Toward secure mobile applications through proper authentication mechanisms.
Autor: | Albesher AS; Department of Information Systems, College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa, Saudi Arabia., Alkhaldi A; Department of Information Systems, College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa, Saudi Arabia., Aljughaiman A; Department of Computer Networks and Communications, College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa, Saudi Arabia. |
---|---|
Jazyk: | angličtina |
Zdroj: | PloS one [PLoS One] 2024 Dec 05; Vol. 19 (12), pp. e0315201. Date of Electronic Publication: 2024 Dec 05 (Print Publication: 2024). |
DOI: | 10.1371/journal.pone.0315201 |
Abstrakt: | With the increased number of mobile apps, authentication processes play a key role in verifying users' identities and protecting data from security threats. Utilizing proper authentication techniques is key to protecting computer apps from being hacked. In this paper, we aimed to compare the authentication methods of the sign-up, sign-in, and password recovery processes of 50 e-commerce apps. To ensure accurate data analysis, we checked every app in a separate session and used the "think-aloud" technique while recording the screen. The researchers prepared a list of items that were checked during each session to identify the similarities and differences between tested apps regarding the authentication process. The results of this security analysis unequivocally demonstrated how different apps' designs for authentication processes are. Users' memory and comprehension are burdened by these variances, and no app can ensure that they adhere to recommended standards. The results of this study confirmed the necessity for unified and user-friendly authentication processes. This can be possible by following a usable security framework for the authentication process. Competing Interests: The authors have declared that no competing interests exist. (Copyright: © 2024 Albesher et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.) |
Databáze: | MEDLINE |
Externí odkaz: | |
Nepřihlášeným uživatelům se plný text nezobrazuje | K zobrazení výsledku je třeba se přihlásit. |