The massive use of data on the cyberspace have led to threats, such as data breach and security harm to individuals and to organization. Authentication methods are one of the mitigations of these threats and used to ensure that each of the individuals on the cyberspace is keeping their own or organizational data secured. For many years, the leading authentication method are passwords. The massive use of passwords has led to security flaws, such as individuals choosing comfort over security by using weak passwords. This study focuses on students and employees’ perception of authentication method in Sweden. The reason why is to see if the respondents are keeping their information secured enough and to what extent. This study is also analysing...
With society turning more digitalized, digital crime is reaching higher levels affecting companies a...
The authentication system is one of the most important methods for maintaining information security ...
Maintaining the security of information systems and associated data resources is vital if an organis...
The massive use of data on the cyberspace have led to threats, such as data breach and security harm...
Today security concerns are on the rise in all area such as banks, government organizations, busines...
Today security concerns are on the rise in all area such as banks, government organizations, busines...
Today security concerns are on the rise in all area such as banks,government organizations,business ...
Choosing authentication schemes for a specific purpose is challenging for service providers, develop...
Choosing authentication schemes for a specific purpose is challenging for service providers, develop...
Information is considered a valuable asset to most organisations and is often exposed to various thr...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
The need for greater account security has grown as the globe has become more digitally connected. On...
The need for greater account security has grown as the globe has become more digitally connected. On...
Purpose: This paper aimed to address the user perspective about usability, security and use of five ...
With society turning more digitalized, digital crime is reaching higher levels affecting companies a...
The authentication system is one of the most important methods for maintaining information security ...
Maintaining the security of information systems and associated data resources is vital if an organis...
The massive use of data on the cyberspace have led to threats, such as data breach and security harm...
Today security concerns are on the rise in all area such as banks, government organizations, busines...
Today security concerns are on the rise in all area such as banks, government organizations, busines...
Today security concerns are on the rise in all area such as banks,government organizations,business ...
Choosing authentication schemes for a specific purpose is challenging for service providers, develop...
Choosing authentication schemes for a specific purpose is challenging for service providers, develop...
Information is considered a valuable asset to most organisations and is often exposed to various thr...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
The need for greater account security has grown as the globe has become more digitally connected. On...
The need for greater account security has grown as the globe has become more digitally connected. On...
Purpose: This paper aimed to address the user perspective about usability, security and use of five ...
With society turning more digitalized, digital crime is reaching higher levels affecting companies a...
The authentication system is one of the most important methods for maintaining information security ...
Maintaining the security of information systems and associated data resources is vital if an organis...