Password-Based Authentication and The Experiences of End Users

05/30/2023
by   Assumpta Ezugwu, et al.
0

Passwords are used majorly for end-user authentication in information and communication technology (ICT) systems due to its perceived ease of use. The use for end-user authentication extends through mobile, computers and network-based products and services. But with the attendant issues relating to password hacks, leakages, and theft largely due to weak, reuse and poor password habits of end-users, the call for passwordless authentication as alternative intensifies. All the same, there are missing knowledge of whether these password-based experiences are associated with societal economic status, educational qualification of citizens, their age and gender, technological advancements, and depth of penetration. In line with the above, understanding the experience of end-users in developing economy to ascertain their password-based experience has become of interest to the researchers. This paper aims at measuring the experience of staff and students in University communities within southeastern Nigeria on password-based authentication systems. These communities have population whose age brackets are majorly within the ages of 16 and 60 years; have people with requisite educational qualifications ranging from Diploma to Doctorate degrees and constitutes good number of ICT tools consumers. The survey had 291 respondents, and collected data about age, educational qualifications, and gender from these respondents. It also collected information about their password experience in social media network, online shopping, electronic health care services, and internet banking. Our analysis using SPSS and report by means of descriptive statistics, frequency distribution, and Chi-Square tests showed that account compromise in the geographical area is not common with the respondents reporting good experience with passwords usage.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/11/2021

Towards Determining the Effect of Age and Educational Level on Cyber-Hygiene

As internet related challenges increase such as cyber-attacks, the need ...
research
05/31/2023

Investigating Gender Euphoria and Dysphoria on TikTok: Characterization and Comparison

With the emergence of short video-sharing platforms, engagement with soc...
research
10/21/2020

End User Accounts of Dark Patterns as Felt Manipulation

Manipulation defines many of our experiences as a consumer, including su...
research
01/27/2023

Women's Perspectives on Harm and Justice after Online Harassment

Social media platforms aspire to create online experiences where users c...
research
08/09/2021

From social netizens to data citizens: variations of GDPR awareness in 28 European countries

We studied variability in General Data Protection Regulation (GDPR) awar...
research
12/01/2016

Analysis of the Human-Computer Interaction on the Example of Image-based CAPTCHA by Association Rule Mining

The paper analyzes the interaction between humans and computers in terms...
research
06/16/2022

Anonymous Expression in an Online Community for Women in China

Gender issues faced by women can range from workplace harassment to dome...

Please sign up or login with your details

Forgot password? Click here to reset