Online Security Behaviour: Factors Influencing Intention to Adopt Two-Factor Authentication

被引:0
|
作者
Holmes, Mitch [1 ]
Ophoff, Jacques [1 ]
机构
[1] Univ Cape Town, Dept Informat Syst, Rondebosch, South Africa
基金
新加坡国家研究基金会;
关键词
two-factor authentication; protection motivation theory; technology awareness; PROTECTION MOTIVATION THEORY; USABILITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two-factor authentication (2FA) is a protective technology designed to increase the security of online accounts. The enhanced security is achieved by using two layers of authentication to facilitate a login process so that should one layer become compromised (e.g. a password), the second layer will still ensure that the account is protected. Considering the prevalence of cybercrime and in particular, password attacks, it is important to examine the behaviour of individuals in terms of the effort they make to protect their online account(s). Studies surrounding 2FA have focused on the various technologies supporting it as well as issues concerning its usability and convenience. In general, users fail to protect themselves online due to the effort that is required. Enhanced security means increased effort and inconvenience, and although risks are present and perceived by Internet users, sufficient effort to protect their online accounts is not made. This study made use of a Protection Motivation Theory (PMT) approach in trying to understand the behaviour of Internet users surrounding their intentions to adopt 2FA to protect their online account(s). The PMT model is adapted to include an additional concept focusing on 'Technology Awareness'. Empirical data was collected using an online survey, with 209 responses analysed using Partial Least Squares Structural Equation Modelling (PLS-SEM). Results were in line with other protective technology literature in terms of the perception of online threat vulnerability and severity being less significant in determining behavioural intention than the perception of the technology itself. The results show that the perception of (1) the difficulty associated with using the 2FA technology (response costs) and (2) the effectiveness of the 2FA technology (response efficacy) prove to be significant in determining behavioural intention to adopt 2FA as protective technology. Lastly, awareness of online security issues and solutions was relevant in the adapted PMT model and significantly influenced intention.
引用
收藏
页码:123 / 132
页数:10
相关论文
共 50 条
  • [21] Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    [J]. SENSORS, 2010, 10 (03) : 2450 - 2459
  • [22] On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    Sun, Da-Zhi
    Li, Jian-Xin
    Feng, Zhi-Yong
    Cao, Zhen-Fu
    Xu, Guang-Quan
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 895 - 905
  • [23] TrustTokenF: a Generic Security Framework for Mobile Two-factor Authentication Using TrustZone
    Zhang, Yingjun
    Zhao, Shijun
    Qin, Yu
    Yang, Bo
    Feng, Dengguo
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 41 - 48
  • [24] Advanced security of two-factor authentication system using stego QR code
    Kouraogo, Yacouba
    Orhanou, Ghizlane
    Elhajji, Said
    [J]. International Journal of Information and Computer Security, 2020, 12 (04) : 436 - 449
  • [25] On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    Da-Zhi Sun
    Jian-Xin Li
    Zhi-Yong Feng
    Zhen-Fu Cao
    Guang-Quan Xu
    [J]. Personal and Ubiquitous Computing, 2013, 17 : 895 - 905
  • [26] Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol
    Xie, Qi
    Dong, Na
    Wong, Duncan S.
    Hu, Bin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (03) : 478 - 487
  • [27] The Trouble with SMS Two-Factor Authentication
    Kugler, Logan
    [J]. COMMUNICATIONS OF THE ACM, 2019, 62 (06) : 14 - 14
  • [28] User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication
    Isler, Devris
    Kupcu, Alptekin
    Coskun, Aykut
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 : 99 - 117
  • [29] Factors Influencing Behavioural Intention to Adopt Blockchain Technology
    Alaklabi, Saad
    Kang, Kyeong
    [J]. VISION 2020: SUSTAINABLE ECONOMIC DEVELOPMENT AND APPLICATION OF INNOVATION MANAGEMENT, 2018, : 5170 - 5174
  • [30] Systematic evaluation of influencing factors for Chinese rural doctors? job satisfaction and turnover intention: based on the two-factor theory
    Chen, Y. -Q.
    You, Y. -W.
    Zhang, Q.
    Wang, Y. -D.
    Dai, T.
    [J]. EUROPEAN REVIEW FOR MEDICAL AND PHARMACOLOGICAL SCIENCES, 2022, 26 (18) : 6469 - 6486