Ogbanufe et al., 2023 - Google Patents
Using multi-factor authentication for online account security: Examining the influence of anticipated regretOgbanufe et al., 2023
- Document ID
- 1160706825458283352
- Author
- Ogbanufe O
- Baham C
- Publication year
- Publication venue
- Information Systems Frontiers
External Links
Snippet
Authentication plays an important role in securing our systems but is threatened by increasingly sophisticated account hacking and account take over. Several security services have been developed, including multi-factor authentication (MFA) designed to cope with …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Crossler et al. | Robbing Peter to pay Paul: Surrendering privacy for security’s sake in an identity ecosystem | |
US20180082683A1 (en) | Personal information assistant computing system | |
Bang et al. | Improving information security management: An analysis of ID–password usage and a new login vulnerability measure | |
Ogbanufe et al. | Using multi-factor authentication for online account security: Examining the influence of anticipated regret | |
Aydın et al. | Fuzzy assessment of health information system users’ security awareness | |
US11196734B2 (en) | Safe logon | |
Moallem | Human-Computer Interaction and cybersecurity handbook | |
Das | A risk-reduction-based incentivization model for human-centered multi-factor authentication | |
Moneva et al. | Insider threats among Dutch SMEs: Nature and extent of incidents, and cyber security measures | |
Santos | Developing cybersecurity programs and policies | |
Ogbanufe | Securing online accounts and assets: An examination of personal investments and protection motivation | |
Maahs | Managerial strategies small businesses use to prevent cybercrime | |
Tiwari | Exploring phishing susceptibility attributable to authority, urgency, risk perception and human factors | |
Kimani et al. | Multi-Factor Authentication for Improved Enterprise Resource Planning Systems Security | |
Althobaiti | Assessing usable security of multifactor authentication | |
Rome Jr | Understanding Adoption Barriers of Superior Technologies to Authenticate and Protect Users from Ongoing Cyber Threats | |
Ogudebe | Challenges of digital privacy in banking organizations | |
DeWeaver III | Exploring How Universities Can Reduce Successful Cyberattacks by Incorporating Zero Trust | |
Du et al. | Examining young users’ security perceptions of mobile banking: A qualitative study on users’ insights about mobile banking. | |
Pyke | A Qualitative Exploratory Study on the Effects of Small Businesses and Cloud Computing in the Mid-West of America | |
Väli-Klemelä | What affects the intention to change information security behavior when using biometric authentication in mobile payments? | |
Harmon | Strategies used by cloud security managers to implement secure access methods | |
Kimani | Developing a multi-factor authentication prototype for improved security of enterprise resource planning systems for Kenyan universities | |
Almotiri | Security & Privacy Awareness & Concerns of Computer Users Posed by Web Cookies and Trackers | |
Lacroix et al. | Privacy and the hi-tech healthcare professional |