Authentication in mobile cloud computing: A survey

M Alizadeh, S Abolfazli, M Zamani, S Baharun… - Journal of Network and …, 2016 - Elsevier
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …

Touch-dynamics based behavioural biometrics on mobile devices–a review from a usability and performance perspective

E Ellavarason, R Guest, F Deravi… - ACM Computing …, 2020 - dl.acm.org
Over the past few years, there has been an exponential increase in the percentage of
people owning and using a smart phone. These devices have sensor-rich touchscreens that …

User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach

J D'Arcy, A Hovav, D Galletta - Information systems research, 2009 - pubsonline.informs.org
Intentional insider misuse of information systems resources (ie, IS misuse) represents a
significant threat to organizations. For example, industry statistics suggest that between 50 …

Comparing passwords, tokens, and biometrics for user authentication

L O'Gorman - Proceedings of the IEEE, 2003 - ieeexplore.ieee.org
For decades, the password has been the standard means for user authentication on
computers. However, as users are required to remember more, longer, and changing …

Passive-and not active-risk tendencies predict cyber security behavior

I Arend, A Shabtai, T Idan, R Keinan… - Computers & Security, 2020 - Elsevier
Vulnerabilities to online cyber-related crime are typically the result of poor decisions on the
part of users. To date, research on risk-taking behavior applied to cyber-security situations …

Information security culture: The socio-cultural dimension in information security management

T Schlienger, S Teufel - Security in the information society: Visions and …, 2002 - Springer
The information security management mostly disregards the human dimension. The main
focus is on technical and procedural measures. The user is seen as a security enemy, not as …

Al-enabled biometrics in recruiting: Insights from marketers for managers

P van Esch, J Stewart Black… - Australasian …, 2021 - journals.sagepub.com
Both researchers and practitioners are only in the early stages of examining and
understanding the application of artificial intelligence (AI) in terms of marketing themselves …

The determinants of individuals' perceived e-security: Evidence from Malaysia

MH Shah, HR Peikari, NM Yasin - International Journal of Information …, 2014 - Elsevier
Despite the critical role of individuals' perceived security in an online environment, previous
research has not attempted to comprehensively study the influences and interrelations …

A broad review on non-intrusive active user authentication in biometrics

PA Thomas, K Preetha Mathew - Journal of Ambient Intelligence and …, 2023 - Springer
Authentication is the process of keeping the user's personal information as confidential in
digital applications. Moreover, the user authentication process in the digital platform is …

Users' privacy attitudes towards the use of behavioral biometrics continuous authentication (BBCA) technologies: A protection motivation theory approach

A Skalkos, I Stylios, M Karyda, S Kokolakis - Journal of Cybersecurity and …, 2021 - mdpi.com
Smartphone user authentication based on passwords, PINs, and touch patterns raises
several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) …