Katalog Plus
Bibliothek der Frankfurt UAS
Bald neuer Katalog: sichern Sie sich schon vorab Ihre persönlichen Merklisten im Nutzerkonto: Anleitung.
Dieses Ergebnis aus BASE kann Gästen nicht angezeigt werden.  Login für vollen Zugriff.

Computational Analysis of User Experience of Password-Based Authentication Systems

Title: Computational Analysis of User Experience of Password-Based Authentication Systems
Authors: Abromaityte, Migle; Dubero, Elise; Kruger, Quintan; Lucassen, Benne; Vos, Tessa; van den Hout, Niek Jan; Bouma, Debby; Treur, Jan; Roelofsma, Peter H.M.P.
Contributors: Singh, Dhananjay; van ’t Klooster, Jan-Willem; Tiwary, Uma Shanker
Source: Abromaityte, M, Dubero, E, Kruger, Q, Lucassen, B, Vos, T, van den Hout, N J, Bouma, D, Treur, J & Roelofsma, P H M P 2025, Computational Analysis of User Experience of Password-Based Authentication Systems. in D Singh, J-W van ’t Klooster & U S Tiwary (eds), Intelligent Human Computer Interaction : 16th International Conference, IHCI 2024, Twente, The Netherlands, November 13–16, 2024, Revised Selected Papers, Part I. vol. 1, Lecture Notes in Computer Science, vol. 15557 LNCS, IHCI: International Conference on Intelligent Human Computer Interaction, vol. 2024, Springer Nature, pp. 341-352, 16th International Conference on Intelligent Human Computer ....
Publisher Information: Springer Nature
Publication Year: 2025
Subject Terms: authentication systems; computational analysis; user experience
Description: Using a network modelling approach to model adaptive dynamical systems based on self-modeling networks, this paper present a computational analysis of password-based authentication systems. It reveals several key insights into the interplay between user experience (UX) and security. An important finding is the tension between security and usability in password systems. While these systems are ubiquitous due to their relative ease of implementation and user familiarity, they come with significant challenges. As for users often convenience is more important than security, they use weak, easily guessable passwords and password reuse across multiple accounts. This behaviour, also driven by the cognitive burden of managing numerous passwords, has a bad impact on the risk of unauthorized access and security breaches. Computational analysis also showed that with adequate training, the usability of 2FA systems improved, leading to a reduction in user stress over time.
Document Type: conference object
File Description: application/pdf
Language: English
ISBN: 978-3-031-88704-8; 3-031-88704-2
Relation: info:eu-repo/semantics/altIdentifier/hdl/https://hdl.handle.net/1871.1/c9d02842-9a18-44c3-9381-9149aade5cb3; info:eu-repo/semantics/altIdentifier/isbn/9783031887048; urn:ISBN:9783031887048
DOI: 10.1007/978-3-031-88705-5_29
Availability: https://research.vu.nl/en/publications/c9d02842-9a18-44c3-9381-9149aade5cb3; https://doi.org/10.1007/978-3-031-88705-5_29; https://hdl.handle.net/1871.1/c9d02842-9a18-44c3-9381-9149aade5cb3; https://research.vu.nl/ws/files/425498428/Computational_Analysis_of_User_Experience_of_Password-Based_Authentication_Systems.pdf; https://www.scopus.com/pages/publications/105007558722; https://www.scopus.com/pages/publications/105007558722#tab=citedBy
Rights: info:eu-repo/semantics/openAccess ; https://ub.vu.nl/nl/onderwijs-onderzoek/open-access/b-you-share-we-care/end-user-agreement.aspx
Accession Number: edsbas.E7FD2E5C
Database: BASE