dc.contributor.author | Paananen, Hanna | |
dc.contributor.author | Woods, Naomi | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Karjalainen, Mika | |
dc.date.accessioned | 2024-06-27T12:16:12Z | |
dc.date.available | 2024-06-27T12:16:12Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | Paananen, H., & Woods, N. (2024). Visions of the Future : What Could Happen to User Authentication?. In M. Lehto, & M. Karjalainen (Eds.), <i>Proceedings of the 23rd European Conference on Cyber Warfare and Security</i> (23, pp. 356-363). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.23.1.2337" target="_blank">https://doi.org/10.34190/eccws.23.1.2337</a> | |
dc.identifier.other | CONVID_220863280 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/96201 | |
dc.description.abstract | The most prevalent information system security feature for the user is the authentication process. Passwords have been the primary authentication method for decades due to their simplicity for both the user and the system provider. However, over recent years, the digitalization of services has increased the number of credentials each user must manage, making traditional password authentication problematic for the user. Strong candidates for easier and more secure authentication methods are emerging (e.g., FIDO alliance, Single-sign-on, biometrics). Still, a single method has yet to dominate the market due to the rapid changes in technology, costs of implementation, trust in these methods, and the vast number of users and digital services. Due to the varied reasons that affect the adoption of these methods, it is unclear what kinds of authentication methods will be the forerunners in the future. This study aims to envision the future of user authentication and security features emerging from the interaction of different factors. We present a qualitative interview study, which examines six experts from the fields of authentication, cybersecurity, and emerging technologies. A hermeneutic mode of analysis is used to form scenarios of the future based on the observations of different experts. The results reflect an understanding of how users and their interactions with security features, such as authentication, may change over the following decade and beyond and how security professionals intend to incorporate this knowledge into future security systems. The results shed light on the influence of society, developing technology, and the need for user- and future-proof security in the coming years. This study will have several implications, as it will contribute to forming a coherent picture of the different elements that shape the future and give an idea of how to prepare for what is coming. Furthermore, it will provide an understanding of how choices with technology today lead to different futures. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International Ltd | |
dc.relation.ispartof | Proceedings of the 23rd European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European Conference on Cyber Warfare and Security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | user authentication | |
dc.subject.other | future | |
dc.subject.other | qualitative study | |
dc.subject.other | interview | |
dc.title | Visions of the Future : What Could Happen to User Authentication? | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-202406275043 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 356-363 | |
dc.relation.issn | 2048-8602 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 23 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2024 European Conference on Cyber Warfare and Security | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.relation.grantnumber | 1610/31/2022 | |
dc.subject.yso | todentaminen | |
dc.subject.yso | kvalitatiivinen tutkimus | |
dc.subject.yso | haastattelut | |
dc.subject.yso | tulevaisuus | |
dc.subject.yso | kyberturvallisuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24130 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11782 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17111 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p817 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/eccws.23.1.2337 | |
dc.relation.funder | Business Finland | en |
dc.relation.funder | Business Finland | fi |
jyx.fundingprogram | Research to Business (R2B), BF | en |
jyx.fundingprogram | Research to Business (R2B), BF | fi |
dc.type.okm | A4 | |