Hadžidedić, Sunčica (2022) 'User perceptions and use of authentication methods: Insights from youth in Mexico and Bosnia and Herzegovina.', Information and Computer Security, 30 (4). pp. 615-632.
Purpose: This paper aimed to address the user perspective about usability, security and use of five authentication schemes (text and graphical passwords, biometrics, and hardware tokens) from a population not covered previously in the literature. Additionally, we explored the criteria users apply in creating their text passwords. Methodology: An online survey study was performed in spring 2019 with university students in Mexico and Bosnia and Herzegovina. 197 responses were collected. Findings: Fingerprint-based authentication was perceived as usable and secure the most frequently. However, text passwords were the predominantly used method for unlocking computer devices. Our participants preferred to apply personal criteria for creating text passwords, which, interestingly, coincided with the general password guidelines, e.g., length, combining letters and special characters. Originality: Research on young adults’ perceptions of different authentication methods is driven by the increasing frequency and sophistication of security breaches, as well as their significant consequences. This study provided insight into the commonly used authentication methods among youth from two geographic locations, which have not been accounted for previously.
|Full text:||(AM) Accepted Manuscript|
Available under License - Creative Commons Attribution Non-commercial 4.0.
Download PDF (1187Kb)
|Publisher Web site:||https://doi.org/10.1108/ICS-07-2021-0105|
|Publisher statement:||This author accepted manuscript is deposited under a Creative Commons Attribution Non-commercial 4.0 International (CC BY-NC) licence. This means that anyone may distribute, adapt, and build upon the work for non-commercial purposes, subject to full attribution. If you wish to use this manuscript for commercial purposes, please contact email@example.com|
|Date accepted:||16 February 2022|
|Date deposited:||23 February 2022|
|Date of first online publication:||18 March 2022|
|Date first made open access:||31 March 2022|
Save or Share this output
|Look up in GoogleScholar|