Online Security Behaviour: Factors Influencing Intention to Adopt Two-Factor Authentication

被引:0
|
作者
Holmes, Mitch [1 ]
Ophoff, Jacques [1 ]
机构
[1] Univ Cape Town, Dept Informat Syst, Rondebosch, South Africa
基金
新加坡国家研究基金会;
关键词
two-factor authentication; protection motivation theory; technology awareness; PROTECTION MOTIVATION THEORY; USABILITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two-factor authentication (2FA) is a protective technology designed to increase the security of online accounts. The enhanced security is achieved by using two layers of authentication to facilitate a login process so that should one layer become compromised (e.g. a password), the second layer will still ensure that the account is protected. Considering the prevalence of cybercrime and in particular, password attacks, it is important to examine the behaviour of individuals in terms of the effort they make to protect their online account(s). Studies surrounding 2FA have focused on the various technologies supporting it as well as issues concerning its usability and convenience. In general, users fail to protect themselves online due to the effort that is required. Enhanced security means increased effort and inconvenience, and although risks are present and perceived by Internet users, sufficient effort to protect their online accounts is not made. This study made use of a Protection Motivation Theory (PMT) approach in trying to understand the behaviour of Internet users surrounding their intentions to adopt 2FA to protect their online account(s). The PMT model is adapted to include an additional concept focusing on 'Technology Awareness'. Empirical data was collected using an online survey, with 209 responses analysed using Partial Least Squares Structural Equation Modelling (PLS-SEM). Results were in line with other protective technology literature in terms of the perception of online threat vulnerability and severity being less significant in determining behavioural intention than the perception of the technology itself. The results show that the perception of (1) the difficulty associated with using the 2FA technology (response costs) and (2) the effectiveness of the 2FA technology (response efficacy) prove to be significant in determining behavioural intention to adopt 2FA as protective technology. Lastly, awareness of online security issues and solutions was relevant in the adapted PMT model and significantly influenced intention.
引用
收藏
页码:123 / 132
页数:10
相关论文
共 50 条
  • [1] On the Security of a Two-Factor Authentication Scheme
    Catuogno, Luigi
    Galdi, Clemente
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 245 - +
  • [2] On the (In)Security of Mobile Two-Factor Authentication
    Dmitrienko, Alexandra
    Liebchen, Christopher
    Rossow, Christian
    Sadeghi, Ahmad-Reza
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 365 - 383
  • [3] Cryptocurrencies with Security Policies and Two-Factor Authentication
    Breuer, Florian
    Goyal, Vipul
    Malavolta, Giulio
    [J]. 2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 140 - 158
  • [4] Leveraging autobiographical memory for two-factor online authentication
    Al-Ameen, Mahdi Nasrullah
    Haque, S. M. Taiabul
    Wright, Matthew
    [J]. INFORMATION AND COMPUTER SECURITY, 2016, 24 (04) : 386 - 399
  • [5] Two-Factor Authentication with End-to-End Password Security
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Shirvanian, Maliheh
    Saxena, Nitesh
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
  • [6] A systematic review of factors influencing students' behavioral intention to adopt online homework
    Chen, Liu
    Wong, Su Luan
    How, Shwu Pyng
    [J]. JOURNAL OF COMPUTERS IN EDUCATION, 2023,
  • [7] Factors influencing the intention to adopt green construction: an application of the theory of planned behaviour
    Tunji-Olayeni, Patience
    Kajimo-Shakantu, Kahilu
    Ayodele, Timothy Oluwafemi
    [J]. SMART AND SUSTAINABLE BUILT ENVIRONMENT, 2024, 13 (02) : 291 - 308
  • [8] TWO-FACTOR AUTHENTICATION SYSTEM
    Tsymzhitov, Gonchik
    Zudilova, Tatiana
    Voituk, Tatiana
    [J]. INFORMATICS, GEOINFORMATICS AND REMOTE SENSING CONFERENCE PROCEEDINGS, SGEM 2016, VOL I, 2016, : 505 - 512
  • [9] On the Usability of Two-Factor Authentication
    Wang, Ding
    Wang, Ping
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150
  • [10] Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    [J]. ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 55 - 60