¦¦¤
ª·œµš¸)‫) ݔ‬
ª·œµš¸)‫) ݔ‬
‫) ݔ‬
­nªœÁ¸É¥ŠÁœ
¤µ˜¦“µœ S.D.)
203
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
°£·ž¦µ¥Â¨³­¦» žŸ¨„µ¦ª·‹´¥
ž¦³Á£š…°Š¦¼ ž£µ¡š´ŠÊ 4 ž¦³Á£š Ťn¤¸Ÿ¨˜n°Áª¨µš¸Éčo Ĝ„µ¦‹Îµ¦¼ ž£µ¡Â¨³˜ÎµÂ®œnŠ…°Š¦¼ ž£µ¡œ
˜µ¦µŠ„¦· — ˜n­Šn Ÿ¨˜n°‹Îµœªœ¦¼ž£µ¡Â¨³Áª¨µš¸Éčo Ĝ„µ¦¦³¨¹„¦¼ž£µ¡Â¨³˜ÎµÂ®œnŠÃ—¥Ÿ¼očo ­µ¤µ¦™¦³¨¹„¦¼ ž£µ¡
Ÿ¨Å¤o ŗo ™¼„˜o °Š¤µ„š¸É­—» ¦¼ ž£µ¡Ä®œo µ»‡‡¨š¸É¤¸ºÉ°Á­¸¥Š ¦¼ ž£µ¡œµ¤›¦¦¤ ¨³¦¼ ž£µ¡Ä®œo µ»‡‡¨š´ªÉ Ş
¦°Š¨Š¤µ˜µ¤¨Îµ—´ ¨³Áª¨µš¸Éčo Ĝ„µ¦¦³¨¹„¦¼ ž£µ¡Â¨³˜ÎµÂ®œnŠš¸É—¸š¸É­—» ‡º° ¦¼ ž£µ¡Ÿ¨Å¤o ¦¼ ž£µ¡œµ¤›¦¦¤
¦¼ ž£µ¡Ä®œo µ»‡‡¨š¸É¤¸ºÉ°Á­¸¥ŠÂ¨³¦¼ ž£µ¡Ä®œo µ»‡‡¨š´ªÉ Ş ˜µ¤¨Îµ—´ ‹¹Š­¦» žÅ—o ªnµ¦¼ ž£µ¡š¸É¤¸ž¦³­·š›·£µ¡
„µ¦Äo Šµœ­¼Š­»—‡º°¦¼ ž£µ¡Ÿ¨Å¤o Ž¹ÉŠ…´—Â¥o Š„´Šµœª·‹´¥…°Š Valentine Valentine, 1998) š¸É­¦» žÅ—o ªnµ¤œ»¬¥r
­µ¤µ¦™‹—‹ÎµÂ¨³¦³¨¹„™¹ŠÄ®œo µ…°Š¤œ»¬¥r—oª¥„´œ ŗo —¸„ªnµ¦¼ž£µ¡ž¦³Á£š°ºÉœÇ ˜n‹µ„Ÿ¨„µ¦š—¨°Š¥´Š¡ªnµ
¦¼ž£µ¡Ÿ¨Å¤o ¨³¦¼ž£µ¡œµ¤›¦¦¤Å¤n¤¸‡ªµ¤Â˜„˜nµŠ„´œÄœ—o µœÁª¨µš¸Éčo Ĝ„µ¦¦³¨¹„¦¼ ž£µ¡Â¨³˜ÎµÂ®œnŠ ¨³¥´Š
¤¸Šµœª·‹¥´ š¸É­œ´­œ»œªnµ¦¼ ž£µ¡œµ¤›¦¦¤¤¸ž¦³­·š›·£µ¡—o µœ‡ªµ¤ž¨°—£´¥­¼Š¤µ„ Perrig & Song, 1999) Ž¹ÉŠ
„µ¦¡·­‹¼ œr˜ª´ ˜œ‹³˜o °Š‡Îµœ¹Š™¹Šš´Šž¦³­·
Ê
š›·£µ¡„µ¦Äo ŠµœÂ¨³ž¦³­·š›·£µ¡—o µœ‡ªµ¤ž¨°—£´¥­¼Š ‹¹ŠÁžÈ œÁ¦ºÉ °Šš¸É
‡ª¦«¹„¬µ˜n°ÅžÄœ°œµ‡˜ªnµ ¦¼ ž £µ¡ž¦³Á£šÄ—¤¸ ‡ªµ¤Á®¤µ³­¤­Îµ®¦´ „µ¦œÎµ Ş­¦o µŠ¦®´­Ÿnµœ¦¼ ž£µ¡š¸É ¤¸
ž¦³­·š›·£µ¡„µ¦Äo ŠµœÂ¨³ž¦³­·š›·£µ¡—o µœ‡ªµ¤ž¨°—£´¥­¼Š­»—
¦¦–µœ»„¦¤
Á„¦¸ ¥ŠÅ„¦ ¤³ÃœÄ‹, &–´“›œœšr ®Š­rª¦· š›·Í›¦. 2556). °·š›·¡¨…°Š¦¼ žÂ„¦· —¨³¦¼ žÂ£µ¡š¸É¤¸˜n°„µ¦‹—‹Îµ
¦¼ž£µ¡.Paper presented at the „µ¦ž¦³»¤ª·µ„µ¦Á­œ°Ÿ¨Šµœª·‹¥´ ¦³—´´–”·˜«¹„¬µÂ®nŠµ˜·‡¦´ŠÊ š¸É
29 – ¤®µª·š¥µ¨´¥Â¤n¢oµ®¨ªŠ¦³®ªnµŠª´œš¸É 24-25 ˜»¨µ‡¤ 2556, ®œo µ 453-461.
Á‹¦·  ˜»¨¥r¦µ´œ´¥, &–´“›œœšr ®Š­rª¦· š›·Í›¦. 2556). „µ¦«¹„¬µ‹Îµœªœ£µ¡š¸É¦³¨¹„Å—o š¸É¤¸„µ¦Â­—Š£µ¡ÂÁ¦¸ ¥Š
™ªÂ¨³Â˜µ¦µŠ.Paper presented at the „µ¦ž¦³»¤ª·µ„µ¦Á­œ°Ÿ¨Šµœª·‹¥´ ¦³—´´–”·˜«¹„¬µ
®nŠµ˜·‡¦´ŠÊ š¸É 29 – ¤®µª·š¥µ¨´¥Â¤n¢oµ®¨ªŠ¦³®ªnµŠª´œš¸É 24-25 ˜»¨µ‡¤ 2556, ®œo µ 472-480.
ª´¦· œš¦r ¤›»¦­¡Š«r¡œ´ ›r, &–´“›œœšr ®Š­rª¦· š›·Í›¦. 2556). „µ¦«¹„¬µž´ ‹‹´¥š¸É¤¸°·š›·¡¨˜n°„µ¦Äo ŠµœÅ—o ¨³‡ªµ¤
ž¨°—£´¥…°Š¦®´­ŸnµœÂ„µ¦r ˜¼œ. ªµ¦­µ¦Áš‡ÃœÃ¨¥¸­µ¦­œÁš«ž¸ š¸É 9¤„¦µ‡¤ - ¤·™»œµ¥œ,Œ´š¸É 1,
®œo µ 24-33, 1, 24-33.
°œ»¡Š«r °›·„ªŠ«rª·ª•
´ œr, &–´“›œœšr ®Š­rª¦· š›·Í›¦. 2556). Á·Š­Îµ¦ª‹™¹Šž´ ‹‹´¥Äœ„µ¦°°„¦®´­Ÿnµœ¦¼ ž£µ¡
„¦· —.Paper presented at the „µ¦ž¦³»¤ª·µ„µ¦Á­œ°Ÿ¨Šµœª·‹¥´ ¦³—´´–”·˜«¹„¬µÂ®nŠµ˜·‡¦´ŠÊ
š¸É 29 – ¤®µª·š¥µ¨´¥Â¤n¢oµ®¨ªŠ¦³®ªnµŠª´œš¸É 24-25 ˜»¨µ‡¤ 2556, ®œo µ 462-471.
Adams, A., & Sasse, M. A. 1999). 8sers are not the enemy. Communications of the ACM, 4212), 4046.
Akula, S., & Devisetty, V. 2004). Image based registration and authentication system. Paper presented
at the Proceedings of Midwest Instruction and Computing Symposium.
Birget, J.-C., Hong, D., & Memon, N. D. 2003). Robust discretization, with an application to graphical
passwords. IACR Cryptology ePrint Archive, 2003, 168.
Blonder, *. E. 1996). *raphical password *oogle Patents.
Boynton, R., & Boss, D. 1971). The effect of background luminance and contrast upon visual search
performance. Illuminating Engineering, 664), 173.
204
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
Brostoff, S., & Sasse, M. A. 2000). Are Passfaces more usable than passwords" A field trial
investigation People and Computers XIV—Usability or Else! pp. 405-424) Springer.
Davis, D., Monrose, F., & Reiter, M. K. 2004). On User Choice in Graphical Password Schemes. Paper
presented at the USENIX Security Symposium.
Dhamija, R., & Perrig, A. 2000). Deja Vu-A User Study: Using Images for Authentication. Paper
presented at the USENIX Security Symposium.
Dirik, A. E., Memon, N., & Birget, J.-C. 2007). Modeling user choice in the PassPoints graphical
password scheme. Paper presented at the Proceedings of the 3rd symposium on Usable
privacy and security.
Dunphy, P., Nicholson, J., & 2livier, P. 2008). Securing passfaces for description. Paper presented at
the Proceedings of the 4th symposium on Usable privacy and security.
Dunphy, P., & <an, J. 2007). Do background images improve Draw a Secret graphical passwords?
Paper presented at the Proceedings of the 14th ACM conference on Computer and
communications security.
Hafiz, M. D., Abdullah, A. H., Ithnin, N., & Mammi, H. K. 2008). Towards identifying usability and
security features of graphical password in knowledge based authentication technique. Paper
presented at the Modeling & Simulation, 2008. AICMS 08. Second Asia International
Conference on.
Hayashi, E., Dhamija, R., Christin, N., & Perrig, A. 2008). Use your illusion: secure authentication
usable anywhere. Paper presented at the Proceedings of the 4th symposium on Usable
privacy and security.
Hinds, C., & Ekwueme, C. 2007). Increasing security and usability of computer systems with
graphical passwords. Paper presented at the Proceedings of the 45th annual southeast
regional conference.
Hong, D., Man, S., Hawes, B., & Matthews, M. M. 2004). A Graphical Password Scheme Strongly
Resistant to Spyware. Paper presented at the Security and Management.
Jansen, :. A., *avrila, S., Korolev, V., Ayers, R., & Swanstrom, R. 2003). Picture password: a visual
login technique for mobile devices US Department of Commerce, National Institute of
Standards and Technology.
Jermyn, I., Mayer, A. J., Monrose, F., Reiter, M. K., & Rubin, A. D. 1999). The Design and Analysis of
Graphical Passwords. Paper presented at the Usenix Security.
Kotadia, M. 2005). Microsoft :rite down your passwords. ZDNet Australia, May, 23.
Kumar, V., *upta, M., Chaturvedi, A., Bhardwaj, A., & Singh, M. P. 2009). Click to Zoom-Inside
Graphical Authentication. Paper presented at the Digital Image Processing, 2009 International
Conference on.
205
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
Kumari, S., & 2beroi, R. K. 2014). Defense against Shoulder Surfing Attack for Recognition Based
*raphical Password. International Journal of Engineering And Computer Science, 37), 73847387.
Man, Hong, D., & Mathews, M. 2003). A shoulder- surfing resistant graphical password scheme . .
Paper presented at the International conference on security and management, Las Vegas, NV.
mbH, S. *. f. D. 2005). User Manual visKey. Cologne, *ermany.
Passlogix. 2005). Retrieved August 1, 2013, httpwww.passlogix.com
Patrick, A., Long, A. C., & Flinn, S. 2003). HCI and security systems.
Perrig, A., & Song, D. 1999). Hash Visualization a New Technique to improve Real-:orld Security.
Proceedings of the 1999 International Workshop on Cryptographic Techniques and ECommerce, 131-138.
RealUser. 2005). Retrieved March 7, 2012, httpwww.realuser.com
Reynolds, R. E., :hite, R. M., & Hilgendorf, R. L. 1972). Detection and recognition of colored signal
lights. Human Factors: The Journal of the Human Factors and Ergonomics Society, 143),
227-236.
Sfr. 2005). Retrieved March 7, 2012. httpwww.viskey.comtech.html
Shepard, R. N. 1967). Recognition memory for words, sentences, and pictures. Journal of verbal
Learning and verbal Behavior, 61), 156-163.
Sobrado, L., & Birget, J.-C. 2002). *raphical passwords. The Rutgers Scholar, an electronic Bulletin
for undergraduate research, 4, 2002.
Stobert, E., Forget, A., Chiasson, S., van 2orschot, P. C., & Biddle, R. 2010). Exploring usability effects
of increasing security in click-based graphical passwords. Paper presented at the
Proceedings of the 26th Annual Computer Security Applications Conference.
Suo, X., =hu, <., & 2wen, *. S. 2005). Graphical passwords: A survey. Paper presented at the
Computer security applications conference, 21st annual.
Syukri, A. F., 2kamoto, E., & Mambo, M. 1998). A user identification system using signature written
with mouse. Paper presented at the Information Security and Privacy.
Takada, T., & Koike, H. 2003). Awase-E Image-based authentication for mobile phones using user’s
favorite images Human-computer interaction with mobile devices and services pp. 347-351)
Springer.
Tao, H., & Adams, C. 2008). Pass-*o A Proposal to Improve the Usability of *raphical Passwords. IJ
Network Security, 72), 273-292.
Thorpe, J., & Van 2orschot, P. 2004). Towards secure design choices for implementing graphical
passwords. Paper presented at the Computer Security Applications Conference, 2004. 20th
Annual.
Towhidi, F., & Masrom, M. 2009). A Survey on Recognition Based *raphical User Authentication
Algorithms. arXiv preprint arXiv:0912.0942.
206
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015
Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th)
Towhidi, F., Masrom, M., & Manaf, A. A. 2013). An enhancement on passface graphical password
authentication. TextRoad Publication.
Valentine, T. 1998). An evaluation of the Passface personal authentication system Technical Report,
*oldsmiths College, University of London.
van Oorschot, P. C., & Thorpe, J. 2005). On the security of graphical password schemes Technical
Report TR-05-11. Integration and extension of USENIX Security 2004 and ACSAC 2004
papers.
:einshall, D., & Kirkpatrick, S. 2004). Passwords you'll never forget, but can't recall. Paper presented
at the CHI
04 extended abstracts on Human factors in computing systems.
:iedenbeck, S., :aters, J., Birget, J.-c., Brodskiy, A., & Memon, N. 2005a). PassPoints Design and
longitudinal evaluation of a graphical password system. International Journal of Human
Computer Studies, (Special Issue on HCI Research in Privacy and Security)63), 102-127.
:iedenbeck, S., :aters, J., Birget, J.-C., Brodskiy, A., & Memon, N. 2005b). PassPoints Design and
longitudinal evaluation of a graphical password system. International Journal of HumanComputer Studies, 631), 102-127.
:iedenbeck, S., :aters, J., Sobrado, L., & Birget, J.-C. 2006). Design and evaluation of a shouldersurfing resistant graphical password scheme. Paper presented at the Proceedings of the
working conference on Advanced visual interfaces.
:illiams, L. 1966). The effect of target specification on objects fixated during visual search. Perception
& Psychophysics, 19), 315-318.
207
Fly UP