Picture map of Europe with pins indicating European capital cities

Open Access research with a European policy impact...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by Strathclyde researchers, including by researchers from the European Policies Research Centre (EPRC).

EPRC is a leading institute in Europe for comparative research on public policy, with a particular focus on regional development policies. Spanning 30 European countries, EPRC research programmes have a strong emphasis on applied research and knowledge exchange, including the provision of policy advice to EU institutions and national and sub-national government authorities throughout Europe.

Explore research outputs by the European Policies Research Centre...

Exploring user perceptions of authentication scheme security

Nosseir, A. and Terzis, Sortirios (2013) Exploring user perceptions of authentication scheme security. In: Symposium on Usable Privacy and Security, 2013-07-24 - 2013-07-26, Northumbria University.

[img]
Preview
PDF (Nosseir-Terzis-SOUPS2013-user-perceptions-of-authentication-scheme-security)
Nosseir_Terzis_SOUPS2013_user_perceptions_of_authentication_scheme_security.pdf - Accepted Author Manuscript

Download (160kB) | Preview

Abstract

Despite researchers' efforts authentication remains a challenge, as demonstrated by the prevalent use of passwords in spite of their usability and security problems. Although alternatives have been suggested addressing these problems, they have failed to gain wide acceptance. It is now recognized that a more comprehensive investigation of authentication schemes is necessary to address the challenge. Research has shown that end-user perceptions and attitudes play a major role in the acceptance of new technologies. However, they have received limited attention in the context of authentication. Studies suggest that authentication schemes are distinct enough to require consideration of a different set of factors, like the perception of their security. They have also shown that the relationship between perceived security and acceptance is not linear, i.e. up to a certain level of security increases the acceptability of a scheme, but beyond that higher levels of security undermine it. As a higher level of security typically requires increased user effort, it would seem that a scheme that is perceived too easy to use may not be acceptable by users. From the above, it is clear that studying the perception of their security is an important aspect of a comprehensive investigation of authentication schemes. In this context, we conducted a first study of how users perceive the security of five authentication schemes.