Authentication Melee: A Usability Analysis of Seven Web Authentication Systems
Passwords continue to dominate the authentication landscape in spite of numerous proposals to replace them. Even though usability is a key factor in replacing passwords, very few alternatives have been subjected to formal usability studies and even fewer have been analyzed using a standard metric. W...
Main Author: | |
---|---|
Format: | Others |
Published: |
BYU ScholarsArchive
2015
|
Subjects: | |
Online Access: | https://scholarsarchive.byu.edu/etd/4376 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=5375&context=etd |
id |
ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-5375 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-53752019-05-16T03:36:40Z Authentication Melee: A Usability Analysis of Seven Web Authentication Systems Ruoti, Scott Passwords continue to dominate the authentication landscape in spite of numerous proposals to replace them. Even though usability is a key factor in replacing passwords, very few alternatives have been subjected to formal usability studies and even fewer have been analyzed using a standard metric. We report the results of four within-subjects usability studies for seven web authentication systems. These systems span federated, smartphone, paper tokens, and email-based approaches. Our results indicate that participants prefer single sign-on systems. We utilize the Systems Usability Scale (SUS) as a standard metric for empirical analysis and find that it produces reliable, replicable results. SUS proves to be an accurate measure of baseline usability and we recommend that going forward all new authentication proposals be required to meet a minimum SUS score before being accepted by the security community. Our usability studies also gather insightful information from participants' qualitative responses: we find that transparency increases usability but also leads to confusion and a lack of trust, participants prefer single sign-on but wish to augment it with site-specific low-entropy passwords, and participants are intrigued by biometrics and phone-based authentication. 2015-04-01T07:00:00Z text application/pdf https://scholarsarchive.byu.edu/etd/4376 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=5375&context=etd http://lib.byu.edu/about/copyright/ All Theses and Dissertations BYU ScholarsArchive Usable Security Authentication User Study System Usability Scale Computer Sciences |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
Usable Security Authentication User Study System Usability Scale Computer Sciences |
spellingShingle |
Usable Security Authentication User Study System Usability Scale Computer Sciences Ruoti, Scott Authentication Melee: A Usability Analysis of Seven Web Authentication Systems |
description |
Passwords continue to dominate the authentication landscape in spite of numerous proposals to replace them. Even though usability is a key factor in replacing passwords, very few alternatives have been subjected to formal usability studies and even fewer have been analyzed using a standard metric. We report the results of four within-subjects usability studies for seven web authentication systems. These systems span federated, smartphone, paper tokens, and email-based approaches. Our results indicate that participants prefer single sign-on systems. We utilize the Systems Usability Scale (SUS) as a standard metric for empirical analysis and find that it produces reliable, replicable results. SUS proves to be an accurate measure of baseline usability and we recommend that going forward all new authentication proposals be required to meet a minimum SUS score before being accepted by the security community. Our usability studies also gather insightful information from participants' qualitative responses: we find that transparency increases usability but also leads to confusion and a lack of trust, participants prefer single sign-on but wish to augment it with site-specific low-entropy passwords, and participants are intrigued by biometrics and phone-based authentication. |
author |
Ruoti, Scott |
author_facet |
Ruoti, Scott |
author_sort |
Ruoti, Scott |
title |
Authentication Melee: A Usability Analysis of Seven Web Authentication Systems |
title_short |
Authentication Melee: A Usability Analysis of Seven Web Authentication Systems |
title_full |
Authentication Melee: A Usability Analysis of Seven Web Authentication Systems |
title_fullStr |
Authentication Melee: A Usability Analysis of Seven Web Authentication Systems |
title_full_unstemmed |
Authentication Melee: A Usability Analysis of Seven Web Authentication Systems |
title_sort |
authentication melee: a usability analysis of seven web authentication systems |
publisher |
BYU ScholarsArchive |
publishDate |
2015 |
url |
https://scholarsarchive.byu.edu/etd/4376 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=5375&context=etd |
work_keys_str_mv |
AT ruotiscott authenticationmeleeausabilityanalysisofsevenwebauthenticationsystems |
_version_ |
1719187357250355200 |