Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Building consumer trust online
Communications of the ACM
Anonymous mechanisms in group decision support systems communication
Decision Support Systems
Consumer Addressability and Customized Pricing
Marketing Science
Why Information Security is Hard-An Economic Perspective
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
A secure biometric authentication scheme based on robust hashing
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Research Note: Customer Intimacy and Cross-Selling Strategy
Management Science
Handbook of Multibiometrics (International Series on Biometrics)
Handbook of Multibiometrics (International Series on Biometrics)
Privacy preserving multi-factor authentication with biometrics
Proceedings of the second ACM workshop on Digital identity management
Corporate Computer and Network Security
Corporate Computer and Network Security
Establishing and protecting digital identity in federation systems
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
Knowledge networking to support medical new product development
Decision Support Systems
Journal of Management Information Systems
Biometric keypads: Improving accuracy through optimal PIN selection
Decision Support Systems
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This study investigates the key elements an online service or product provider needs to consider when adopting another single-factor or two-factor authentication system. We also uncover the conditions that make the new one-factor or two-factor authentication system more preferable. By using the probability of system failure, this study generalizes all possible combination of authentication systems into four different cases. This generalization allows us to compare different systems and to determine the key factors managers need to consider when adopting a new authentication system. The key factors are (1) additional implementation costs, (2) customer switching which is determined by the market share and customers' preferences, and (3) expected losses when the new system fails. This study also suggests that if the provider chooses an expensive new system, the provider needs to have a larger market share to justify the spending. Also, regulators can encourage the adoption of a more secure authentication system by changing the penalty a firm faces when the system fails. Finally, it could also be preferable to have both one-factor and two-factor authentication systems depending on the customers' characteristics.