64,310 research outputs found
A Comparative Usability Study of Two-Factor Authentication
Two-factor authentication (2F) aims to enhance resilience of password-based
authentication by requiring users to provide an additional authentication
factor, e.g., a code generated by a security token. However, it also introduces
non-negligible costs for service providers and requires users to carry out
additional actions during the authentication process. In this paper, we present
an exploratory comparative study of the usability of 2F technologies. First, we
conduct a pre-study interview to identify popular technologies as well as
contexts and motivations in which they are used. We then present the results of
a quantitative study based on a survey completed by 219 Mechanical Turk users,
aiming to measure the usability of three popular 2F solutions: codes generated
by security tokens, one-time PINs received via email or SMS, and dedicated
smartphone apps (e.g., Google Authenticator). We record contexts and
motivations, and study their impact on perceived usability. We find that 2F
technologies are overall perceived as usable, regardless of motivation and/or
context of use. We also present an exploratory factor analysis, highlighting
that three metrics -- ease-of-use, required cognitive efforts, and
trustworthiness -- are enough to capture key factors affecting 2F usability.Comment: A preliminary version of this paper appears in USEC 201
Recommended from our members
The elicitation of key performance indicators of e-government providers: A bottom-up approach
Copyright @ 2013 EMCIS.Delivering an adequate e-Government service (e-service) is becoming more of a necessity in today's digital world. In order to improve e-services and increase the engagement of both users' and providers' side, studies on the performance evaluation of such provided e-services are taking places. However a clear identification of the key performance indicators from the e-Government providersâ side is not well explored. This shortcoming hampers the conduct of a holistic evaluation of an e-service provision from the perspective of its stakeholders in order to improve e-services as well as to increase e-services take-ups. In this paper, a systematic process to identify indicators is implemented based on a bottom-up approach. The process used three focus-group meetings with providers, users, and academics in Qatar, Lebanon and UK to collect, identify and validate key indicators from the perspective of e-servicesâ providers. The approach resulted in the identification of five factors levels (service, technology, employees, policy and management and social responsibilities) with fifteen sub-categories of SMART variables. Hence, leading to the development of a new model, STEPS, that can fully explain and predict e-government success from the providersâ point of view. It will work as a strategic management tool to align various stakeholders on common goal and values based on evidence based evaluation of e-services using smart measurable indicators for the improvement of an e-service at the engagement level in the field of e-government. In addition, other fields can benefit from the outcome of this work, such as logistics service providers, who make their services available across new and existing relationships between the Internet commerce firms, their customers, and their vendors
Recommended from our members
Importance-performance analysis of retail website service quality
This study intends to empirically explore the customerâs perceived ranking of the importance of a range of on-line services, and their perceptions of the retailersâ performance in delivering these services. An online questionnaire survey has been conducted to gather the data from respondents. The data was analysed using Importance-Performance Analysis (IPA). The findings suggest areas of e-service quality where retailers could improve, based on the customersâ perceptions of the retailersâ performance against the importance of some e-service quality features and/or services on offer. Consequently, this study highlights that retailers should take active steps to understand their customersâ requirements, before developing an online customer services strategy. From a practical perspective, retailers could also apply the questionnaire developed for this study to canvas the opinions of customers, to help identify areas in which their performance needs to be improved
Recommended from our members
A theoretical model for the application of Web 2.0 in e-Government
Government organisations in many countries have started embracing modern technologies such as second generation web (Web 2.0) in an attempt to maximize on the benefits of these technologies as well as keeping up with the current trend. Nevertheless, the advancement and the adoption of these of technologies is in its initial stages in the public sector. Therefore, the research problem is that the literature surrounding the application of Web 2.0 is still highly tentative and exploratory. In particular, there is a lack of research exploring the application of Web 2.0 technologies in the context of local e-Government. This study aims to address this research problem by presenting a comprehensive decision-making tool to aid the effective application of Web 2.0 technologies amongst local government authorities (LGAs). In doing so, resulting in the development of a theoretical model that is underpinned by information systems evaluation criteria and impact factors of Web 2.0 from an internal organizational perspective. By addressing the research problem, this study will make a significant contribution to the normative literature by providing new insights of Web 2.0 technologies within the public sector. This will be of specific relevance to scholars, policy makers, LGAs and practitioners who are interested in the adoption of Web 2.0 technologies in an e-Government context. This paper presents the proposed theoretical model and is largely devoted to an explanation on the development of the model
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
The biological immune system (BIS) is characterized by networks of cells, tissues, and
organs communicating and working in synchronization. It also has the ability to learn,
recognize, and remember, thus providing the solid foundation for the development
of Artificial Immune System (AIS). Since the emergence of AIS, it has proved itself
as an area of computational intelligence. Real-Valued Negative Selection Algorithm
with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated
its potentials in the field of anomaly detection. The V-Detectors algorithm depends
greatly on the random detectors generated in monitoring the status of a system.
These randomly generated detectors suffer from not been able to adequately cover
the non-self space, which diminishes the detection performance of the V-Detectors
algorithm. This research therefore proposed CSDE-V-Detectors which entail the
use of the hybridization of Cuckoo Search (CS) and Differential Evolution (DE) in
optimizing the random detectors of the V-Detectors. The DE is integrated with CS
at the population initialization by distributing the population linearly. This linear
distribution gives the population a unique, stable, and progressive distribution process.
Thus, each individual detector is characteristically different from the other detectors.
CSDE capabilities of global search, and use of LÂŽevy flight facilitates the effectiveness
of the detector set in the search space. In comparison with V-Detectors, cuckoo search,
differential evolution, support vector machine, artificial neural network, našıve bayes,
and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms
other algorithms with an average detection rate of 95:30% on all the datasets. This
signifies that CSDE-V-Detectors can efficiently attain highest detection rates and
lowest false alarm rates for anomaly detection. Thus, the optimization of the randomly
detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly
detection tasks
TB STIGMA â MEASUREMENT GUIDANCE
TB is the most deadly infectious disease in the world, and stigma continues to play a significant role in worsening the epidemic. Stigma and discrimination not only stop people from seeking care but also make it more difficult for those on treatment to continue, both of which make the disease more difficult to treat in the long-term and mean those infected are more likely to transmit the disease to those around them. TB Stigma â Measurement Guidance is a manual to help generate enough information about stigma issues to design and monitor and evaluate efforts to reduce TB stigma. It can help in planning TB stigma baseline measurements and monitoring trends to capture the outcomes of TB stigma reduction efforts. This manual is designed for health workers, professional or management staff, people who advocate for those with TB, and all who need to understand and respond to TB stigma
- âŠ