Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites
-
Published:2023-07-14
Issue:14
Volume:15
Page:11043
-
ISSN:2071-1050
-
Container-title:Sustainability
-
language:en
-
Short-container-title:Sustainability
Author:
Albesher Abdulmohsen Saud1ORCID
Affiliation:
1. The Department of Information Systems, College of Computer Sciences and Information Technology, King Faisal University, Hofuf 31982, Saudi Arabia
Abstract
A sustainable online environment is essential to protecting businesses from abuse and data breaches. To protect sustainability, websites’ authentication procedures should continuously keep up with new technologies and the ways in which these technologies are used. Thus, a continuous assessment of these authentication procedures is required to ensure their usability. This research aimed to compare the status of the sign-up, sign-in, and password recovery processes on 20 websites. The researcher checked every website in a separate session and used the “think-aloud” technique while recording the screen to ensure accurate data analysis. Specific items were checked during every session to detect the similarities and differences between the tested websites in their authentication processes. The results led to valuable discussions and recommendations for improving authentication procedures. Some of these recommendations include best practices for better design of password rules, determining when two-factor authentication should be compulsory, and understanding how to improve password reset processes and keep accounts secure.
Funder
The Deputyship for Research and Innovation, Ministry of Education in Saudi Arabia
Subject
Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development,Building and Construction
Reference116 articles.
1. Florencio, D., and Herley, C. (2007, January 12–14). A large-scale study of web password habits. Proceedings of the 16th International Conference on World Wide Web, Banff, AB, Canada. 2. Abdrabou, Y., Schütte, J., Shams, A., Pfeuffer, K., Buschek, D., Khamis, M., and Alt, F. (May, January 29). “Your Eyes Tell You Have Used This Password Before”: Identifying Password Reuse from Gaze and Keystroke Dynamics. Proceedings of the CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA. 3. Albesher, A.S., and Alhussain, T. (2013, January 11–12). Privacy and security issues in social networks: An evaluation of Facebook. Proceedings of the 2013 International Conference on Information Systems and Design of Communication, Lisbon, Portugal. 4. Evaluating and Comparing the Usability of Privacy in WhatsApp, Twitter, and Snapchat;Albesher;IJACSA,2021 5. Mehdi Khosrow-Pour, D.B.A. (2018). Encyclopedia of Information Science and Technology, IGI Global. [4th ed.].
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Systematic Approach to Measure Usability and Security Trade-off;2024 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA);2024-05-23
|
|