2017
DOI: 10.1007/978-3-319-58460-7_18
|View full text |Cite
|
Sign up to set email alerts
|

“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 35 publications
3
16
0
Order By: Relevance
“…A representative sample (n = 158) of users responded; 17 (11%) aged [under 18], 52 (33%) aged [18][19][20][21][22][23][24], 54 (34%) aged [25][26][27][28][29][30][31][32][33][34][35][36][37][38][39] Results presented in this study are considered statistically significant since clear differences in detection rates between the four tested scenarios are demonstrated within each technical knowledge group: Novice (p < 0.001), Intermediate (p < 0.001), Advanced (p < 0.001) and Expert (p < 0.05) (see Table 1).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…A representative sample (n = 158) of users responded; 17 (11%) aged [under 18], 52 (33%) aged [18][19][20][21][22][23][24], 54 (34%) aged [25][26][27][28][29][30][31][32][33][34][35][36][37][38][39] Results presented in this study are considered statistically significant since clear differences in detection rates between the four tested scenarios are demonstrated within each technical knowledge group: Novice (p < 0.001), Intermediate (p < 0.001), Advanced (p < 0.001) and Expert (p < 0.05) (see Table 1).…”
Section: Resultsmentioning
confidence: 99%
“…Authentication plays a vital role in user security. Eight authentication technologies were compared in [19] to assess which method(s) participants preferred, and how they perceived security relating to each. A variety of methodologies were presented namely, text password, graphical password, iris scan, facial recognition, ear shape, gesture, fingerprint, and speech, and participants instructed to use a selection of the authentication technologies to log into a system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Currently, the framework aims for a high level of objectivity in the rating of authentication schemes. Still, research shows that subjective user perceptions of authentication schemes can differ from objective or technical features (Bhagavatula et al, 2015;Ur et al, 2015;Zimmermann and Gerber, 2017). Subjective perceptions, e.g.…”
Section: Frameworkmentioning
confidence: 99%
“…In 2017, Zimmermann and Geber [42] surveyed the user interaction with different authentication schemes (biometric and nonbiometric) to understand the users' perception and preferences. Thirty five participants were enrolled in the experiment and were asked to authenticate themselves using eight different technologies (text password, graphical password, gesture recognition, fingerprint recognition, face recognition, iris recognition, speech recognition, and ear shape recognition).…”
Section: E User Acceptance In Biometricsmentioning
confidence: 99%