Skip to main content

Research Repository

Advanced Search

User perceptions and use of authentication methods: Insights from youth in Mexico and Bosnia and Herzegovina

Hadžidedić, Sunčica

User perceptions and use of authentication methods: Insights from youth in Mexico and Bosnia and Herzegovina Thumbnail


Authors



Abstract

Purpose: This paper aimed to address the user perspective about usability, security and use of five authentication schemes (text and graphical passwords, biometrics, and hardware tokens) from a population not covered previously in the literature. Additionally, we explored the criteria users apply in creating their text passwords. Methodology: An online survey study was performed in spring 2019 with university students in Mexico and Bosnia and Herzegovina. 197 responses were collected. Findings: Fingerprint-based authentication was perceived as usable and secure the most frequently. However, text passwords were the predominantly used method for unlocking computer devices. Our participants preferred to apply personal criteria for creating text passwords, which, interestingly, coincided with the general password guidelines, e.g., length, combining letters and special characters. Originality: Research on young adults’ perceptions of different authentication methods is driven by the increasing frequency and sophistication of security breaches, as well as their significant consequences. This study provided insight into the commonly used authentication methods among youth from two geographic locations, which have not been accounted for previously.

Citation

Hadžidedić, S. (2022). User perceptions and use of authentication methods: Insights from youth in Mexico and Bosnia and Herzegovina. Information and Computer Security, 30(4), 615-632. https://doi.org/10.1108/ics-07-2021-0105

Journal Article Type Article
Acceptance Date Feb 16, 2022
Online Publication Date Mar 18, 2022
Publication Date Oct 20, 2022
Deposit Date Feb 23, 2022
Publicly Available Date Feb 23, 2022
Journal Information and Computer Security
Print ISSN 2056-4961
Publisher Emerald
Peer Reviewed Peer Reviewed
Volume 30
Issue 4
Pages 615-632
DOI https://doi.org/10.1108/ics-07-2021-0105

Files

Accepted Journal Article (1.2 Mb)
PDF

Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/

Copyright Statement
This author accepted manuscript is deposited under a Creative Commons Attribution Non-commercial 4.0 International (CC BY-NC) licence. This means that anyone may distribute, adapt, and build upon the work for non-commercial purposes, subject to full attribution. If you wish to use this manuscript for commercial purposes, please contact permissions@emerald.com






You might also like



Downloadable Citations