QR Codes and Authentication Protection

被引:0
|
作者
Yang, Jing [1 ]
Zhang, Yue [2 ]
机构
[1] SUNY Coll Oneonta, Sch Business & Econ, Oneonta, NY 13820 USA
[2] Calif State Univ Northridge, David Nazarian Coll Business & Econ, Northridge, CA 91330 USA
关键词
QR Codes; Fear appeals; Online Privacy; Mobile Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The development of the Internet and telecommunication urges researchers to look for a better way to secure online users' private information. This study is rooted in online user account protection, measuring the effect of QR codes on fear appeals and authentication protection. This study contributes to the extant literature by integrating two theories protection motivation theory and the theory of planned behavior. The main goal of this study is to investigate how the co-use of computers and mobile devices protect online users' online credentials. The results of the study also provide guidelines to IT developers for future directions in authentication protection.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Exploring the Impact of QR Codes in Authentication Protection: A Study Based on PMT and TPB
    Yang, Jing
    Zhang, Yue
    Lanting, Cees J. M.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5315 - 5334
  • [2] Exploring the Impact of QR Codes in Authentication Protection: A Study Based on PMT and TPB
    Jing Yang
    Yue Zhang
    Cees J. M. Lanting
    Wireless Personal Communications, 2017, 96 : 5315 - 5334
  • [3] Joint SVD and QR Codes for Image Authentication
    Wu, Wen-Chuan
    Chan, Chi-Shiang
    Lin, Chih-Yang
    Lin, Zi-Wei
    2015 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2015, : 1137 - 1140
  • [4] Identity Document Authentication Based on VSS and QR Codes
    Espejel-Trujillo, A.
    Castillo-Camacho, I
    Nakano-Miyatake, M.
    Perez-Meana, H.
    2012 IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, 2012, 3 : 241 - 250
  • [5] Authentication and Transaction Verification Using QR Codes with a Mobile Device
    Chow, Yang-Wai
    Susilo, Willy
    Yang, Guomin
    Au, Man Ho
    Wang, Cong
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 437 - 451
  • [6] Product Authentication Using Hash Chains and Printed QR Codes
    Keni, Harshith
    Earle, Montana
    Min, Manki
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 319 - 324
  • [7] Product Authentication Using QR Codes: A Mobile Application to Combat Counterfeiting
    M. Bala Krishna
    Arpit Dugar
    Wireless Personal Communications, 2016, 90 : 381 - 398
  • [8] Using cryptography in the cloud for lightweight authentication protocols based on QR codes
    Aciobanitei, Iulian
    Buhus, Iulian Catalin
    Pura, Mihai-Lica
    2018 IEEE 12TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2018, : 539 - 542
  • [9] A Novel Approach for User Authentication to Industrial Components Using QR Codes
    Borisov, Alexander
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 61 - 66
  • [10] Product Authentication Using QR Codes: A Mobile Application to Combat Counterfeiting
    Krishna, M. Bala
    Dugar, Arpit
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (01) : 381 - 398