Abstract
Purpose
This paper aims to address the user perspective about usability, security and use of five authentication schemes (text and graphical passwords, biometrics and hardware tokens) from a population not covered previously in the literature. Additionally, this paper explores the criteria users apply in creating their text passwords.
Design/methodology/approach
An online survey study was performed in spring 2019 with university students in Mexico and Bosnia and Herzegovina. A total of 197 responses were collected.
Findings
Fingerprint-based authentication was most frequently perceived as usable and secure. However, text passwords were the predominantly used method for unlocking computer devices. The participants preferred to apply personal criteria for creating text passwords, which, interestingly, coincided with the general password guidelines, e.g. length, combining letters and special characters.
Originality/value
Research on young adults’ perceptions of different authentication methods is driven by the increasing frequency and sophistication of security breaches, as well as their significant consequences. This study provided insight into the commonly used authentication methods among youth from two geographic locations, which have not been accounted for previously.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems
Reference40 articles.
1. Factors influencing password reuse: a case study,2018
2. Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: a contemporary survey;IEEE Internet of Things Journal,2020
3. Continuous and transparent multimodal authentication: reviewing the state of the art;Cluster Computing,2016
4. The effects of gender differences in the acceptance of biometrics authentication systems within online transaction,2009
5. Encouraging password manager adoption by meeting adopter self-determination needs,2019
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fingerprint forgery training: Easy to learn, hard to perform;Proceedings of the 18th International Conference on Availability, Reliability and Security;2023-08-29