Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites
Abstract
:1. Introduction
1.1. Sustainable Security
1.2. Usable Security
1.3. Passwords
1.3.1. Password Policies
1.3.2. Password Meters
2. Related Work
3. Methodology
4. Results
4.1. Sign-Up Process
4.2. Sign-In Process
4.3. Recovery Process
5. Discussion
5.1. Using Other Accounts for Sign-Up
5.2. Masked and Unmasked Passwords
5.3. Retyping Passwords
5.4. Password Rules
5.5. Password Meter
5.6. Recovery Process
6. Recommendations
- Forcing users to abide by specific password rules may help attackers guess a password. Thus, the researcher observed that large companies, such as Google, do not ask users to satisfy specific requirements for newly generated passwords. The researcher believes that this could make the task of guessing more complicated.
- When developers insist on enforcing many password rules, they should all be explicitly shown to users. Developers should not have implicit rules that are discovered only when users break them. This practice wastes users’ time. Implicit rules, such as prohibiting the repetition of the same number, should be shown as tips or “other rules”.
- Two-factor or multi-factor authentication should be mandatory for websites that have sensitive user information, such as those of banks or hospitals. This two-factor or multi-factor authentication should be optional for other websites to enhance usability.
- Regarding two-factor authentication, users should be granted an alternative option for login when the second factor is unavailable.
- Users should be aware of any login from unrecognized (not registered devices) via email, containing information about the login, such as the type of the device, the location of the login, and the I.P.
- Developers should be required to grant more than one method for password recovery.
- Developers should ask users to perform a security checkup periodically. This checkup should include removing outdated devices, checking recent security events, and updating recovery methods if needed.
- Developers should harness the power of mobile devices that can use the features of biometrics as a method of authentication.
- When using the “stay signed in” feature, developers should treat this feature as opted out, unless the user opts in this feature.
7. Limitations and Future Work
8. Conclusions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Category | Website | Primary Key | Accept Other Accounts | Pass Eye | Pass Rules | Pass Meter | Pass Retype | Robot Check | Verification |
---|---|---|---|---|---|---|---|---|---|
Reservation | Hotels | √ | × | √ | √ | × | × | × | |
Booking | √ | √ | √ | × | √ | × | × | ||
Airbnb | Email/# | √ | √ | √ | √ | × | × | × | |
Bonvoy | √ | × | √ | √ | √ | × | × | ||
Social Media | Email/# | × | × | × | × | × | × | √ | |
Snapchat | # | × | √ | × | √ | × | × | √ | |
TikTok | Email/# | √ | √ | √ | √ | × | √ | √ | |
Email/# | × | √ | √ | √ | × | × | √ | ||
Shopping | Alibaba | × | × | √ | √ | √ | × | √ both | |
Amazon | × | × | √ | × | √ | × | √ | ||
eBay | √ | √ | √ | √ | × | × | × | ||
Rakuten | √ | √ | √ | √ | × | √ | × | ||
Entertainment | Dailymotion | √ | √ | √ | √ | × | √ | √ | |
IMDb | √ | × | √ | × | √ | × | √ | ||
Netflix | √ | × | × | √ | × | × | × | ||
Spotify | √ | × | × | √ | × | √ | Retype | ||
Tech. Comp. | New email | × | √ | √ | × | √ | × | N.A. | |
Apple | × | × | √ | √ | √ | √ | √ both | ||
HUAWEI | Email/# | × | √ | √ | × | × | √ | Email = √ # = optl | |
Microsoft | Email/ New email/# | × | √ | × | × | × | √ | N.A. |
Appendix B
Website | Sign-in Options | Email Every Time | Pass Every Time | Pass Eye | Robot Check | Stay Signed In | Account Lock | Comments |
---|---|---|---|---|---|---|---|---|
Hotels | √ | √ | × | √ | Default = × | × | Robot after 10 failed attempts | |
Booking | × | × | √ | × | × | √ | Locked after 15 fails | |
Airbnb | Email/# | × | × | √ | √ | × | × | Robot after five fails (not every time), unless user enters the correct pass |
Bonvoy | Email/ Member ID | √ | √ | × | × | Default = × | × | N.A. |
Email/ Member ID | × | √ | √ | × | × | √ | Lock for a few mins after 20 fails + Limit user activities | |
Snapchat | Email/ Username | × | √ | × | × | × | × * | Register using only phone, but sign-in using different options |
TikTok | Email/# | × | √ | × | √ | × | √ | Robot after first fail/Shows how many attempts left/Lock for 30 min |
#/Email/ Username | × | √ | × | × | × | × | N.A. | |
Alibaba | Email/# | × | √ | × | × | Default = √ | × | A few failed attempts > refresh the page to enter the email again |
Amazon | Email/# | × | √ | × | × | × | × | After five attempts > takes user to the option of receiving code through email |
eBay | × | √ | × | √ | Default = √ | × | Robot after three failed attempts | |
Rakuten | × | × | × | √ | × | × | Robot with every attempt | |
Dailymotion | × | × | √ | × | × | × | N.A. | |
IMDb | × | √ | × | √ | Default = √ | × | After three fails > robot check every time No lock, but user directed to email code | |
Netflix | ×/√ | √ | √ | × | Default = √ | √ | Email entered after 20 failed attempts Lock for a few mins | |
Spotify | × | × | × | × | Default = √ | √ | Not clear when it is locked | |
× | √ | √ | √ | × | × | Robot after 30 failed attempts | ||
Apple | × | √ | × | × | Default = × | √ | After 10 attempts > locked | |
HUAWEI | Email/ User ID | × | √ | √ | √ | × | √ | Robot after first failed attempt Showed number of remaining attempts after every five fails > lock for 5 min |
Microsoft | × | √ | × | × | Default = × | √ | After 10 fails > locked |
References
- Florencio, D.; Herley, C. A large-scale study of web password habits. In Proceedings of the 16th International Conference on World Wide Web, Banff, AB, Canada, 12–14 May 2007. [Google Scholar]
- Abdrabou, Y.; Schütte, J.; Shams, A.; Pfeuffer, K.; Buschek, D.; Khamis, M.; Alt, F. “Your Eyes Tell You Have Used This Password Before”: Identifying Password Reuse from Gaze and Keystroke Dynamics. In Proceedings of the CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April–5 May 2022. [Google Scholar]
- Albesher, A.S.; Alhussain, T. Privacy and security issues in social networks: An evaluation of Facebook. In Proceedings of the 2013 International Conference on Information Systems and Design of Communication, Lisbon, Portugal, 11–12 July 2013. [Google Scholar]
- Albesher, A.S.; Alhussain, T. Evaluating and Comparing the Usability of Privacy in WhatsApp, Twitter, and Snapchat. IJACSA 2021, 12, 251–259. [Google Scholar] [CrossRef]
- Atzeni, A.; Faily, S.; Galloni, R. Usable security. In Encyclopedia of Information Science and Technology, 4th ed.; Mehdi Khosrow-Pour, D.B.A., Ed.; IGI Global: Hershey, PA, USA, 2018; pp. 5004–5013. [Google Scholar] [CrossRef]
- Caputo, D.D.; Pfleeger, S.L.; Sasse, M.A.; Ammann, P.; Offutt, J.; Deng, L. Barriers to usable security? Three organizational case studies. IEEE Secur. Priv. 2016, 14, 22–32. [Google Scholar] [CrossRef]
- Egelman, S.; King, J.; Miller, R.C.; Ragouzis, N.; Shehan, E. Security user studies: Methodologies and best practices. In Proceedings of the CHI’07 extended abstracts on Human factors in computing systems, San Jose, CA, USA, 28 April–3 May 2007. [Google Scholar]
- Aslam, M.; Khan Abbasi, M.A.; Khalid, T.; Shan, R.u.; Ullah, S.; Ahmad, T.; Saeed, S.; Alabbad, D.A.; Ahmad, R. Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance. Sensors 2022, 22, 9338. [Google Scholar] [CrossRef]
- Huh, J.H.; Kim, H.; Rayala, S.S.; Bobba, R.B.; Beznosov, K. I’m too busy to reset my LinkedIn password: On the effectiveness of password reset emails. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO, USA, 6–11 May 2017. [Google Scholar]
- Routh, C.; DeCrescenzo, B.; Roy, S. Attacks and vulnerability analysis of e-mail as a password reset point. In Proceedings of the 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, FL, USA, 24–25 February 2018. [Google Scholar]
- Karim, N.A.; Shukur, Z.; AL-banna, A.M. UIPA: User authentication method based on user interface preferences for account recovery process. J. Inf. Secur. Appl. 2020, 52, 102466. [Google Scholar] [CrossRef]
- Lee, K.; Sjöberg, S.; Narayanan, A. Password policies of most top websites fail to follow best practices. In Proceedings of the Eighteenth Symposium on Usable Privacy and Security, Boston, MA, USA, 8–9 August 2022. [Google Scholar]
- Seitz, T.; Hartmann, M.; Pfab, J.; Souque, S. Do differences in password policies prevent password reuse? In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, Denver, CO, USA, 6–11 May 2017. [Google Scholar]
- Gerlitz, E.; Häring, M.; Smith, M. Please do not use!? or your License Plate Number: Analyzing Password Policies in German Companies. In Proceedings of the Seventeenth Symposium on Usable Privacy and Security, Virtual, 9–10 August 2021. [Google Scholar]
- Maoneke, P.B.; Flowerday, S. Password policies adopted by South African organizations: Influential factors and weaknesses. In Proceedings of the International Information Security Conference, New York, NY, USA, 25 January 2019; Springer: Cham, Switzerland, 2019. [Google Scholar]
- Al-Slais, Y.; El-Medany, W.M. User-centric adaptive password policies to combat password fatigue. Int. Arab. J. Inf. Technol. 2022, 19, 55–62. [Google Scholar] [CrossRef]
- Grilo, M.; Campos, J.; Ferreira, J.F.; Almeida, J.B.; Mendes, A. Verified password generation from password composition policies. In Proceedings of the International Conference on Integrated Formal Methods, Lugano, Switzerland, 1 June 2022; Springer: Cham, Switzerland. [Google Scholar]
- Sreesailam, V.B.; Pentakota, D.G.; Pappala, T.; Kopanati, S.; Siripurapu, C.P. A Novel Methodology Proposed To Produce A Secure Password. J. Pharm. Negat. Results 2022, 13, 5142–5150. [Google Scholar] [CrossRef]
- Zimmermann, V.; Marky, K.; Renaud, K. Hybrid password meters for more secure passwords—A comprehensive study of password meters including nudges and password information. Behav. Inf. Technol. 2022, 42, 700–743. [Google Scholar] [CrossRef]
- Stainbrook, M.; Caporusso, N. Comparative evaluation of security and convenience trade-offs in password generation aiding systems. In Proceedings of the International Conference on Applied Human Factors and Ergonomics, Washington, DC, USA, 6 June 2019; Springer: Cham, Switzerland, 2019. [Google Scholar]
- Abdrabou, Y.; Abdelrahman, Y.; Khamis, M.; Alt, F. Think Harder! Investigating the Effect of Password Strength on Cognitive Load during Password Creation. In Proceedings of the CHI Conference on Human Factors in Computing Systems Extended Abstracts, Yokohama, Japan, 18–13 May 2021. [Google Scholar]
- Bojato, J.; Donado, D.; Jimeno, M.; Moreno, G.; Villanueva-Polanco, R. Password Guessability as a Service (PGaaS). Appl. Sci. 2022, 12, 1562. [Google Scholar] [CrossRef]
- Jiang, J.; Zhou, A.; Liu, L.; Zhang, L. OMECDN: A Password-Generation Model Based on an Ordered Markov Enumerator and Critic Discriminant Network. Appl. Sci. 2022, 12, 12379. [Google Scholar] [CrossRef]
- Lee, K.; Yim, K. Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication. Appl. Sci. 2020, 10, 1286. [Google Scholar] [CrossRef] [Green Version]
- Hong, K.H.; Lee, B.M. A Deep Learning-Based Password Security Evaluation Model. Appl. Sci. 2022, 12, 2404. [Google Scholar] [CrossRef]
- Baig, A.F.; Eskeland, S. Security, Privacy, and Usability in Continuous Authentication: A Survey. Sensors 2021, 21, 5967. [Google Scholar] [CrossRef] [PubMed]
- Oogami, W.; Gomi, H.; Yamaguchi, S.; Yamanaka, S.; Higurashi, T. Observation study on usability challenges for fingerprint authentication using WebAuthn-enabled android smartphones. In Proceedings of the USENIX Symposium on Usable Privacy and Security, Boston, MA, USA, 9–11 August 2020. [Google Scholar]
- Marasco, E.; Albanese, M.; Patibandla, V.V.R.; Vurity, A.; Sriram, S.S. Biometric multi-factor authentication: On the usability of the FingerPIN scheme. Secur. Priv. 2022, 6, e261. [Google Scholar] [CrossRef]
- Stergiadis, C.; Kostaridou, V.-D.; Veloudis, S.; Kazis, D.; Klados, M.A. A Personalized User Authentication System Based on EEG Signals. Sensors 2022, 22, 6929. [Google Scholar] [CrossRef] [PubMed]
- Reese, K.; Smith, T.; Dutson, J.; Armknecht, J.; Cameron, J.; Seamons, K. A Usability Study of Five {Two-Factor} Authentication Methods. In Proceedings of the Fifteenth Symposium on Usable Privacy and Security, Santa Clara, CA, USA, 12–13 August 2019. [Google Scholar]
- İşler, D.; Küpçü, A.; Coskun, A. User perceptions of security and usability of mobile-based single password authentication and two-factor authentication. In Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, Luxembourg, 20 September 2019; Springer: Cham, Switzerland, 2019; pp. 99–117. [Google Scholar]
- Sun, Y.; Zhu, S.; Zhao, Y.; Sun, P.A. User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks. In Proceedings of the 2022 IEEE Conference on Communications and Network Security, Austin, TX, USA, 3–5 October 2022. [Google Scholar]
- Peeters, C.; Patton, C.; Munyaka, I.N.; Olszewski, D.; Shrimpton, T.; Traynor, P. SMS OTP Security (SOS) Hardening SMS-Based Two Factor Authentication. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May–3 June 2022. [Google Scholar]
- Marky, K.; Ragozin, K.; Chernyshov, G.; Matviienko, A.; Schmitz, M.; Mühlhäuser, M.; Eghtebas, C.; Kunze, K. “Nah, it’s just annoying!” A Deep Dive into User Perceptions of Two-Factor Authentication. ACM Trans. Comput.-Hum. Interact. 2022, 29, 1–32. [Google Scholar] [CrossRef]
- Bruzgiene, R.; Jurgilas, K. Securing Remote Access to Information Systems of Critical Infrastructure Using Two-Factor Authentication. Electronics 2021, 10, 1819. [Google Scholar] [CrossRef]
- Yıldırım, M.; Mackie, I. Encouraging users to improve password security and memorability. Int. J. Inf. Secur. 2019, 18, 741–759. [Google Scholar] [CrossRef] [Green Version]
- Woods, N.; Siponen, M. Improving password memorability, while not inconveniencing the user. Int. J. Hum.-Comput. Stud. 2019, 128, 61–71. [Google Scholar] [CrossRef]
- Guo, Y.; Zhang, Z.; Guo, Y. Optiwords: A new password policy for creating memorable and strong passwords. Comput. Secur. 2019, 85, 423–435. [Google Scholar] [CrossRef]
- Alodhyani, F.; Theodorakopoulos, G.; Reinecke, P. Password Managers—It’s All about Trust and Transparency. Future Internet 2020, 12, 189. [Google Scholar] [CrossRef]
- Chaudhary, S.; Schafeitel-Tähtinen, T.; Helenius, M.; Berki, E. Usability, security and trust in password managers: A quest for user-centric properties and features. Comput. Sci. Rev. 2019, 33, 69–90. [Google Scholar] [CrossRef]
- Avram, C.; Machado, J.; Aştilean, A. Hardware Passwords Manager Based on Biometric Authentication. Eng. Proc. 2021, 6, 31. [Google Scholar] [CrossRef]
- Furnell, S. An assessment of website password practices. Comput. Secur. 2007, 26, 445–451. [Google Scholar] [CrossRef]
- Furnell, S.; Bär, N. Essential lessons still not learned? Examining the password practices of end-users and service providers. In Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust, Las Vegas, NV, USA, 21–26 July 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 217–225. [Google Scholar]
- Furnell, S. Assessing website password practices—Over a decade of progress? Comput. Fraud Secur. 2018, 7, 6–13. [Google Scholar] [CrossRef]
- Furnell, S. Assessing website password practices—Unchanged after fifteen years? Comput. Secur. 2022, 120, 102790. [Google Scholar] [CrossRef]
- Cho, G.; Huh, J.; Kim, S.; Cho, J.; Park, H.; Lee, Y.; Beznosov, K.; Kim, H. On the security and usability implications of providing multiple authentication choices on smartphones: The more, the better? ACM TOPS 2020, 23, 1–32. [Google Scholar] [CrossRef]
- Kruzikova, A.; Knapova, L.; Smahel, D.; Dedkova, L.; Matyas, V. Usable and secure? User perception of four authentication methods for mobile banking. Comput. Secur. 2022, 115, 102603. [Google Scholar] [CrossRef]
- Braz, C.; Seffah, A.; Naqvi, B. Integrating a Usable Security Protocol into User Authentication Services Design Process; Auerbach Publications: Boca Raton, FL, USA, 2018. [Google Scholar]
- Alismail, M.A.; Albesher, A.S. Evaluating Developer Responses to App Reviews: The Case of Mobile Banking Apps in Saudi Arabia and the United States. Sustainability 2023, 15, 6701. [Google Scholar] [CrossRef]
- Mardani, A.; Jusoh, A.; Zavadskas, E.; Cavallaro, F.; Khalifah, Z. Sustainable and renewable energy: An overview of the application of multiple criteria decision making techniques and approaches. Sustainability 2015, 7, 13947–13984. [Google Scholar] [CrossRef] [Green Version]
- Agrawal, A.; Alenezi, M.; Kumar, R.; Khan, R.A. A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications. Symmetry 2020, 12, 448. [Google Scholar] [CrossRef] [Green Version]
- Sadik, S.; Ahmed, M.; Sikos, L.F.; Islam, A.K.M.N. Toward a Sustainable Cybersecurity Ecosystem. Computers 2020, 9, 74. [Google Scholar] [CrossRef]
- Venters, C.; Jay, C.; Lau, L.; Griffiths, M.K.; Holmes, V.; Ward, R.; Xu, J. Software sustainability: The modern tower of babel. In Proceedings of the Third International Workshop on Requirements Engineering for Sustainable Systems Co-located with 22nd International Conference on Requirements Engineering (RE 2014), Karlskrona, Sweden, 25 August 2014; Volume 1216, pp. 1–6. [Google Scholar]
- Calero, C.; Piattini, M. Puzzling out software sustainability. Sustain. Comput. Inform. Syst. 2019, 16, 117–124. [Google Scholar] [CrossRef]
- ISO 9241-11:2018; Ergonomics of Human-System Interaction—Part 11: Usability: Definitions and Concepts. ISO: Geneva, Switzerland, 2018.
- Nigel, B.; Carter, J.; Earthy, E.; Geis, T.; Harker, S. New ISO standards for usability, usability reports and usability measures. Lect. Notes Comput. Sci. 2016, 9731, 268–278. [Google Scholar]
- von Solms, B.; von Solms, R. Cybersecurity and information security—What goes where? Inf. Comput. Secur. 2018, 26, 2–9. [Google Scholar] [CrossRef]
- Di Nocera, F.; Tempestini, G. Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach. J. Cybersecur. Priv. 2022, 2, 245–256. [Google Scholar] [CrossRef]
- Alhejji, S.; Albesher, A.S.; Wahsheh, H.; Albarrak, A. Evaluating and Comparing the Usability of Mobile Banking Applications in Saudi Arabia. Information 2022, 13, 559. [Google Scholar] [CrossRef]
- Whitten, A.; Tygar, D. Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, 23–26 August 1999. [Google Scholar]
- Mathiasen, N.R.; Bødker, S. Threats or threads: From usable security to secure experience? In Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges, Lund, Sweden, 18–22 October 2008. [Google Scholar]
- Alharbi, J.A.; Albesher, A.S.; Wahsheh, H.A. An Empirical Analysis of E-Governments’ Cookie Interfaces in 50 Countries. Sustainability 2023, 15, 1231. [Google Scholar] [CrossRef]
- Ismailova, R. Web site accessibility, usability and security: A survey of government web sites in Kyrgyz Republic. Univers. Access Inf. Soc. 2017, 16, 257–264. [Google Scholar] [CrossRef]
- Naiakshina, A.; Danilova, A.; Tiefenau, C.; Smith, M. Deception task design in developer password studies: Exploring a student sample. In Proceedings of the Fourteenth Symposium on Usable Privacy and Security, Baltimore, MD, USA, 12–14 August 2018. [Google Scholar]
- Watanabe, Y.; Suzuki, H.; Naito, K.; Watanabe, A. Proposal for User Authentication Method Combining Random Number and Password. In Proceedings of the 2019 IEEE 8th Global Conference on Consumer Electronics GCCE, Osaka, Japan, 15–18 October 2019. [Google Scholar]
- Guan, A.; Chia-Mei, C. A Novel Verification scheme for Resisting Password Guessing Attacks. In Proceedings of the 2021 IEEE Conference on Dependable and Secure Computing, Aizuwakamatsu, Japan, 30 January–2 February 2021. [Google Scholar]
- Breitinger, F.; Tully-Doyle, R.; Hassenfeldt, C. A survey on smartphone user’s security choices, awareness and education. Comput. Secur. 2020, 88, 101647. [Google Scholar] [CrossRef]
- Siponen, M.; Puhakainen, P.; Vance, A. Can individuals’ neutralization techniques be overcome? A field experiment on password policy. Comput. Secur. 2020, 88, 101617. [Google Scholar] [CrossRef]
- Everett, C. Are passwords finally dying? Netw. Secur. 2016, 2, 10–14. [Google Scholar] [CrossRef]
- Marky, K.; Mayer, P.; Gerber, N.; Zimmermann, V. Assistance in daily password generation tasks. In Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, Singapore, 8–12 October 2018; pp. 786–793. [Google Scholar]
- Li, Y.; Haining Wang Kun, S. A study of personal information in human-chosen passwords and its security implications. In Proceedings of the IEEE INFOCOM 2016—The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016. [Google Scholar]
- Tsokkis, P.; Stavrou, E. A password generator tool to increase users’ awareness on bad password construction strategies. In Proceedings of the 2018 International Symposium on Networks, Computers and Communications, Rome, Italy, 19–21 June 2018; pp. 1–5. [Google Scholar]
- Das, A.; Joseph, J.; Caesar, M.; Borisov, N.; Wang, W. The tangled web of password reuse. In Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA, 23–26 February 2014. [Google Scholar]
- Florêncio, D.; Herley, C. Where do security policies come from? In Proceedings of the Sixth Symposium on Usable Privacy and Security, Redmond, WA, USA, 14–16 July 2010. [Google Scholar]
- Kariryaa, A.; Schöning, J. Moiprivacy: Design and evaluation of a personal password meter. In Proceedings of the 9th International Conference on Mobile and Ubiquitous Multimedia, Essen, Germany, 22–25 November 2020. [Google Scholar]
- Ur, B.; Alfieri, F.; Aung, M.; Bauer, L.; Christin, N.; Colnago, J.; Cranor, L.F.; Dixon, H.; Emami Naeini, P.; Habib, H.; et al. Design and evaluation of a data-driven password meter. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO, USA, 6–11 May 2017. [Google Scholar]
- Komanduri, S.; Shay, R.; Cranor, L.; Herley, C.; Schechter, S. Telepathwords: Preventing Weak Passwords by Reading Users’ Minds. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, 20–22 August 2014; pp. 591–606. [Google Scholar]
- Agholor, S.; Akinyemi, I. A Peer Pressure Method for Helping End-Users Generate Strong Passwords. Int. J. Cyber-Secur. Digit. 2018, 7, 480–488. [Google Scholar]
- Egelman, S.; Sotirakopoulos, A.; Muslukhov, I.; Beznosov, K.; Herley, C. Does my password go up to eleven? The impact of password meters on password selection. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France, 27 April–2 May 2013. [Google Scholar]
- Bhana, B.; Flowerday, S. Usability of the login authentication process: Passphrases and passwords. Inf. Comput. Secur. 2022, 30, 280–305. [Google Scholar] [CrossRef]
- Sahin, S.; Li, F. Don’t Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 15–19 November 2021. [Google Scholar]
- Jang, J.; Kim, H. Diverging influences of usability in online authentication system: The role of culture (US vs Korea). Int. J. Bank Mark. 2022, 40, 384–400. [Google Scholar] [CrossRef]
- Kawu, A.A.; Orji, R.; Awal, A.; Gana, U. Personality, Culture and Password Behavior: A relationship study. In Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, Windhoek, Namibia, 3–7 December 2018; pp. 1–4. [Google Scholar]
- Rasmussen, B. A Usability Study of FIDO2 Roaming Software Tokens as a Password Replacement. Doctoral Dissertation, Brigham Young University, Provo, UT, USA, 2021. [Google Scholar]
- Simmons, J.; Diallo, O.; Oesch, S.; Ruoti, S. Systematization of Password Manager Use Cases and Design Paradigms. In Proceedings of the Annual Computer Security Applications Conference, Virtual Event, 6–10 December 2021. [Google Scholar]
- Jeong, H.; Jung, H. Monopass: A password manager without master password authentication. In Proceedings of the 26th International Conference on Intelligent User Interfaces-Companion, College Station, TX, USA, 14–17 April 2021. [Google Scholar]
- Seitz, T.; Emanuel von Zezschwitz, E.; Meitner, S.; Hussmann, H. Influencing self-selected passwords through suggestions and the decoy effect. In Proceedings of the 1st European Workshop on Usable Security, Darmstadt, Germany, 18 July 2016. [Google Scholar]
- Seitz, T. Personalizing Password Policies and Strength Feedback. In Proceedings of the Second International Workshop on Personalization in Persuasive Technology co-located with the 12th International Conference on Persuasive Technology, PPT@PERSUASIVE 2017, Amsterdam, The Netherlands, 4 April 2017; pp. 64–69. [Google Scholar]
- Verkijika, S. An Evaluation of the Password Practices on Leading e-Commerce Websites in South Africa. Commun. Comput. Inf. Sci. 2019, 973, 104–114. [Google Scholar]
- Lee, S.H. Usability testing for developing effective interactive multimedia software: Concepts, dimensions, and procedures. J. Educ. Technol. Soc. 1999, 2, 2. [Google Scholar]
- Nielsen, J. Usability inspection methods. In Proceedings of the CHI ’94, Boston, Massachusetts, USA, 24–28 April 1994. [Google Scholar]
- Wilson, C. The Individual Expert Review. In User Interface Inspection Methods: A User-Centered Design Method, 1st ed.; Elsevier: Waltham, MA, USA, 2014; pp. 34–48. [Google Scholar]
- Alshar’em, M.A.R.W.A.N.; Zin, A.M.; Sulaiman, R.; Mokhtar, M.R. Evaluation of The TPM User Authentication Model for Trusted Computers. JATIT 2015, 81, 298–309. [Google Scholar]
- Krumsvik, O.A.; Babic, A.; Mugisha, A. Design Variations for Improved Usability of Mobile Data Capture in Rural Uganda. In Proceedings of the World Congress on Medical Physics and Biomedical Engineering, Prague, Czech Republic, 3–8 June 2018; Springer Nature: Singapore, 2018; pp. 439–443. [Google Scholar] [CrossRef]
- Nielsen, J.; Clemmensen, T.; Yssing, C. Getting access to what goes on in people’s heads? Reflection on the think-aloud technique. In Proceedings of the Second Nordic Conference on Human-Computer Interaction, Aarhus, Denmark, 2 October 2002; pp. 101–110. [Google Scholar]
- Cotton, D.; Gresty, K. Reflecting on the think-aloud method for evaluating e-learning. Br. J. Educ. Technol. 2006, 37, 45–54. [Google Scholar] [CrossRef]
- Someren, M.; Yvonne, F.; Barnard, Y.F.; Sandberg, J. The Think Aloud Method: A Practical Approach to Modelling Cognitive London; Academic Press: Cambridge, MA, USA, 1994. [Google Scholar]
- Obada-Obieh, B.; Huang, Y.; Beznosov, K. The burden of ending online account sharing. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Honolulu, HI, USA, 25–30 April 2020; pp. 1–13. [Google Scholar]
- Zimmermann, V.; Gerber, N. The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes. Int. J. Hum.-Comput. Stud. 2020, 133, 26–44. [Google Scholar] [CrossRef]
- Wakefield, J. What Happened to Facebook, WhatsApp, and Instagram? BBC News. 5 October 2021. Available online: https://www.bbc.com/news/technology-58800670 (accessed on 14 December 2022).
- Gruschka, N.; Iacono, L. Password Visualization beyond Password Masking. In Proceedings of the Eighth International Network Conference, Heidelberg, Germany, 6–8 July 2010; pp. 179–188. [Google Scholar]
- Pidel, C.; Neuhaus, S. Breaking: Password entry is fine. In Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2019; Volume 11594. [Google Scholar]
- Stobert, E.; Biddle, R. The Password Life Cycle. ACM Trans. Priv. Secur. 2018, 21, 13. [Google Scholar] [CrossRef]
- Pearman, S.; Thomas, J.; Naeini, P.E.; Habib, H.; Bauer, L.; Christin, N.; Cranor, L.F.; Egelman, S.; Forget, A. Let’s go in for a closer look: Obseving passwords in their natural habitat. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017. [Google Scholar]
- Vu, K.; Proctor, R.; Bhargav-Spantzel, A.; Tai, B.; Cook, J.; Schultz, E. Improving password security and memorability to protect personal and organizational information. Int. J. Hum.-Comput. Stud. 2007, 65, 744–757. [Google Scholar] [CrossRef]
- Neath, I. Human Memory: An Introduction to Research, Data, and Theory; Thomson Brooks/Cole Publishing Co.: Pacific Grove, CA, USA, 1998. [Google Scholar]
- Kävrestad, J.; Lennartsson, M.; Birath, M.; Nohlberg, M. Constructing secure and memorable passwords. Inf. Comput. Secur. 2020, 28, 701–717. [Google Scholar] [CrossRef]
- Alkaldi, N.; Renaud, K. MIGRANT: Modeling Smartphone Password Manager Adoption Using Migration Theory. ACM SIGMIS Database DATABASE Adv. Inf. Syst. 2022, 53, 63–95. [Google Scholar] [CrossRef]
- Saudi National Digital Identity Management. Available online: https://www.iam.gov.sa/about.html (accessed on 14 December 2022).
- Fujita, M.; Yamanaka, T.; Matsuda, N.; Yoshimura, A.; Kanaoka, A. Do authentication websites adopt friendly password registration error message design? In Proceedings of the SENIX Symposium on Usable Privacy and Security, Boston, MA, USA, 7–9 August 2022; pp. 1–5. [Google Scholar]
- Golla, M.; Dürmuth, M. On the accuracy of password strength meters. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 1567–1582. [Google Scholar]
- Renaud, K.; Zimmermann, V. Nudging folks towards stronger password choices: Providing certainty is the key. Behav. Public Policy 2019, 3, 228–258. [Google Scholar] [CrossRef] [Green Version]
- Dupuis, M.; Khan, F. Effects of peer feedback on password strength. In Proceedings of the 2018 APWG Symposium on Electronic Crime Research, San Diego, CA, USA, 15–17 May 2018; pp. 1–9. [Google Scholar]
- Hartwig, K.; Reuter, C. Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-Based Multidimensional Visualizations. Behav. Inf. Technol. 2022, 41, 1357–1380. [Google Scholar] [CrossRef]
- Bonneau, J.; Bursztein, E.; Caron, I.; Jackson, R.; Williamson, M. Secrets, lies, and account recovery: Lessons from the use of personal knowledge questions at google. In Proceedings of the 24th International Conference on World Wide Web, Florence, Italy, 18–22 May 2015. [Google Scholar]
- Doerfler, P.; Thomas, K.; Marincenko, M.; Ranieri, J.; Jiang, Y.; Moscicki, A.; McCoy, M. Evaluating Login Challenges as A Defense Against Account Takeover. In Proceedings of the World Wide Web Conference, San Francisco, CA, USA, 13–17 May 2019. [Google Scholar]
Website | Password Rules |
---|---|
Hotels | 6–20 characters, with at least one number |
Booking | Minimum 10 characters, including uppercase letters, lowercase letters, and numbers |
Airbnb | Cannot contain the name or email address of the account holder, requires at least eight characters and a number or symbol |
Bonvoy | 8–20 characters (lowercase letters, uppercase letters, numbers, or characters) |
No rule until clicking sign-up button; at least 6 characters (letters + numbers + punctuation marks) | |
Snapchat | No rule until the user starts typing; at least eight characters; (may use a) mix of uppercase letters, lowercase letters, numbers, and or/symbols |
TikTok | 8–20 characters (letters, numbers, and special characters) |
Eight characters or more | |
Alibaba | 6–20 characters—must contain at least two of each (letters, numbers, and symbols) |
Amazon | At least six characters |
eBay | At least six characters, containing a number or symbols |
Rakuten | eight characters or more |
Dailymotion | Minimum eight characters (at least one letter, at least one number, and at least one symbol) |
IMDb | At least eight characters |
Netflix | No rule until clicking “continue”; 4–60 characters |
Spotify | Unknown |
Eight or more characters with a mix of letters, numbers, and symbols | |
Apple | Eight or more characters; uppercase and lowercase letters, at least one number |
HUAWEI | At least eight characters |
Microsoft | No rule until clicking “next”; at least eight characters; at least two each of uppercase letters, lowercase letters, numbers, and symbols |
Website | Immediate Feedback (Meter) |
---|---|
Hotels.com | Worked after moving to the next field (the field turned red when there was a mistake, and a message in red under the field showed the mistake) |
Booking.com | Worked after clicking “Create account”; a message in red showed the unsatisfied rules one by one, and the field was in red |
Airbnb | Every password rule was on a different line, shown in gray and with an ×; when satisfied, it changed to green and √; password strength was shown (weak = red; good or strong = green) |
Bonvoy | Similar to Airbnb, but using red and green |
Snapchat | Worked while typing (the word password was in red when moved to its field, and a message in red showed the unsatisfied rule) |
TikTok | Worked while typing (every password rule was on a different line and shown in gray color and with an ×; when satisfied, it turned to green) |
Showed the message “Please enter stronger password” (no specific guidance) in red, and field was in red | |
Alibaba | Every password rule was on a different line and shown in gray, but with x sign in red; when password rule was satisfied, sign became green √ |
eBay | A message in gray under the password field; red when the password was simple |
Rakuten | Messages “too short”, “weak”, and “very weak” in red, “fair” in orange, and “strong” and “very strong” in blue |
Dailymotion | Similar to Alibaba |
Netflix | Worked after clicking “continue” for the first time; red for the message and field |
Spotify | Worked while typing; showed a vague message (“too short”) |
Worked after clicking “next”; both the password field and the message were red | |
Apple | Similar to TikTok; a line for strength (red, orange = “moderate”, green = “strong”); showed password tips |
No meter for Facebook, Amazon, IMDb, HUAWEI, or Microsoft |
Website | Recovery Process Comments |
---|---|
Booking | The phone number was not used in the recovery process. |
Airbnb | The phone number was verified, but it was not used for recovery. |
Bonvoy | The phone number was not used for password reset. |
Users could skip creating a new password. | |
Amazon | Password rules remained the same, but there were some tips. |
eBay | User was not asked to change their password. |
Rakuten | Only American phone numbers could be added. |
Phone and alternative emails were re-added during registration. | |
HUAWEI | More password rules were added with a meter. |
Microsoft | User had to answer security questions after the code. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Albesher, A.S. Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites. Sustainability 2023, 15, 11043. https://doi.org/10.3390/su151411043
Albesher AS. Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites. Sustainability. 2023; 15(14):11043. https://doi.org/10.3390/su151411043
Chicago/Turabian StyleAlbesher, Abdulmohsen Saud. 2023. "Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites" Sustainability 15, no. 14: 11043. https://doi.org/10.3390/su151411043
APA StyleAlbesher, A. S. (2023). Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites. Sustainability, 15(14), 11043. https://doi.org/10.3390/su151411043