An improved user authentication model for mobile application systems: Statistical assessment of user acceptance

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

One of the reasons mobile phones become one of the worldwide commonly usedcommunication devices nowadays is because they allow the installation of various mobile apps which are mostly interesting and useful to mobiles users. Unfortunately, mobile apps involve transmissions of digital data wirelessly and vulnerable to hacking activities. An improved user authentication modelhas been introduced in this study. Its strength in preventing hacking activities and the level of user acceptance are being analyzed. The strength is built based on the multi-factoring, ciphering and watermarking techniques being introduced in the model. It is technically measured based on the vulnerability and penetration tests done by an appointed independent party but excluded in this paper. On the other hand, the level of acceptance is measured using a quantitative method. Even though the quantitative method in this study undergoes expert review, pilot study and survey, this paper only focuses on the survey since its outcome is used to conclude the level of acceptance by mobile users. The statistical analysis results indicate that mobile users perceive ciphering technique contributes the most to this strength while watermarking technique has the strongest relationshipsandbecome the dominant factor in making the model acceptable by users.

Cite

CITATION STYLE

APA

Mohamed, K., Sidi, F., Ishak, I., Jabar, M. A., & Sitiraba’ahhamzah. (2019). An improved user authentication model for mobile application systems: Statistical assessment of user acceptance. International Journal of Engineering and Advanced Technology, 9(1), 3448–3451. https://doi.org/10.35940/ijeat.A2658.109119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free