MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content

08/16/2019
by   Sanchari Das, et al.
0

Traditional single-factor authentication possesses several critical security vulnerabilities due to single-point failure feature. Multi-factor authentication (MFA), intends to enhance security by providing additional verification steps. However, in practical deployment, users often experience dissatisfaction while using MFA, which leads to non-adoption. In order to understand the current design and usability issues with MFA, we analyze aggregated user generated comments (N = 12,500) about application-based MFA tools from major distributors, such as, Amazon, Google Play, Apple App Store, and others. While some users acknowledge the security benefits of MFA, majority of them still faced problems with initial configuration, system design understanding, limited device compatibility, and risk trade-offs leading to non-adoption of MFA. Based on these results, we provide actionable recommendations in technological design, initial training, and risk communication to improve the adoption and user experience of MFA.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/16/2019

Evaluating User Perception of Multi-Factor Authentication: A Systematic Review

Security vulnerabilities of traditional single factor authentication has...
research
11/05/2020

Lessons Learnt from a 2FA roll out within a higher education organisation

Rolling out a new security mechanism in an organisation requires plannin...
research
05/14/2022

Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption

Behavior change ideas from health psychology can also help boost end use...
research
06/26/2023

MFDPG: Multi-Factor Authenticated Password Management With Zero Stored Secrets

While password managers are a vital tool for internet security, they can...
research
05/05/2023

Multimodal User Authentication in Smart Environments: Survey of User Attitudes

As users shift from interacting actively with devices with screens to in...
research
10/17/2022

A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version)

Heuristics for user experience state that users will transfer their expe...
research
06/13/2023

Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance

Since the introduction of bcrypt in 1999, adaptive password hashing func...

Please sign up or login with your details

Forgot password? Click here to reset