{"id":"https://openalex.org/W1971006483","doi":"https://doi.org/10.1108/09685220410530816","title":"A long\u2010term trial of alternative user authentication technologies","display_name":"A long\u2010term trial of alternative user authentication technologies","publication_year":2004,"publication_date":"2004-04-01","ids":{"openalex":"https://openalex.org/W1971006483","doi":"https://doi.org/10.1108/09685220410530816","mag":"1971006483"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220410530816","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033160778","display_name":"Steven Furnell","orcid":"https://orcid.org/0000-0003-0984-7542"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"S.M. Furnell","raw_affiliation_strings":["Network Research Group, School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Network Research Group, School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059921314","display_name":"I. Papadopoulos","orcid":null},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"I. Papadopoulos","raw_affiliation_strings":["Network Research Group, School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Network Research Group, School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058161825","display_name":"Paul Haskell\u2010Dowland","orcid":"https://orcid.org/0000-0003-1365-0929"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"P. Dowland","raw_affiliation_strings":["Network Research Group, School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Network Research Group, School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.172,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":37,"citation_normalized_percentile":{"value":0.957626,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":"12","issue":"2","first_page":"178","last_page":"190"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication Methods and Security Measures","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication Methods and Security Measures","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Detection and Prevention of Phishing Attacks","score":0.9842,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12268","display_name":"Detection of Deception in Communication and Interrogation","score":0.9769,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.7544725},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication","score":0.594788},{"id":"https://openalex.org/keywords/continuous-authentication","display_name":"Continuous Authentication","score":0.575246},{"id":"https://openalex.org/keywords/passwords","display_name":"Passwords","score":0.571873},{"id":"https://openalex.org/keywords/graphical-passwords","display_name":"Graphical Passwords","score":0.56836},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.545433},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.45620087}],"concepts":[{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.7544725},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74300706},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7047883},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6960362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.54764175},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5243571},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.45620087},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.42802632},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.34328818},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3329811},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.19909865},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16501805},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.08293536}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220410530816","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":7,"referenced_works":["https://openalex.org/W2030077580","https://openalex.org/W2036862790","https://openalex.org/W2077513891","https://openalex.org/W2149929743","https://openalex.org/W2342091124","https://openalex.org/W2512997012","https://openalex.org/W3023580939"],"related_works":["https://openalex.org/W4385828295","https://openalex.org/W2969720675","https://openalex.org/W2936467198","https://openalex.org/W2596869006","https://openalex.org/W2183044514","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2048203748","https://openalex.org/W1987516957","https://openalex.org/W165936246"],"abstract_inverted_index":{"Modern":[0],"IT":[1],"systems":[2,17],"have":[3,136],"a":[4,26,76,100,121,179],"continued":[5],"requirement":[6],"for":[7,34,123],"reliable":[8],"user":[9],"authentication":[10,159],"at":[11],"login.":[12],"However,":[13,130],"the":[14,32,40,72,82,87,91,111,115,137,141,144,155,169,173],"majority":[15],"of":[16,25,28,42,55,79,90,102,110,117,143,157,176,182],"are":[18],"still":[19],"using":[20,46,147],"username/password":[21],"combinations,":[22],"in":[23,62],"spite":[24],"variety":[27],"recognised":[29],"weaknesses.":[30],"Identifies":[31],"need":[33],"improved":[35],"login":[36],"authentication,":[37],"and":[38,49,171],"investigates":[39],"suitability":[41],"two":[43],"alternative":[44,158],"methods,":[45],"cognitive":[47],"questions":[48],"an":[50,63],"image\u2010based":[51],"PIN.":[52],"The":[53],"effectiveness":[54],"these":[56],"techniques":[57,119,160],"has":[58],"already":[59],"been":[60],"evaluated":[61],"earlier":[64],"study,":[65],"which":[66],"assessed":[67],"users'":[68,95],"ability":[69],"to":[70,139,167],"recall":[71],"necessary":[73],"information":[74],"after":[75],"prolonged":[77],"period":[78,101],"inactivity.":[80],"Here,":[81],"evaluation":[83],"is":[84,161,165],"focused":[85],"on":[86],"perceived":[88],"acceptability":[89],"techniques,":[92],"based":[93],"upon":[94],"longer\u2010term":[96],"opinions":[97],"arising":[98],"from":[99],"regular":[103],"usage.":[104],"Discovers":[105],"that":[106,133],"56":[107],"per":[108],"cent":[109],"participants":[112],"would":[113],"support":[114],"use":[116,156],"such":[118],"as":[120],"replacement":[122],"traditional":[124],"password":[125],"or":[126],"numeric":[127],"PIN\u2010based":[128],"authentication.":[129],"also":[131],"discovers":[132],"some":[134],"users":[135],"potential":[138],"compromise":[140],"security":[142],"methods":[145,177],"by":[146],"them":[148],"inappropriately.":[149],"As":[150],"such,":[151],"concludes":[152],"that,":[153],"although":[154],"viable,":[162],"further":[163],"research":[164],"needed":[166],"refine":[168],"approaches":[170],"identify":[172],"best":[174],"combination":[175],"across":[178],"larger":[180],"base":[181],"users.":[183]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1971006483","counts_by_year":[{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":2}],"updated_date":"2024-11-18T18:09:33.424941","created_date":"2016-06-24"}