J 2024

Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction

KRUŽÍKOVÁ, Agáta, Michal MUŽÍK, Lenka KNAPOVÁ, Lenka DĚDKOVÁ, David ŠMAHEL et. al.

Basic information

Original name

Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction

Authors

KRUŽÍKOVÁ, Agáta (203 Czech Republic, belonging to the institution), Michal MUŽÍK (203 Czech Republic, belonging to the institution), Lenka KNAPOVÁ (203 Czech Republic, belonging to the institution), Lenka DĚDKOVÁ (203 Czech Republic, belonging to the institution), David ŠMAHEL (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution)

Edition

Computers & Security, 2024, 0167-4048

Other information

Language

English

Type of outcome

Článek v odborném periodiku

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

United Kingdom of Great Britain and Northern Ireland

Confidentiality degree

není předmětem státního či obchodního tajemství

References:

Impact factor

Impact factor: 5.600 in 2022

Organization unit

Faculty of Informatics

UT WoS

001142782500001

Keywords in English

authentication; efficiency; satisfaction; security; usability; usable security

Tags

International impact, Reviewed
Změněno: 9/10/2024 12:17, prof. RNDr. Václav Matyáš, M.Sc., Ph.D.

Abstract

V originále

Usability is a crucial aspect that increases the willingness to adopt more demanding two-factor authentication (2FA) methods. There is little knowledge about the role of efficiency (i.e., task completion time) in the perception of 2FA. This paper aims to understand how objective and subjective efficiency influence the usability and security perception of two token-based authentication methods. We conducted a user study with 337 smartphone users aged 26-81. Participants worked with two token-based authentication methods: a near-field communication (NFC) token and a payment card with a card reader. Path analysis showed that task completion time is predicted by age, gender, and the length of smartphone and e-banking use. Participants who were satisfied with application aesthetics were also satisfied with the time it took them to complete the tasks. For the NFC token, men were more satisfied with their task completion time. In the case of the card reader, participants who were more satisfied with their efficiency were also more satisfied with the method and perceived it as more secure. Our results indicate that satisfaction with the time spent on the authentication task is more important for a positive perception of the authentication methods than the objective completion time. Despite the potential time consumption of the 2FA methods, users might be satisfied with the methods in terms of usability and security, especially for highly valued accounts.

Links

MUNI/A/1586/2023, interní kód MU
Name: Aplikovaný výzkum na FI: Forenzní aspekty kritických infrastruktur, aplikovaná kryptografie, kyberbezpečnostní cvičení, algoritmy plánování v logistice a pro zpracování dat z fyzikálních sensorů
Investor: Masaryk University, Applied research at FI: Forensic aspects of critical infrastructures, applied cryptography, cybersecurity trainings, scheduling algorithms logistics and algorithms for physical sensors
TL01000207, research and development project
Name: Inovace a adaptace autentizačních technologií pro bezpečné digitální prostředí
Investor: Technology Agency of the Czech Republic, Innovation and adaptation of authentication technologies for secure digital environment