TU Darmstadt / ULB / TUbiblio

That Depends -- Assessing User Perceptions of Authentication Schemes across Contexts of Use

Zimmermann, Verena ; Gerber, Paul ; Stöver, Alina (2022)
That Depends -- Assessing User Perceptions of Authentication Schemes across Contexts of Use.
doi: 10.48550/arXiv.2209.13958
Report, Bibliographie

Abstract

Choosing authentication schemes for a specific purpose is challenging for service providers, developers, and researchers. Previous ratings of technical and objective aspects showed that available schemes all have strengths and limitations. Yet, the security of authentication also relies on user perceptions which affect acceptance and user behaviour and can deviate from technical aspects. To shine light on the issue and support researchers, developers, and service-providers confronted with authentication choice, we conducted an in-depth analysis of user perceptions of the password, fingerprint, and a smartphone-based scheme in an online study with 201 participants. As authentication is a secondary task that needs to be evaluated in the context of authentication purpose, we also compared perceptions across four contexts of use with varying sensitivity levels: email accounts, online banking, social networks, and smart homes. The results revealed how perceptions of usability, security, privacy, trust, effort, and qualitative features of the schemes are related to user preferences. The results increase awareness for the influence of subjective perceptions and have practical implications for decision-makers. They can inform a) the choice between several adequate schemes, b) the authentication design to reduce concerns or security-related misconceptions, and c) the development of context-dependent authentication.

Item Type: Report
Erschienen: 2022
Creators: Zimmermann, Verena ; Gerber, Paul ; Stöver, Alina
Type of entry: Bibliographie
Title: That Depends -- Assessing User Perceptions of Authentication Schemes across Contexts of Use
Language: English
Date: 28 September 2022
Publisher: arXiv
Series: Human-Computer Interaction
Collation: 22 pages, 5 figures, 8 tables, Supplementary Material
DOI: 10.48550/arXiv.2209.13958
URL / URN: https://arxiv.org/abs/2209.13958
Abstract:

Choosing authentication schemes for a specific purpose is challenging for service providers, developers, and researchers. Previous ratings of technical and objective aspects showed that available schemes all have strengths and limitations. Yet, the security of authentication also relies on user perceptions which affect acceptance and user behaviour and can deviate from technical aspects. To shine light on the issue and support researchers, developers, and service-providers confronted with authentication choice, we conducted an in-depth analysis of user perceptions of the password, fingerprint, and a smartphone-based scheme in an online study with 201 participants. As authentication is a secondary task that needs to be evaluated in the context of authentication purpose, we also compared perceptions across four contexts of use with varying sensitivity levels: email accounts, online banking, social networks, and smart homes. The results revealed how perceptions of usability, security, privacy, trust, effort, and qualitative features of the schemes are related to user preferences. The results increase awareness for the influence of subjective perceptions and have practical implications for decision-makers. They can inform a) the choice between several adequate schemes, b) the authentication design to reduce concerns or security-related misconceptions, and c) the development of context-dependent authentication.

Additional Information:

Preprint

Divisions: DFG-Graduiertenkollegs
DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users
Date Deposited: 29 Mar 2023 08:23
Last Modified: 22 Jul 2024 12:11
PPN: 50977959X
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details