Authentication plays an important role in securing our systems but is threatened by increasingly sophisticated account hacking and account take over. Several security services …
S Das, B Wang, A Kim, LJ Camp - HICSS, 2020 - academia.edu
With technological advancements, traditional single-factor authentication methods, such as passwords, have become more vulnerable to cyber-threats. One potential solution, multi …
Nearly 100% of Americans aged 18 to 29 own a cell phone of some kind, and there has been a move toward using mobile devices for financial services; however, such a move also …
M Holmes, J Ophoff - … of the 14th International conference on …, 2019 - books.google.com
Two-factor authentication (2FA) is a protective technology designed to increase the security of online accounts. The enhanced security is achieved by using two layers of authentication …
J Yang, Y Zhang, CJM Lanting - Wireless Personal Communications, 2017 - Springer
The fast growing usage of mobile devices to access services over telecommunication networks urges researchers to look for an efficient way to secure users' online credentials …
J Zhang, Y Luximon - Behaviour & Information Technology, 2021 - Taylor & Francis
While mobile payment services have been flourishing in China, users have continually questioned the security of these transactions. Although customization has been proposed as …
Nowadays, Passwords are to identify users of Social Networking Sites (SNS). However, there are some downsides to it such as the user forgetting their password or the account …
Research examining the information security behavior of individuals with respect to risk has focused primarily on only a handful of constructs; most of which have their roots in Protection …
Managers desiring to protect information systems must understand how to most effectively motivate users to engage in secure behaviors. Information security researchers have …