Authentication interface evaluation and design for mobile devices

The design of mobile device interfaces is an area that has started to be addressed in the human computer interaction (HCI) community during the past few years. While previous work on handheld interface design has focused on overall usability aspects, security related design issues have only been minimally addressed. An example of a security interface is an authentication interface as used by electronic commerce (e-commerce) web sites. The paper opens with a review of prior research on secure interface design. Results of a usability evaluation targeting authentication interfaces as accessed on mobile devices is presented. To illustrate design aspects of an authentication interface, a discussion of the eBay authentication interface is then discussed. Recommended guidelines are proposed for designing authentication interfaces as accessed via mobile devices.

[1]  Cristian S. Calude,et al.  Discrete Mathematics and Theoretical Computer Science , 2003, Lecture Notes in Computer Science.

[2]  Yvonne Rogers,et al.  Interaction Design: Beyond Human-Computer Interaction , 2002 .

[3]  Angela Sasse,et al.  Humans in the Loop Human – Computer Interaction and Security , 2022 .

[4]  Yvonne Rogers,et al.  Beyond Interaction Design: Beyond Human-Computer Interaction , 2001 .

[5]  Austin Henderson,et al.  Interaction design: beyond human-computer interaction , 2002, UBIQ.

[6]  Audun Jøsang,et al.  Authentication for Humans , 2001 .

[7]  Lorrie Faith,et al.  Secure or Usable , 2004 .

[8]  Ka-Ping Yee,et al.  Aligning Security and Usability , 2004, IEEE Secur. Priv..

[9]  Chris Hofstader Internet Accessibility: Beyond Disability , 2004, Computer.

[10]  Andrew S. Patrick,et al.  HCI and security systems , 2003, CHI Extended Abstracts.

[11]  Lorrie Faith Cranor,et al.  Guest Editors' Introduction: Secure or Usable? , 2004, IEEE Secur. Priv..

[12]  Robin Jeffries,et al.  User interface evaluation in the real world: a comparison of four techniques , 1991, CHI.

[13]  C. D. Sutton,et al.  Generational differences: revisiting generational work values for the new millennium , 2002 .

[14]  Diana K. Smetters,et al.  Moving from the design of usable security technologies to the design of useful secure applications , 2002, NSPW '02.

[15]  Rosabeth Moss Kanter,et al.  Evolve! : Succeeding in the Digital Culture of Tomorrow , 2001 .

[16]  Diana K. Smetters,et al.  In search of usable security: five lessons from the field , 2004, IEEE Security & Privacy Magazine.

[17]  Simson L. Garfinkel,et al.  Secure Web Authentication with Mobile Phones , 2004 .

[18]  Izak Benbasat,et al.  Interface design for mobile commerce , 2003, CACM.