A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version)

10/17/2022
by   Sanam Ghorbani Lyastani, et al.
0

Heuristics for user experience state that users will transfer their expectations from one product to another. A lack of consistency between products can increase users' cognitive friction, leading to frustration and rejection. This paper presents the first systematic study of the external, functional consistency of two-factor authentication user journeys on top-ranked websites. We find that these websites implement only a minimal number of design aspects consistently (e.g., naming and location of settings) but exhibit mixed design patterns for setup and usage of a second factor. Moreover, we find that some of the more consistently realized aspects, such as descriptions of two-factor authentication, have been described in the literature as problematic and adverse to user experience. Our results advocate for more general UX guidelines for 2FA implementers and raise new research questions about the 2FA user journeys.

READ FULL TEXT

page 8

page 9

page 29

page 30

page 31

page 32

page 33

page 37

research
06/16/2023

Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication

Multi-Factor Authentication is intended to strengthen the security of pa...
research
11/12/2020

Securing Password Authentication for Web-based Applications

The use of passwords and the need to protect passwords are not going awa...
research
08/16/2023

Invisible, Unreadable, and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments

This paper investigates the accessibility of cookie notices on websites ...
research
08/19/2022

User Experience of Symptom Checkers: A Systematic Review

This review reports the user experience of symptom checkers, aiming to c...
research
08/16/2019

MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content

Traditional single-factor authentication possesses several critical secu...
research
08/20/2019

Securing HPC using Federated Authentication

Federated authentication can drastically reduce the overhead of basic ac...

Please sign up or login with your details

Forgot password? Click here to reset