Abstract
Many attempts have been made to replace the ubiquitous username-and-password authentication scheme in order to improve user security, privacy and usability. However, none of the proposed methods have gained wide-spread user acceptance. In this paper, we examine the users’ perceptions and concerns on using several alternative authentication methods on the Internet. We investigate the adoption of the new German national identity card, as it is the first eID-enabled card with dedicated features to enable privacy-preserving online authentication. Even though its large-scale roll-out was backed by a national government, adoption rates and acceptance are still low. We present results of three focus groups as well as interviews with service providers, showing that preserving privacy is just one of several factors relevant to the acceptance of novel authentication technologies by users as well as service providers.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Agosto, D.E., Abbas, J., Naughton, R.: Relationships and Social Rules: Teens’ Social Network and Other ICT Selection Practices. JASIST 63(6), 1108–1124 (2012)
Bonneau, J.: The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. In: 2012 IEEE Symposium on Security and Privacy, pp. 538–552 (2012)
Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. In: 2012 IEEE Symposium on Security and Privacy, pp. 553–567 (2012)
Bundesamt für Sicherheit in der Informationstechnik. Technical Guideline TR-03127 (2011)
Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science 35(8), 982–1003 (1989)
Dey, A., Weis, S.: PseudoID: Enhancing Privacy in Federated Login (2010), http://www.pseudoid.net
Dhamija, R., Dusseault, L.: The Seven Flaws of Identity Management: Usability and Security Challenges. IEEE Security & Privacy Magazine 6, 24–29 (2008)
Florencio, D., Herley, C.: A Large-Scale Study of Web Password Habits. In: Proceedings of the 16th International Conference on World Wide Web. ACM (2007)
Fromm, J., Hoepner, P.: The New German eID Card. In: Fumy, W., Paeschke, M. (eds.) Handbook of eID Security: Concepts, Practical Experiences, Technologies, ch. 11, pp. 154–166. Publicis (2011)
Gaw, S., Felten, E.W.: Password Management Strategies for Online Accounts. In: Proceedings of the Second Symposium on Usable Privacy and Security. ACM (2006)
Grote, J.H., Keizer, D., Kenzler, D., Kenzler, P., Meinel, C., Schnjakin, M., Zoth, L.: Vom Client Zur App. Technical report, Hasso Plattner Institute (2010)
Hayashi, E., Hong, J.: A Diary Study of Password Usage in Daily Life. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM (2011)
Herath, T., Chen, R., Wang, J., Banjara, K., Wilbur, J., Rao, H.R.: Security Services as Coping Mechanisms: An Investigation Into User Intention to Adopt an Email Authentication Service. Info Systems J. (2012)
Jakobsson, M., Chow, R., Molina, J.: Authentication - Are We Doing Well Enough? IEEE Security &Privacy Magazine 10(1), 19–21 (2012)
Jones, L.A., Antón, A.I., Earp, J.B.: Towards Understanding User Perceptions of Authentication Technologies. In: Proceedings of the ACM Workshop on Privacy in Electronic Society. ACM (2007)
Krueger, R.A., Casey, M.A.: Focus Groups: A Practical Guide for Applied Research, 4th edn. Sage Publications (2009)
Kumaraguru, P., Cranor, L.F.: Privacy indexes: A Survey of Westin’s Studies. Technical Report CMU-ISRI-5-138, Carnegie Mellon University (2005)
Kurniawan, S., Mahmud, M., Nugroho, Y.: A Study of the Use of Mobile Phones by Older Persons. In: CHI Extended Abstracts on Human Factors in Computing Systems. ACM (2006)
Liang, H., Xue, Y.: Avoidance of Information Technology Threats: A Theoretical Perspective. MIS Quarterly 33(1), 71–90 (2009)
Malone, D., Maher, K.: Investigating the Distribution of Password Choices. In: Proceedings of the 21st International Conference on World Wide Web. ACM (2012)
Margraf, M.: The New German ID Card. In: Pohlmann, N., Reimer, H., Schneider, W. (eds.) ISSE 2010: Securing Electronic Business Processes (2011)
Morgan, D.L.: Focus Groups as Qualitative Research. Sage Publications (1996)
Perito, D., Castelluccia, C., Kaafar, M.A., Manils, P.: How Unique and Traceable Are Usernames? In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 1–17. Springer, Heidelberg (2011)
Poller, A., Waldmann, U., Vowé, S.: Electronic Identity Cards for User Authentication – Promise and Practice. IEEE Security & Privacy Magazine 10(1), 46–54 (2012)
Rosenbaum, S., Cockton, G., Coyne, K., Muller, M., Rauch, T.: Focus Groups in HCI: Wealth of Information or Waste of Resources? In: CHI Extended Abstracts on Human Factors in Computing Systems. ACM (2002)
Sun, S.-T., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., Beznosov, K.: What Makes Users Refuse Web Single Sign-On? An Empirical Investigation of OpenID. In: Proceedings of the Seventh Symposium on Usable Privacy and Security. ACM (2011)
Wästlund, E., Angulo, J., Fischer-Hübner, S.: Evoking Comprehensive Mental Models of Anonymous Credentials. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 1–14. Springer, Heidelberg (2012)
Weir, C.S., Douglas, G., Carruthers, M., Jack, M.: User Perceptions of Security, Convenience and Usability for Ebanking Authentication Tokens. Computers & Security 28(1-2), 47–62 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Harbach, M., Fahl, S., Rieger, M., Smith, M. (2013). On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards. In: De Cristofaro, E., Wright, M. (eds) Privacy Enhancing Technologies. PETS 2013. Lecture Notes in Computer Science, vol 7981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39077-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-39077-7_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39076-0
Online ISBN: 978-3-642-39077-7
eBook Packages: Computer ScienceComputer Science (R0)