Overall, the results from this survey were very
positive with some very valuable feedback, all of
which can be applied to a future version. From the
survey, everyone agreed the system is usable,
although there is a variation in SUS scores suggesting
those more technically inclined found it easier to use
the prototype and therefore gave a better SUS score.
Two participants suggested improving setup
instructions such as providing a native modal that is
part of the module system and multimedia for better
visual understanding.
5 CONCLUSIONS
This paper proposed an alternative approach to the
traditional authentication methods with the objective
of migrating users towards a choice-based system.
This would allow users to choose their own methods
that suit their needs and circumstances therefore
addressing usability yet also ensuring improved
security. The discussed solution is designed with
modularity, ensuring easy upgradability and
futureproofing against emerging threats through a
plugin system and API allowing developers to create
custom authentication methods whilst gradually
phasing out less secure methods. The proposed
solution framework consists of risk-based
authentication, multi-factor authentication, and
choice. These three components in cooperation with
a modular plugin system allow for the best of existing
solutions to come together and act as the barebones
for future extending with one new component, user
choice. Overall, this offers a flexible and user-centric
approach that addresses the limitations of password-
based authentication, promotes usability, and adapts
to evolving security challenges however future work
is needed to determine the best method of
implementation. For example, a further area for
improvement can include setting choice conditions
ensuring for example at least one ‘Something you
know’ in combination with ‘Something you are’ or
‘Something you have’ have been selected to add
variation to authentication flows.
ACKNOWLEDGEMENTS
The authors would like to thank the participants who
took part in the survey.
REFERENCES
Ahmed, E., DeLuca, B., Hirowski, E., Magee, C., Tang, I.
and Coppola, J. F. (2017). Biometrics: Password
replacement for elderly? In IEEE Long Island Systems,
Applications and Technology Conference (LISAT).
DOI: 10.1109/LISAT.2017.8001958
Baker, C., Hutton, G., Christie, L. and Wright, S. (2020).
COVID-19 and the digital divide [online]. Available
from: https://post.parliament.uk/covid-19-and-the-
digital-divide/ [Accessed 17 Feb 2023].
Bisogni F. and Asghari H. (2020). More Than a Suspect:
An Investigation into the Connection Between Data
Breaches, Identity Theft, and Data Breach Notification
Laws. Journal of Information Policy, vol 10, pp. 45-82.
DOI: 10.5325/jinfopoli.10.2020.0045
Brehm, J. W. (1966) A theory of psychological reactance,
New York: Academic Press.
Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R.,
Perlner, R. and Smith-Tone, D. (2016). Report on Post-
Quantum Cryptography. Available from:
https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.810
5.pdf. DOI: 10.6028/NIST.IR.8105
Choi, N. G. and DiNitto, D. M. (2013). The Digital Divide
among Low-Income Homebound Older Adults:
Internet Use Patterns, eHealth Literacy, and Attitudes
toward Computer/Internet Use”, Journal of Medical
Internet Research, vol 15 (5). DOI: 10.2196/jmir.2645
Dutson, J., Allen, D., Eggett, D. and Seamons, K. (2019).
Don’t Punish all of us: Measuring User Attitudes about
Two-Factor Authentication. In IEEE European
Symposium on Security and Privacy Workshops
(EuroS&PW), 17-19 June 2019. DOI: 10.1109/
EuroSPW.2019.00020
GDPR.eu, 2018. What Is GDPR, the EU’s New Data
Protection law? [online]. Available from:
https://gdpr.eu/what-is-gdpr/, [Accessed 12 June 2023].
Golosova, J. and Romanovs, A. (2018). The Advantages
and Disadvantages of the Blockchain Technology”, In
IEEE 6th Workshop on Advances in Information,
Electronic and Electrical Engineering (AIEEE).
Habib, H., Emami-Naeini, P., Devlin, S., Oates, M.,
Swoopes, C., Bauer, L., Christin, N. and Cranor, L.
(2018). User Behaviors and Attitudes Under Password
Expiration Policies. In Proceedings of the 14th USENIX
Conference on Usable Privacy and Security (SOUPS).
IBM, “What is Quantum Computing? [online]”, Available
from: https://www.ibm.com/topics/quantum-
computing , [Accessed 29 July 2023].
International Organization for Standardisation. (2018). ISO
9241-11: 2018 Ergonomics of human-system
interaction. Part 11: Usability: Definitions and
concepts.
Kelley, P. G., Komanduri, S., Mazurek, M. L., Shay, R.,
Vidas, T., Bauer, L., Christin, N., Cranor, L. F. and
Lopez, J. (2012). Guess Again (and Again and Again):
Measuring Password Strength by Simulating Password-
Cracking Algorithms. In IEEE Symposium on Security
and Privacy, 20-23 May 2012. DOI:
10.1109/SP.2012.38