Securing online accounts and assets: An examination of personal investments and protection motivation

O Ogbanufe - International Journal of Information Management, 2023 - Elsevier
This paper examines how personal investment influence the use of multi-factor
authentication (MFA) for securing online accounts. We draw from the Protection Motivation …

Using multi-factor authentication for online account security: Examining the influence of anticipated regret

OM Ogbanufe, C Baham - Information Systems Frontiers, 2023 - Springer
Authentication plays an important role in securing our systems but is threatened by
increasingly sophisticated account hacking and account take over. Several security services …

[PDF][PDF] MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies.

S Das, B Wang, A Kim, LJ Camp - HICSS, 2020 - academia.edu
With technological advancements, traditional single-factor authentication methods, such as
passwords, have become more vulnerable to cyber-threats. One potential solution, multi …

[PDF][PDF] Privacy concerns and protection motivation theory in the context of mobile banking

MA Terlizzi - 2019 - bibliotecadigital.fgv.br
Nearly 100% of Americans aged 18 to 29 own a cell phone of some kind, and there has
been a move toward using mobile devices for financial services; however, such a move also …

Online security behaviour: factors influencing intention to adopt two-factor authentication

M Holmes, J Ophoff - … of the 14th International conference on …, 2019 - books.google.com
Two-factor authentication (2FA) is a protective technology designed to increase the security
of online accounts. The enhanced security is achieved by using two layers of authentication …

Exploring the impact of QR codes in authentication protection: A study based on PMT and TPB

J Yang, Y Zhang, CJM Lanting - Wireless Personal Communications, 2017 - Springer
The fast growing usage of mobile devices to access services over telecommunication
networks urges researchers to look for an efficient way to secure users' online credentials …

A quantitative diary study of perceptions of security in mobile payment transactions

J Zhang, Y Luximon - Behaviour & Information Technology, 2021 - Taylor & Francis
While mobile payment services have been flourishing in China, users have continually
questioned the security of these transactions. Although customization has been proposed as …

Protection motivation theory using multi-factor authentication for providing security over social networking sites

H Mehraj, D Jayadevappa, SLA Haleem… - Pattern Recognition …, 2021 - Elsevier
Nowadays, Passwords are to identify users of Social Networking Sites (SNS). However,
there are some downsides to it such as the user forgetting their password or the account …

[PDF][PDF] The information security behavior of home users: Exploring a user's risk tolerance and past experiences in the context of backing up information

M Dupuis, R Crossler… - The Dewald Roode …, 2012 - researchgate.net
Research examining the information security behavior of individuals with respect to risk has
focused primarily on only a handful of constructs; most of which have their roots in Protection …

User motivations in protecting information security: Protection motivation theory versus self-determination theory

P Menard, GJ Bott, RE Crossler - Journal of Management …, 2017 - Taylor & Francis
Managers desiring to protect information systems must understand how to most effectively
motivate users to engage in secure behaviors. Information security researchers have …