Picture of athlete cycling

Open Access research with a real impact on health...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by Strathclyde researchers, including by researchers from the Physical Activity for Health Group based within the School of Psychological Sciences & Health. Research here seeks to better understand how and why physical activity improves health, gain a better understanding of the amount, intensity, and type of physical activity needed for health benefits, and evaluate the effect of interventions to promote physical activity.

Explore open research content by Physical Activity for Health...

Exploring user perceptions of authentication scheme security

Nosseir, A. and Terzis, Sortirios (2013) Exploring user perceptions of authentication scheme security. In: Symposium on Usable Privacy and Security, 2013-07-24 - 2013-07-26, Northumbria University.

[img]
Preview
PDF (Nosseir-Terzis-SOUPS2013-user-perceptions-of-authentication-scheme-security)
Nosseir_Terzis_SOUPS2013_user_perceptions_of_authentication_scheme_security.pdf - Accepted Author Manuscript

Download (160kB) | Preview

Abstract

Despite researchers' efforts authentication remains a challenge, as demonstrated by the prevalent use of passwords in spite of their usability and security problems. Although alternatives have been suggested addressing these problems, they have failed to gain wide acceptance. It is now recognized that a more comprehensive investigation of authentication schemes is necessary to address the challenge. Research has shown that end-user perceptions and attitudes play a major role in the acceptance of new technologies. However, they have received limited attention in the context of authentication. Studies suggest that authentication schemes are distinct enough to require consideration of a different set of factors, like the perception of their security. They have also shown that the relationship between perceived security and acceptance is not linear, i.e. up to a certain level of security increases the acceptability of a scheme, but beyond that higher levels of security undermine it. As a higher level of security typically requires increased user effort, it would seem that a scheme that is perceived too easy to use may not be acceptable by users. From the above, it is clear that studying the perception of their security is an important aspect of a comprehensive investigation of authentication schemes. In this context, we conducted a first study of how users perceive the security of five authentication schemes.