[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ogbanufe et al., 2023 - Google Patents

Using multi-factor authentication for online account security: Examining the influence of anticipated regret

Ogbanufe et al., 2023

Document ID
1160706825458283352
Author
Ogbanufe O
Baham C
Publication year
Publication venue
Information Systems Frontiers

External Links

Snippet

Authentication plays an important role in securing our systems but is threatened by increasingly sophisticated account hacking and account take over. Several security services have been developed, including multi-factor authentication (MFA) designed to cope with …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Crossler et al. Robbing Peter to pay Paul: Surrendering privacy for security’s sake in an identity ecosystem
US20180082683A1 (en) Personal information assistant computing system
Bang et al. Improving information security management: An analysis of ID–password usage and a new login vulnerability measure
Ogbanufe et al. Using multi-factor authentication for online account security: Examining the influence of anticipated regret
Aydın et al. Fuzzy assessment of health information system users’ security awareness
US11196734B2 (en) Safe logon
Moallem Human-Computer Interaction and cybersecurity handbook
Das A risk-reduction-based incentivization model for human-centered multi-factor authentication
Moneva et al. Insider threats among Dutch SMEs: Nature and extent of incidents, and cyber security measures
Santos Developing cybersecurity programs and policies
Ogbanufe Securing online accounts and assets: An examination of personal investments and protection motivation
Maahs Managerial strategies small businesses use to prevent cybercrime
Tiwari Exploring phishing susceptibility attributable to authority, urgency, risk perception and human factors
Kimani et al. Multi-Factor Authentication for Improved Enterprise Resource Planning Systems Security
Althobaiti Assessing usable security of multifactor authentication
Rome Jr Understanding Adoption Barriers of Superior Technologies to Authenticate and Protect Users from Ongoing Cyber Threats
Ogudebe Challenges of digital privacy in banking organizations
DeWeaver III Exploring How Universities Can Reduce Successful Cyberattacks by Incorporating Zero Trust
Du et al. Examining young users’ security perceptions of mobile banking: A qualitative study on users’ insights about mobile banking.
Pyke A Qualitative Exploratory Study on the Effects of Small Businesses and Cloud Computing in the Mid-West of America
Väli-Klemelä What affects the intention to change information security behavior when using biometric authentication in mobile payments?
Harmon Strategies used by cloud security managers to implement secure access methods
Kimani Developing a multi-factor authentication prototype for improved security of enterprise resource planning systems for Kenyan universities
Almotiri Security & Privacy Awareness & Concerns of Computer Users Posed by Web Cookies and Trackers
Lacroix et al. Privacy and the hi-tech healthcare professional