Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret

被引:5
|
作者
Ogbanufe, Obi M. [1 ]
Baham, Corey [2 ]
机构
[1] Univ North Texas, G Brint Ryan Coll Business, Informat Technol & Decis Sci Dept, Denton, TX 76203 USA
[2] Oklahoma State Univ, Spears Sch Business, Management Sci & Informat Syst Dept, Stillwater, OK 74078 USA
关键词
Multi-factor authentication; Online account hacking; Account take-over; Anticipated regret; Protection motivation theory; PROTECTION MOTIVATION THEORY; INFORMATION-SYSTEMS SECURITY; FEAR APPEALS; USER ACCEPTANCE; DATA-COLLECTION; PERCEIVED RISK; BEHAVIORS; IMPACT; TECHNOLOGY; THREATS;
D O I
10.1007/s10796-022-10278-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication plays an important role in securing our systems but is threatened by increasingly sophisticated account hacking and account take over. Several security services have been developed, including multi-factor authentication (MFA) designed to cope with online account authentication. It remains unknown how users perceive and evaluate secure authentication for online account threats and consequently use it to protect their online account. Drawing on the Protection Motivation Theory (PMT) and the literature on anticipated regret, this study investigates the factors that affect the use of MFA secure authentication to avoid online account threats. This work extends PMT by showing how the emotion of anticipated regret heightens appraisals of threat and coping.
引用
收藏
页码:897 / 916
页数:20
相关论文
共 50 条
  • [1] Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret
    Obi M. Ogbanufe
    Corey Baham
    [J]. Information Systems Frontiers, 2023, 25 : 897 - 916
  • [2] CLOUD STORAGE SECURITY USING MULTI-FACTOR AUTHENTICATION
    Nikam, Rushikesh
    Potey, Manish
    [J]. 2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [3] Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential
    Nozaki, Shinnosuke
    Serizawa, Ayumi
    Yoshihira, Mizuho
    Fujita, Masahiro
    Shibata, Yoichi
    Yamanaka, Tadakazu
    Matsuda, Nori
    Ohki, Tetsushi
    Nishigaki, Masakatsu
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 201 - 211
  • [4] Multi-Factor Biometrics for Authentication: A False Sense of Security
    Al-Assam, Hisham
    Sellahewa, Harin
    Jassim, Sabah
    [J]. MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 81 - 87
  • [5] On the Security of Multi-Factor Authentication: Several Instructive Examples
    Huang, Yun
    Xue, Weijia
    Huang, Geshi
    Lai, Xuejia
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 685 - 687
  • [6] A survey on multi-factor authentication for online banking in the wild
    Sinigaglia, Federico
    Carbone, Roberto
    Costa, Gabriele
    Zannone, Nicola
    [J]. COMPUTERS & SECURITY, 2020, 95
  • [7] Smart Home Security: An Efficient Multi-Factor Authentication Protocol
    Sarbishaei, Ghazaleh
    Modarres, Amir Masoud Aminian
    Jowshan, Farahnaz
    Khakzad, Fateme Zahra
    Mokhtari, Hasti
    [J]. IEEE ACCESS, 2024, 12 : 106253 - 106272
  • [8] A Survey on the Security in Cyber Physical System with Multi-Factor Authentication
    Sain, Mangal
    Normurodov, Oloviddin
    Hong, Chen
    Hui, Kueh Lee
    [J]. 2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 1322 - +
  • [9] Multi-Factor Authentication Using Threshold Cryptography
    Venukumar, Vishnu
    Pathari, Vinod
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1694 - 1698
  • [10] Security analysis and enhancements of a multi-factor biometric authentication scheme
    Wu, Min
    Chen, Jianhua
    Zhu, Wenxia
    Yuan, Zhenyang
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (04) : 352 - 365