Until you have something to lose! Loss aversion and two-factor authentication adoption

AR Pratama, FM Firmansyah - Applied Computing and Informatics, 2021 - emerald.com
Purpose In this study, the authors seek to understand factors that naturally influence users to
adopt two-factor authentication (2FA) without even trying to intervene by investigating factors …

On the usability of authentication security communication

SM Amft - 2024 - repo.uni-hannover.de
Information technology has become more and more ubiquitous in recent times, and it affects
almost all aspects of modern life. To protect this technology and its underlying resources, the …

The perception of security in selected contexts

K Busse - 2021 - bonndoc.ulb.uni-bonn.de
The perception of security has a strong impact on a person's choice of and interaction with
security technology, especially within the context of Usable Security and Privacy research …

[PDF][PDF] Secondary Education: Measuring Secondary Uses of 2FA Phone Numbers

MH Kim, C Yeung, D Salsburg, JA Calandrino - plaintextresponse.com
If a security feature requires user data, concerns over secondary uses of that data may
influence user adoption of the feature. We explore secondary uses of phone numbers that …