Usability and Security of Different Authentication Methods for an Electronic Health Records System

02/23/2021
by   Saptarshi Purkayastha, et al.
0

We conducted a survey of 67 graduate students enrolled in the Privacy and Security in Healthcare course at Indiana University Purdue University Indianapolis. This was done to measure user preference and their understanding of usability and security of three different Electronic Health Records authentication methods: single authentication method (username and password), Single sign-on with Central Authentication Service (CAS) authentication method, and a bio-capsule facial authentication method. This research aims to explore the relationship between security and usability, and measure the effect of perceived security on usability in these three aforementioned authentication methods. We developed a formative-formative Partial Least Square Structural Equation Modeling (PLS-SEM) model to measure the relationship between the latent variables of Usability, and Security. The measurement model was developed using five observed variables (measures). - Efficiency and Effectiveness, Satisfaction, Preference, Concerns, and Confidence. The results obtained highlight the importance and impact of these measures on the latent variables and the relationship among the latent variables. From the PLS-SEM analysis, it was found that security has a positive impact on usability for Single sign-on and bio-capsule facial authentication methods. We conclude that the facial authentication method was the most secure and usable among the three authentication methods. Further, descriptive analysis was done to draw out the interesting findings from the survey regarding the observed variables.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/01/2020

More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication

Risk-based Authentication (RBA) is an adaptive security measure to stren...
research
07/01/2019

Geographical Security Questions for Fallback Authentication

Fallback authentication is the backup authentication method used when th...
research
08/18/2020

Evaluation of Risk-based Re-Authentication Methods

Risk-based Authentication (RBA) is an adaptive security measure that imp...
research
11/26/2018

Which One to Go: Security and Usability Evaluation of Mid-Air Gestures

With the emerging of touch-less human-computer interaction techniques an...
research
10/12/2017

An empirical study of touch-based authentication methods on smartwatches

The emergence of smartwatches poses new challenges to information securi...
research
08/13/2020

Costs and benefits of authentication advice

When it comes to passwords, conflicting advice can be found everywhere. ...
research
04/19/2021

BrFAST: a Tool to Select Browser Fingerprinting Attributes for Web Authentication According to a Usability-Security Trade-off

In this demonstration, we put ourselves in the place of a website manage...

Please sign up or login with your details

Forgot password? Click here to reset