Skip to main content
Top

2022 | OriginalPaper | Chapter

A Preliminary Investigation of Authentication of Choice in Health-Related Mobile Applications

Authors : Oluwadamilola Arinde, Jinjuan Feng, Ziying Tang

Published in: HCI for Cybersecurity, Privacy and Trust

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

User authentication is a security measure that involves authenticating the identity claimed by a user before granting access to a system or an application. Even though there are numerous studies that examined users’ experiences with a variety of authentication methods, very few have focused on the approach of granting users the freedom to select one or more authentication methods of their own choice. Initial work in this area suggested that the ‘Authentication of Choice” (AoC) approach has the potential to serve as a usable and secure authentication solution on mobile devices. However, the studies only evaluated the AoC approach on the Android platform when users executed tasks with low security and privacy concerns. To address this gap, we investigated the ‘Authentication of Choice’ approach in mobile health apps that potentially involve more sensitive information. An online longitudinal study was conducted with 30 participants to assess three authentication processes. The result of the study provides insight into how users interact with and perceive the AoC approach in the context of mobile health apps.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Oluwafemi, J., Feng, J.: How users perceive authentication of choice on mobile devices. In: 13th International Conference on Advances in Computer-Human Interactions. pp. 345–351. ACHI, Spain (2020) Oluwafemi, J., Feng, J.: How users perceive authentication of choice on mobile devices. In: 13th International Conference on Advances in Computer-Human Interactions. pp. 345–351. ACHI, Spain (2020)
2.
go back to reference Nilesh, A., Salendra, P., Mohammed, F.: A review of authentication methods. IJSTR 5(11), 246–249 (2016) Nilesh, A., Salendra, P., Mohammed, F.: A review of authentication methods. IJSTR 5(11), 246–249 (2016)
3.
go back to reference Lampson, B.: Computer security in the real world. IEEE Comput. 37(6), 37–46 (2004)CrossRef Lampson, B.: Computer security in the real world. IEEE Comput. 37(6), 37–46 (2004)CrossRef
6.
go back to reference Madhuravani, B., Reddy, P., LalithSamanthReddy, P.: A comprehensive study on different authentication factors. IJERT 2(10), 1358–1361 (2013) Madhuravani, B., Reddy, P., LalithSamanthReddy, P.: A comprehensive study on different authentication factors. IJERT 2(10), 1358–1361 (2013)
7.
go back to reference Gunson, N., Marshall, D., Morton, H., Jack, M.: User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Comput. Secur. 30, 208–220 (2011)CrossRef Gunson, N., Marshall, D., Morton, H., Jack, M.: User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Comput. Secur. 30, 208–220 (2011)CrossRef
8.
go back to reference Riley, C., Buckner, K., Johnson, G., Benyon, D.: Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI Soc. 24(3), 295–306 (2009)CrossRef Riley, C., Buckner, K., Johnson, G., Benyon, D.: Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI Soc. 24(3), 295–306 (2009)CrossRef
10.
go back to reference Das, S., Dingman, A., Camp, L.: Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key. In: International Conference on Financial Cryptography and Data Security (FC). (2018) Das, S., Dingman, A., Camp, L.: Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key. In: International Conference on Financial Cryptography and Data Security (FC). (2018)
12.
go back to reference Raja K.B., Raghavendra R., Stokkenes M., Busch M.: Multi-modal authentication system for smartphones using face, iris, and periocular. In: Biometrics (ICB). In: 2015 International Conference on, IEEE. pp. 143–150 (2015) Raja K.B., Raghavendra R., Stokkenes M., Busch M.: Multi-modal authentication system for smartphones using face, iris, and periocular. In: Biometrics (ICB). In: 2015 International Conference on, IEEE. pp. 143–150 (2015)
14.
go back to reference Vance, C., Paik, Y.: Forms of host-country national learning for enhanced MNC absorptive capacity. J. Manag. Psychol. 20(7), 590–606 (2005)CrossRef Vance, C., Paik, Y.: Forms of host-country national learning for enhanced MNC absorptive capacity. J. Manag. Psychol. 20(7), 590–606 (2005)CrossRef
15.
go back to reference Fairweather, P., Hanson, V., Detweiler, S., Schwerdtfeger, R.: From assistive technology to a web accessibility service. In: International Conference on Assistive Technologies (ASSETS). ACM. (2002) Fairweather, P., Hanson, V., Detweiler, S., Schwerdtfeger, R.: From assistive technology to a web accessibility service. In: International Conference on Assistive Technologies (ASSETS). ACM. (2002)
16.
go back to reference Belk, M., Fidas, C., Germanakos, P., Samaras, G.: Security for diversity: studying the effects of verbal and imagery processes on user authentication mechanisms. In: Proceedings of the IFIP TC13 Conference on Human-Computer Interaction. pp. 442–459. South Africa (2013) Belk, M., Fidas, C., Germanakos, P., Samaras, G.: Security for diversity: studying the effects of verbal and imagery processes on user authentication mechanisms. In: Proceedings of the IFIP TC13 Conference on Human-Computer Interaction. pp. 442–459. South Africa (2013)
Metadata
Title
A Preliminary Investigation of Authentication of Choice in Health-Related Mobile Applications
Authors
Oluwadamilola Arinde
Jinjuan Feng
Ziying Tang
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-05563-8_15