Skip to main content

A Preliminary Investigation of Authentication of Choice in Health-Related Mobile Applications

  • Conference paper
  • First Online:
HCI for Cybersecurity, Privacy and Trust (HCII 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13333))

Included in the following conference series:

Abstract

User authentication is a security measure that involves authenticating the identity claimed by a user before granting access to a system or an application. Even though there are numerous studies that examined users’ experiences with a variety of authentication methods, very few have focused on the approach of granting users the freedom to select one or more authentication methods of their own choice. Initial work in this area suggested that the ‘Authentication of Choice” (AoC) approach has the potential to serve as a usable and secure authentication solution on mobile devices. However, the studies only evaluated the AoC approach on the Android platform when users executed tasks with low security and privacy concerns. To address this gap, we investigated the ‘Authentication of Choice’ approach in mobile health apps that potentially involve more sensitive information. An online longitudinal study was conducted with 30 participants to assess three authentication processes. The result of the study provides insight into how users interact with and perceive the AoC approach in the context of mobile health apps.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Oluwafemi, J., Feng, J.: How users perceive authentication of choice on mobile devices. In: 13th International Conference on Advances in Computer-Human Interactions. pp. 345–351. ACHI, Spain (2020)

    Google Scholar 

  2. Nilesh, A., Salendra, P., Mohammed, F.: A review of authentication methods. IJSTR 5(11), 246–249 (2016)

    Google Scholar 

  3. Lampson, B.: Computer security in the real world. IEEE Comput. 37(6), 37–46 (2004)

    Article  Google Scholar 

  4. Authentication Methods: https://www.uio.no/studier/emner/matnat/ifi/INF5261/v10/studentprojects/authentication-methods/FinalReportAuthenticationMethods.pdf. Accessed 14 Jan 2022

  5. Introduction to Biometrics Technologies and Applications: CyLab Carnegie Mellon https://users.ece.cmu.edu/~jzhu/class/18200/F06/L10A_Savvides_Biometrics.pdf. Accessed 16 Jan 2022

  6. Madhuravani, B., Reddy, P., LalithSamanthReddy, P.: A comprehensive study on different authentication factors. IJERT 2(10), 1358–1361 (2013)

    Google Scholar 

  7. Gunson, N., Marshall, D., Morton, H., Jack, M.: User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Comput. Secur. 30, 208–220 (2011)

    Article  Google Scholar 

  8. Riley, C., Buckner, K., Johnson, G., Benyon, D.: Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI Soc. 24(3), 295–306 (2009)

    Article  Google Scholar 

  9. Abhishek, K., Roshan, S., Kumar, P., Ranjan, R.: A comprehensive study on multifactor authentication schemes. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing and Information Technology, pp. 561–568. Springer, Berlin, Heidelberg (2013). https://doi.org/10.1007/978-3-642-31552-7_57

    Chapter  Google Scholar 

  10. Das, S., Dingman, A., Camp, L.: Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key. In: International Conference on Financial Cryptography and Data Security (FC). (2018)

    Google Scholar 

  11. Aleksandr, O., Sergey, B., Niko, M., Sergey, A., Tommi, M., Yevgeni, K.: Multi-Factor Authentication, A Survey. Cryptography 2(1) (2018) https://doi.org/10.3390/cryptography2010001

  12. Raja K.B., Raghavendra R., Stokkenes M., Busch M.: Multi-modal authentication system for smartphones using face, iris, and periocular. In: Biometrics (ICB). In: 2015 International Conference on, IEEE. pp. 143–150 (2015)

    Google Scholar 

  13. Cranor, L.F., Buchler, N.: Better together: usability and security go hand in hand. IEEE Secur. Priv. 12(6), 89–93 (2014). https://doi.org/10.1109/MSP.2014.109

    Article  Google Scholar 

  14. Vance, C., Paik, Y.: Forms of host-country national learning for enhanced MNC absorptive capacity. J. Manag. Psychol. 20(7), 590–606 (2005)

    Article  Google Scholar 

  15. Fairweather, P., Hanson, V., Detweiler, S., Schwerdtfeger, R.: From assistive technology to a web accessibility service. In: International Conference on Assistive Technologies (ASSETS). ACM. (2002)

    Google Scholar 

  16. Belk, M., Fidas, C., Germanakos, P., Samaras, G.: Security for diversity: studying the effects of verbal and imagery processes on user authentication mechanisms. In: Proceedings of the IFIP TC13 Conference on Human-Computer Interaction. pp. 442–459. South Africa (2013)

    Google Scholar 

  17. Hausawi, Y.M., Allen, W.H., Bahr, G.S.: Choice-based authentication: a usable-security approach. In: Stephanidis, C., Antona, M. (eds.) UAHCI 2014. LNCS, vol. 8513, pp. 114–124. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07437-5_12

    Chapter  Google Scholar 

  18. Number of mHealth apps available in the Google Play Store from 1st quarter 2015 to 1st quarter 2021, https://www.statista.com/statistics/779919/health-apps-available-google-play-worldwide/, Accessed 17 Dec 2021

  19. Number of mHealth apps available in the Apple App Store from 1st quarter 2015 to 1st quarter 2021, https://www.statista.com/statistics/779910/health-apps-available-ios-worldwide/, Accessed 17 Dec 2021

  20. Intertrust Releases 2020 Security Report on Global mHealth App Threats, https://www.intertrust.com/news/intertrust-releases-2020-security-report-on-global-mhealth-app-threats/, Accessed 17 Dec 2021

Download references

Acknowledgments

We would like to thank all the participants for their time and effort taking part in the study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oluwadamilola Arinde .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arinde, O., Feng, J., Tang, Z. (2022). A Preliminary Investigation of Authentication of Choice in Health-Related Mobile Applications. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2022. Lecture Notes in Computer Science, vol 13333. Springer, Cham. https://doi.org/10.1007/978-3-031-05563-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-05563-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-05562-1

  • Online ISBN: 978-3-031-05563-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics