Visions of the Future : What Could Happen to User Authentication?
Paananen, H., & Woods, N. (2024). Visions of the Future : What Could Happen to User Authentication?. In M. Lehto, & M. Karjalainen (Eds.), Proceedings of the 23rd European Conference on Cyber Warfare and Security (23, pp. 356-363). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. https://doi.org/10.34190/eccws.23.1.2337
Date
2024Copyright
© 2024 European Conference on Cyber Warfare and Security
The most prevalent information system security feature for the user is the authentication process. Passwords have been the primary authentication method for decades due to their simplicity for both the user and the system provider. However, over recent years, the digitalization of services has increased the number of credentials each user must manage, making traditional password authentication problematic for the user. Strong candidates for easier and more secure authentication methods are emerging (e.g., FIDO alliance, Single-sign-on, biometrics). Still, a single method has yet to dominate the market due to the rapid changes in technology, costs of implementation, trust in these methods, and the vast number of users and digital services. Due to the varied reasons that affect the adoption of these methods, it is unclear what kinds of authentication methods will be the forerunners in the future. This study aims to envision the future of user authentication and security features emerging from the interaction of different factors. We present a qualitative interview study, which examines six experts from the fields of authentication, cybersecurity, and emerging technologies. A hermeneutic mode of analysis is used to form scenarios of the future based on the observations of different experts. The results reflect an understanding of how users and their interactions with security features, such as authentication, may change over the following decade and beyond and how security professionals intend to incorporate this knowledge into future security systems. The results shed light on the influence of society, developing technology, and the need for user- and future-proof security in the coming years. This study will have several implications, as it will contribute to forming a coherent picture of the different elements that shape the future and give an idea of how to prepare for what is coming. Furthermore, it will provide an understanding of how choices with technology today lead to different futures.
...
Publisher
Academic Conferences International LtdConference
European Conference on Cyber Warfare and SecurityIs part of publication
Proceedings of the 23rd European Conference on Cyber Warfare and SecurityISSN Search the Publication Forum
2048-8602Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/220863280
Metadata
Show full item recordCollections
Related funder(s)
Business FinlandFunding program(s)
Research to Business (R2B), BFLicense
Related items
Showing items with similar title or keywords.
-
Participants’ home as an interview context when studying sensitive family issues
Hämäläinen, Kati; Rautio, Susanna (University of Nordland, Department of Social Sciences, 2013)This article considers the meaning of the participants’ home as an interview context when studying sensitive family issues. The article is based on two qualitative family studies by the authors on foster children’s ... -
The salience of a prior relationship between researcher and participants : Reflecting on acquaintance interviews
Roiha, Anssi; Iikkanen, Päivi (Elsevier BV, 2022)This article aims to contribute to the discussion on interviews in qualitative research. More specifically, we focus on acquaintance interviews (Garton & Copland, 2010), that is, interviews in which the interviewer and ... -
Measuring digital intervention user experience with a novel ecological momentary assessment (EMA) method, CORTO
Lukka, Lauri; Karhulahti, Veli-Matti; Bergman, Vilma-Reetta; Palva, J. Matias (Elsevier, 2024)Digital interventions often suffer from low usage, which may reflect insufficient attention to user experience. Moreover, the existing evaluation methods have limited applicability in the remote study of user experience ... -
Micro-Level Mechanisms to Support Value Co-Creation for Design of Digital Services
Tuunanen, Tuure; Lumivalo, Juuli; Vartiainen, Tero; Zhang, Yixin; Myers, Michael D. (SAGE Publications, 2023)This study identifies micro-level value co-creation mechanisms that support the design of digital services. As services are now becoming digital—or at least digitally enabled—how to design digital services that enable value ... -
A Comprehensive Analysis of Narratives within NATO’s Doctrines
Saari, Dominic; Häkkinen, Teemu; Moilanen, Panu (Academic Conferences International Ltd, 2024)The 2022 Russian invasion of Ukraine reshaped global security norms, challenging the West with a strategy known as hybrid warfare. Rooted in Russia's military doctrine, this approach integrates both military and non-military ...