Choosing authentication schemes for a specific purpose is challenging for service providers, developers, and researchers. Previous ratings of technical and objective aspects showed that available schemes all have strengths and limitations. Yet, the security of authentication also relies on user perceptions which affect acceptance and user behaviour and can deviate from technical aspects. To shine light on the issue and support researchers, developers, and service-providers confronted with authentication choice, we conducted an in-depth analysis of user perceptions of the password, fingerprint, and a smartphone-based scheme in an online study with 201 participants. As authentication is a secondary task that needs to be evaluated in the context of authentication purpose, we also compared perceptions across four contexts of use with varying sensitivity levels: email accounts, online banking, social networks, and smart homes. The results revealed how perceptions of usability, security, privacy, trust, effort, and qualitative features of the schemes are related to user preferences. The results increase awareness for the influence of subjective perceptions and have practical implications for decision-makers. They can inform a) the choice between several adequate schemes, b) the authentication design to reduce concerns or security-related misconceptions, and c) the development of context-dependent authentication.
翻译:为特定目的选择认证计划对服务提供者、开发商和研究人员来说是一项挑战。以往对技术和客观方面的评级表明,现有计划都有长处和局限性。然而,认证的安全性还取决于影响接受度和用户行为并可能偏离技术方面的用户认识。为了揭示问题并支持面临认证选择的研究人员、开发商和服务提供方,我们在与201名参与者进行的网上研究中对用户对密码、指纹和智能手机计划的看法进行了深入分析。由于认证是一项次要任务,需要根据认证目的加以评估,因此,我们还比较了四种使用环境的不同敏感度:电子邮件账户、在线银行、社交网络和智能家庭。结果显示,对该计划的可用性、安全性、隐私、信任、努力和质量特点的看法如何与用户的偏好相关。结果提高了对主观认知的影响的认识,并对决策者产生了实际影响。他们可以告知:(a) 几个适当的计划之间的选择,(b) 认证设计以减少关切或与安全有关的误解,以及(c) 发展基于背景的认证。