Zimmermann, Verena ; Gerber, Paul ; Stöver, Alina (2022)
That Depends -- Assessing User Perceptions of Authentication Schemes across Contexts of Use.
doi: 10.48550/arXiv.2209.13958
Report, Bibliographie
Abstract
Choosing authentication schemes for a specific purpose is challenging for service providers, developers, and researchers. Previous ratings of technical and objective aspects showed that available schemes all have strengths and limitations. Yet, the security of authentication also relies on user perceptions which affect acceptance and user behaviour and can deviate from technical aspects. To shine light on the issue and support researchers, developers, and service-providers confronted with authentication choice, we conducted an in-depth analysis of user perceptions of the password, fingerprint, and a smartphone-based scheme in an online study with 201 participants. As authentication is a secondary task that needs to be evaluated in the context of authentication purpose, we also compared perceptions across four contexts of use with varying sensitivity levels: email accounts, online banking, social networks, and smart homes. The results revealed how perceptions of usability, security, privacy, trust, effort, and qualitative features of the schemes are related to user preferences. The results increase awareness for the influence of subjective perceptions and have practical implications for decision-makers. They can inform a) the choice between several adequate schemes, b) the authentication design to reduce concerns or security-related misconceptions, and c) the development of context-dependent authentication.
Item Type: | Report |
---|---|
Erschienen: | 2022 |
Creators: | Zimmermann, Verena ; Gerber, Paul ; Stöver, Alina |
Type of entry: | Bibliographie |
Title: | That Depends -- Assessing User Perceptions of Authentication Schemes across Contexts of Use |
Language: | English |
Date: | 28 September 2022 |
Publisher: | arXiv |
Series: | Human-Computer Interaction |
Collation: | 22 pages, 5 figures, 8 tables, Supplementary Material |
DOI: | 10.48550/arXiv.2209.13958 |
URL / URN: | https://arxiv.org/abs/2209.13958 |
Abstract: | Choosing authentication schemes for a specific purpose is challenging for service providers, developers, and researchers. Previous ratings of technical and objective aspects showed that available schemes all have strengths and limitations. Yet, the security of authentication also relies on user perceptions which affect acceptance and user behaviour and can deviate from technical aspects. To shine light on the issue and support researchers, developers, and service-providers confronted with authentication choice, we conducted an in-depth analysis of user perceptions of the password, fingerprint, and a smartphone-based scheme in an online study with 201 participants. As authentication is a secondary task that needs to be evaluated in the context of authentication purpose, we also compared perceptions across four contexts of use with varying sensitivity levels: email accounts, online banking, social networks, and smart homes. The results revealed how perceptions of usability, security, privacy, trust, effort, and qualitative features of the schemes are related to user preferences. The results increase awareness for the influence of subjective perceptions and have practical implications for decision-makers. They can inform a) the choice between several adequate schemes, b) the authentication design to reduce concerns or security-related misconceptions, and c) the development of context-dependent authentication. |
Additional Information: | Preprint |
Divisions: | DFG-Graduiertenkollegs DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users |
Date Deposited: | 29 Mar 2023 08:23 |
Last Modified: | 22 Jul 2024 12:11 |
PPN: | 50977959X |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Send an inquiry |
Options (only for editors)
Show editorial Details |