Online Security Behaviour: Factors Influencing Intention to Adopt Two-Factor Authentication

被引:0
|
作者
Holmes, Mitch [1 ]
Ophoff, Jacques [1 ]
机构
[1] Univ Cape Town, Dept Informat Syst, Rondebosch, South Africa
基金
新加坡国家研究基金会;
关键词
two-factor authentication; protection motivation theory; technology awareness; PROTECTION MOTIVATION THEORY; USABILITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two-factor authentication (2FA) is a protective technology designed to increase the security of online accounts. The enhanced security is achieved by using two layers of authentication to facilitate a login process so that should one layer become compromised (e.g. a password), the second layer will still ensure that the account is protected. Considering the prevalence of cybercrime and in particular, password attacks, it is important to examine the behaviour of individuals in terms of the effort they make to protect their online account(s). Studies surrounding 2FA have focused on the various technologies supporting it as well as issues concerning its usability and convenience. In general, users fail to protect themselves online due to the effort that is required. Enhanced security means increased effort and inconvenience, and although risks are present and perceived by Internet users, sufficient effort to protect their online accounts is not made. This study made use of a Protection Motivation Theory (PMT) approach in trying to understand the behaviour of Internet users surrounding their intentions to adopt 2FA to protect their online account(s). The PMT model is adapted to include an additional concept focusing on 'Technology Awareness'. Empirical data was collected using an online survey, with 209 responses analysed using Partial Least Squares Structural Equation Modelling (PLS-SEM). Results were in line with other protective technology literature in terms of the perception of online threat vulnerability and severity being less significant in determining behavioural intention than the perception of the technology itself. The results show that the perception of (1) the difficulty associated with using the 2FA technology (response costs) and (2) the effectiveness of the 2FA technology (response efficacy) prove to be significant in determining behavioural intention to adopt 2FA as protective technology. Lastly, awareness of online security issues and solutions was relevant in the adapted PMT model and significantly influenced intention.
引用
收藏
页码:123 / 132
页数:10
相关论文
共 50 条
  • [31] An efficient two-factor authentication protocol based on elliptic curve cryptosystem with provable security
    Chen, Yulei
    Chen, Jianhua
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
  • [32] Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi
    LIU Dong
    CHEN Jing
    DU Ruiying
    ZHANG Huanguo
    [J]. Chinese Journal of Electronics, 2018, 27 (03) : 625 - 633
  • [33] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Hamed Arshad
    Vahid Teymoori
    Morteza Nikooghadam
    Hassan Abbassi
    [J]. Journal of Medical Systems, 2015, 39
  • [34] Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi
    Liu Dong
    Chen Jing
    Du Ruiying
    Zhang Huanguo
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (03) : 625 - 633
  • [35] Enhancing Web Application Security: Advanced Biometric Voice Verification for Two-Factor Authentication
    Kaminski, Kamil Adam
    Dobrowolski, Andrzej Piotr
    Piotrowski, Zbigniew
    Scibiorek, Przemyslaw
    [J]. ELECTRONICS, 2023, 12 (18)
  • [36] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Teymoori, Vahid
    Nikooghadam, Morteza
    Abbassi, Hassan
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [37] Two-Factor Authentication for IoT With Location Information
    Aman, Muhammad Naveed
    Basheer, Mohamed Haroon
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 3335 - 3351
  • [38] Robust Two-factor Smart Card Authentication
    Candan, Omer Mert
    Levi, Albert
    [J]. 2017 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2017, : 184 - 188
  • [39] BeamAuth: Two-Factor Web Authentication with a Bookmark
    Adida, Ben
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 48 - 57
  • [40] Pseudo Code of Two-factor Authentication for BYOD
    Jaha, Farida
    Kartit, Ali
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2017), 2017,