메뉴 건너뛰기




Volumn 2, Issue 4, 2008, Pages 343-364

A strategy for increasing user acceptance of authentication systems: Insights from an empirical study of user preferences and performance

Author keywords

Authentication systems; Graphical authentication; Organisational strategy; Performance; User acceptance; User preferences

Indexed keywords


EID: 73149103987     PISSN: 1751200X     EISSN: 17512018     Source Type: Journal    
DOI: 10.1504/IJBSR.2008.020763     Document Type: Article
Times cited : (1)

References (39)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
    • Adams, A. and Sasse, M.A. (1999) 'Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures', Communications of the ACM, Vol. 42, pp.41-46.
    • (1999) Communications of the ACM , vol.42 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 34547269590 scopus 로고    scopus 로고
    • Psychological acceptability revisited
    • L.F. Cranor and S. Garfinkel (Eds), Sebastopol, CA: O' Reilly Media, Inc
    • Bishop, M. (2005) 'Psychological acceptability revisited', in L.F. Cranor and S. Garfinkel (Eds), Security and Usability: Designing Secure Systems that People can Use (pp.1-11). Sebastopol, CA: O' Reilly Media, Inc.
    • (2005) Security and Usability: Designing Secure Systems That People Can Use , pp. 1-11
    • Bishop, M.1
  • 5
    • 67249157694 scopus 로고    scopus 로고
    • Examining the impact of organisational and owner's characteristics on the extent of e-commerce adoption in SMEs
    • Chuang, T., Nakatani, K., Chen, J. and Huang, I. (2007) 'Examining the impact of organisational and owner's characteristics on the extent of e-commerce adoption in SMEs', Int. J. Business and Systems Research, Vol. 1, pp.61-80.
    • (2007) Int. J. Business and Systems Research , vol.1 , pp. 61-80
    • Chuang, T.1    Nakatani, K.2    Chen, J.3    Huang, I.4
  • 6
    • 0038649499 scopus 로고    scopus 로고
    • Computer Science and Telecommunications Board, Washington, DC: National Academy Press
    • Computer Science and Telecommunications Board (2002) IDs-Not That Easy: Questions about Nationwide Identity Systems. Washington, DC: National Academy Press.
    • (2002) IDs-Not That Easy: Questions about Nationwide Identity Systems
  • 10
    • 19944372131 scopus 로고    scopus 로고
    • Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
    • De Angeli, A., Coventry, L., Johnson, G. and Renaud, K. (2005) 'Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems', Int. J. Human-Computer Studies, Vol. 63, pp.128-152.
    • (2005) Int. J. Human-Computer Studies , vol.63 , pp. 128-152
    • De Angeli, A.1    Coventry, L.2    Johnson, G.3    Renaud, K.4
  • 12
    • 85084161493 scopus 로고    scopus 로고
    • Deja Vu: A user study. Using images for authentication
    • Dhamija, R. and Perrig, A. (2000) 'Deja Vu: a user study. Using images for authentication', Paper presented at the 9th USENIX Security Symposium.
    • (2000) 9th USENIX Security Symposium
    • Dhamija, R.1    Perrig, A.2
  • 14
    • 32444433117 scopus 로고    scopus 로고
    • The challenges of understanding and using security: A survey of end-users
    • Furnell, S.M., Jusoh, A. and Katsabas, D. (2006) 'The challenges of understanding and using security: a survey of end-users', Computers and Security, Vol. 25, pp.27-35.
    • (2006) Computers and Security , vol.25 , pp. 27-35
    • Furnell, S.M.1    Jusoh, A.2    Katsabas, D.3
  • 16
    • 34248376106 scopus 로고    scopus 로고
    • Increasing security and usability of computer systems with graphical passwords
    • March 23-27, Winston-Salem, North Carolina, USA
    • Hinds, C. and Ekwueme, C. (2007) 'Increasing security and usability of computer systems with graphical passwords', Proceedings of the 45th ACM Southeast Regional Conference 2007, March 23-27, Winston-Salem, North Carolina, USA, pp.529-530.
    • (2007) Proceedings of the 45th ACM Southeast Regional Conference 2007 , pp. 529-530
    • Hinds, C.1    Ekwueme, C.2
  • 19
    • 33751168960 scopus 로고    scopus 로고
    • The usability of passphrases for authentication: An empirical field study
    • Keith, M., Shao, B. and Steinbart, P.J. (2007) 'The usability of passphrases for authentication: an empirical field study', Int. J. Human-Computer Studies, Vol. 65, pp.17-28.
    • (2007) Int. J. Human-Computer Studies , vol.65 , pp. 17-28
    • Keith, M.1    Shao, B.2    Steinbart, P.J.3
  • 20
    • 0031191681 scopus 로고    scopus 로고
    • A proposed index of usability: A method for comparing the relative usability of different software systems
    • Lin, H.X., Choong, Y.Y. and Salvendy, G. (1997) 'A proposed index of usability: a method for comparing the relative usability of different software systems', Behaviour and Information Technology, Vol. 16, pp.267-277.
    • (1997) Behaviour and Information Technology , vol.16 , pp. 267-277
    • Lin, H.X.1    Choong, Y.Y.2    Salvendy, G.3
  • 21
    • 0030234484 scopus 로고    scopus 로고
    • An attributional explanation of individual resistance to the introduction of information technologies in the workplace
    • Martrinko, M.J., Henry, J.W. and Zmud, R.W. (1996) 'An attributional explanation of individual resistance to the introduction of information technologies in the workplace', Behavior and Information Technology, Vol. 15, pp.313-330.
    • (1996) Behavior and Information Technology , vol.15 , pp. 313-330
    • Martrinko, M.J.1    Henry, J.W.2    Zmud, R.W.3
  • 22
    • 0002531755 scopus 로고    scopus 로고
    • Job and team design
    • G. Salvendy (Ed.), 2nd ed. New York: John Wiley and Sons, Inc
    • Medsker, G.L. and Campion, M.A. (1997) 'Job and team design', in G. Salvendy (Ed.), Handbook of Human Factors and Engineering, 2nd ed. (pp.450-489). New York: John Wiley and Sons, Inc.
    • (1997) Handbook of Human Factors and Engineering , pp. 450-489
    • Medsker, G.L.1    Campion, M.A.2
  • 23
    • 84936893490 scopus 로고
    • Vital signs of identity
    • Millar, B. (1994) 'Vital signs of identity', IEEE Spectrum, Vol. 31, pp.22-28.
    • (1994) IEEE Spectrum , vol.31 , pp. 22-28
    • Millar, B.1
  • 24
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • Miller, G.A. (1956) 'The magical number seven, plus or minus two: some limits on our capacity for processing information', The Psychological Review, Vol. 63, pp.81-97.
    • (1956) The Psychological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 27
    • 77952176209 scopus 로고    scopus 로고
    • Performance measurement implementation in a knowledge-based public organisation
    • Rantanen, H., Leva, K. and Pekkola, S. (2007) 'Performance measurement implementation in a knowledge-based public organisation', Int. J. Business and Systems Research, Vol. 1, pp.343-353.
    • (2007) Int. J. Business and Systems Research , vol.1 , pp. 343-353
    • Rantanen, H.1    Leva, K.2    Pekkola, S.3
  • 28
    • 85010216246 scopus 로고    scopus 로고
    • retrieved 18 February 2005
    • Real User Corporation. (2005) 'How the Passface™ system works', retrieved 18 February 2005 from: http://www/realuser.com/technology/about- passfaces.htm
    • (2005) How the Passface™ System Works
  • 29
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J.H. and Schroeder, M.D. (1975) 'The protection of information in computer systems', Proceedings of the IEEE, Vol. 63, pp.1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 30
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link'-a human/computer interaction approach to usable and effective security
    • Sasse, M.A., Brostoff, S. and Weirich, D. (2001) 'Transforming the 'weakest link'-a human/computer interaction approach to usable and effective security', BT Technology Journal, Vol. 19, pp.122-131.
    • (2001) BT Technology Journal , vol.19 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 31
    • 34347333511 scopus 로고    scopus 로고
    • Research on usability in information security
    • Schultz, E.E. (2007) 'Research on usability in information security', Computer Fraud and Security, Vol. 6, pp.8-10.
    • (2007) Computer Fraud and Security , vol.6 , pp. 8-10
    • Schultz, E.E.1
  • 32
    • 0035149763 scopus 로고    scopus 로고
    • Usability and security: An appraisal of usability issues in information security methods
    • Schultz, E.E., Proctor, R.W., Lien, M.-C. and Salvendy, G. (2001) 'Usability and security: an appraisal of usability issues in information security methods', Computers and Security, Vol. 20, pp.620-634.
    • (2001) Computers and Security , vol.20 , pp. 620-634
    • Schultz, E.E.1    Proctor, R.W.2    Lien, M.-C.3    Salvendy, G.4
  • 33
    • 0000568988 scopus 로고    scopus 로고
    • Development and validation of the purdue cognitive job analysis methodology
    • Wei, J. and Salvendy, G. (2001) 'Development and validation of the purdue cognitive job analysis methodology', Int. J. Cognitive Ergonomics, Vol. 4, pp.277-296.
    • (2001) Int. J. Cognitive Ergonomics , vol.4 , pp. 277-296
    • Wei, J.1    Salvendy, G.2
  • 39
    • 27944510130 scopus 로고    scopus 로고
    • Perceived security factors in e-commerce among Turkish university students
    • Yenisey, M.M., Ozok, A.A. and Salvendy, G. (2005) 'Perceived security factors in e-commerce among Turkish university students', Behaviour and Information Technology, Vol. 24, pp.259-274.
    • (2005) Behaviour and Information Technology , vol.24 , pp. 259-274
    • Yenisey, M.M.1    Ozok, A.A.2    Salvendy, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.