Using perceived ease of use and perceived usefulness to predict acceptance of the World Wide Web
WWW7 Proceedings of the seventh international conference on World Wide Web 7
Communications of the ACM
The technology acceptance model and the World Wide Web
Decision Support Systems
Extending the TAM for a World-Wide-Web context
Information and Management
An extension of the technology acceptance model in an ERP implementation environment
Information and Management
A convenient method for securely managing passwords
WWW '05 Proceedings of the 14th international conference on World Wide Web
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Passpet: convenient password management and phishing protection
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
A large-scale study of web password habits
Proceedings of the 16th international conference on World Wide Web
Stronger password authentication using browser extensions
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
The Emperor's New Security Indicators
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
A usability study and critique of two password managers
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
International Journal of Electronic Commerce
International Journal of Electronic Commerce
Web Form Design: Filling in the Blanks
Web Form Design: Filling in the Blanks
The Venn of Identity: Options and Issues in Federated Identity Management
IEEE Security and Privacy
The Seven Flaws of Identity Management: Usability and Security Challenges
IEEE Security and Privacy
IEEE Transactions on Software Engineering
Privacy and security: Usable security: how to get it
Communications of the ACM - Scratch Programming for All
Information and Management
Crying wolf: an empirical study of SSL warning effectiveness
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle
Proceedings of the 6th ACM workshop on Digital identity management
A billion keys, but few locks: the crisis of web single sign-on
Proceedings of the 2010 workshop on New security paradigms
What makes users refuse web single sign-on?: an empirical investigation of OpenID
Proceedings of the Seventh Symposium on Usable Privacy and Security
ROAuth: recommendation based open authorization
Proceedings of the Seventh Symposium on Usable Privacy and Security
Hi-index | 0.00 |
OpenID and OAuth are open and simple Web SSO protocols that have been adopted by major service providers, and millions of supporting Web sites. However, the average user’s perception of Web SSO is still poorly understood. Through several user studies, this work investigates users’ perceptions and concerns when using Web SSO for authentication. We found that our participants had several misconceptions and concerns that impeded their adoption. This ranged from their inadequate mental models of Web SSO, to their concerns about personal data exposure, and a reduction in perceived Web SSO value due to the employment of password management practices. Informed by our findings, we offer a Web SSO technology acceptance model, and suggest design improvements.