TY - GEN
T1 - Computational Analysis of User Experience of Password-Based Authentication Systems
AU - Abromaityte, Migle
AU - Dubero, Elise
AU - Kruger, Quintan
AU - Lucassen, Benne
AU - Vos, Tessa
AU - van den Hout, Niek Jan
AU - Bouma, Debby
AU - Treur, Jan
AU - Roelofsma, Peter H.M.P.
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
PY - 2025
Y1 - 2025
N2 - Using a network modelling approach to model adaptive dynamical systems based on self-modeling networks, this paper present a computational analysis of password-based authentication systems. It reveals several key insights into the interplay between user experience (UX) and security. An important finding is the tension between security and usability in password systems. While these systems are ubiquitous due to their relative ease of implementation and user familiarity, they come with significant challenges. As for users often convenience is more important than security, they use weak, easily guessable passwords and password reuse across multiple accounts. This behaviour, also driven by the cognitive burden of managing numerous passwords, has a bad impact on the risk of unauthorized access and security breaches. Computational analysis also showed that with adequate training, the usability of 2FA systems improved, leading to a reduction in user stress over time.
AB - Using a network modelling approach to model adaptive dynamical systems based on self-modeling networks, this paper present a computational analysis of password-based authentication systems. It reveals several key insights into the interplay between user experience (UX) and security. An important finding is the tension between security and usability in password systems. While these systems are ubiquitous due to their relative ease of implementation and user familiarity, they come with significant challenges. As for users often convenience is more important than security, they use weak, easily guessable passwords and password reuse across multiple accounts. This behaviour, also driven by the cognitive burden of managing numerous passwords, has a bad impact on the risk of unauthorized access and security breaches. Computational analysis also showed that with adequate training, the usability of 2FA systems improved, leading to a reduction in user stress over time.
KW - authentication systems
KW - computational analysis
KW - user experience
UR - https://www.scopus.com/pages/publications/105007558722
UR - https://www.scopus.com/inward/citedby.url?scp=105007558722&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-88705-5_29
DO - 10.1007/978-3-031-88705-5_29
M3 - Conference contribution
AN - SCOPUS:105007558722
SN - 9783031887048
VL - 1
T3 - Lecture Notes in Computer Science
SP - 341
EP - 352
BT - Intelligent Human Computer Interaction
A2 - Singh, Dhananjay
A2 - van ’t Klooster, Jan-Willem
A2 - Tiwary, Uma Shanker
PB - Springer Nature
T2 - 16th International Conference on Intelligent Human Computer Interaction, IHCI 2024
Y2 - 13 November 2024 through 16 November 2024
ER -