Modern IT systems have a continued requirement for reliable user authentication at login. However, the majority of systems are still using username/password combinations, in spite of a variety of recognised weaknesses. Identifies the need for improved login authentication, and investigates the suitability of two alternative methods, using cognitive questions and an image‐based PIN. The effectiveness of these techniques has already been evaluated in an earlier study, which assessed users' ability to recall the necessary information after a prolonged period of inactivity. Here, the evaluation is focused on the perceived acceptability of the techniques, based upon users' longer‐term opinions arising from a period of regular usage. Discovers that 56 per cent of the participants would support the use of such techniques as a replacement for traditional password or numeric PIN‐based authentication. However, also discovers that some users have the potential to compromise the security of the methods by using them inappropriately. As such, concludes that, although the use of alternative authentication techniques is viable, further research is needed to refine the approaches and identify the best combination of methods across a larger base of users.
Article navigation
1 April 2004
This article was originally published in
Information Management & Computer Security
Research Article|
April 01 2004
A long‐term trial of alternative user authentication technologies Available to Purchase
S.M. Furnell;
S.M. Furnell
Network Research Group, School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK
Search for other works by this author on:
I. Papadopoulos;
I. Papadopoulos
Network Research Group, School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK
Search for other works by this author on:
P. Dowland
P. Dowland
Network Research Group, School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5805
Print ISSN: 0968-5227
© Emerald Group Publishing Limited
2004
Information Management & Computer Security (2004) 12 (2): 178–190.
Citation
Furnell S, Papadopoulos I, Dowland P (2004), "A long‐term trial of alternative user authentication technologies". Information Management & Computer Security, Vol. 12 No. 2 pp. 178–190, doi: https://doi.org/10.1108/09685220410530816
Download citation file:
264
Views
Suggested Reading
Digital libraries: what do users want?
Online Information Review (July,2006)
Comparison and evaluation of the user interfaces of e‐journals II: perceptions of the users
Journal of Documentation (October,2008)
From intention to use to actual rejection: the journey of an e‐procurement system
Journal of Enterprise Information Management (January,2010)
Individual differences of science teachers and interactive video retrieval
The Electronic Library (February,2016)
The flight plan of a digital initiatives project, part 2: Usability testing in the context of user‐centered design
OCLC Systems & Services: International digital library perspectives (December,2005)
Related Chapters
Chapter 8 Search Engines and Rank Correlation
Web Search Engine Research
User Experience Applied at University Libraries
Designing Effective Library Learning Spaces in Higher Education
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
