scholarly journals An Improved User Authentication Model for Mobile Application Systems: An Expert Review Verification

Author(s):  
Kartini Mohamed ◽  

One of the reasons mobile phones become one of the worldwide commonly usedcommunication devices nowadays is because they allow the installation of various mobile apps which are mostly interesting and useful to mobiles users. Unfortunately, mobile apps involve transmissions of digital data wirelessly and vulnerable to hacking activities. An improved user authentication modelhas been introduced in this study. Its strength in preventing hacking activities and the level of user acceptance are being analyzed. The strength is built based on the multi-factoring, ciphering and watermarking techniques being introduced in the model. It is technically measured based on the vulnerability and penetration tests done by an appointed independent party but excluded in this paper. On the other hand, the level of acceptance is measured using a quantitative method. Even though the quantitative method in this study undergoes expert review, pilot study and survey, this paper only focuses on the survey since its outcome is used to conclude the level of acceptance by mobile users. The statistical analysis results indicate that mobile users perceive ciphering technique contributes the most to this strength while watermarking technique has the strongest relationshipsandbecome the dominant factor in making the model acceptable by users.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Bhaveer Bhana ◽  
Stephen Vincent Flowerday

Purpose The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting or mistyping the password (usually because of character switching). The source of this issue is that while a password containing combinations of lowercase characters, uppercase characters, digits and special characters (LUDS) offers a reasonable level of security, it is complex to type and/or memorise, which prolongs the user authentication process. This results in much time being spent for no benefit (as perceived by users), as the user authentication process is merely a prerequisite for whatever a user intends to accomplish. This study aims to address this issue, passphrases that exclude the LUDS guidelines are proposed. Design/methodology/approach To discover constructs that create security and to investigate usability concerns relating to the memory and typing issues concerning passphrases, this study was guided by three theories as follows: Shannon’s entropy theory was used to assess security, chunking theory to analyse memory issues and the keystroke level model to assess typing issues. These three constructs were then evaluated against passwords and passphrases to determine whether passphrases better address the security and usability issues related to text-based user authentication. A content analysis was performed to identify common password compositions currently used. A login assessment experiment was used to collect data on user authentication and user – system interaction with passwords and passphrases in line with the constructs that have an impact on user authentication issues related to security, memory and typing. User–system interaction data was collected from a purposeful sample size of 112 participants, logging in at least once a day for 10 days. An expert review, which comprised usability and security experts with specific years of industry and/or academic experience, was also used to validate results and conclusions. All the experts were given questions and content to ensure sufficient context was provided and relevant feedback was obtained. A pilot study involving 10 participants (experts in security and/or usability) was performed on the login assessment website and the content was given to the experts beforehand. Both the website and the expert review content was refined after feedback was received from the pilot study. Findings It was concluded that, overall, passphrases better support the user during the user authentication process in terms of security, memory issues and typing issues. Originality/value This research aims at promoting the use of a specific type of passphrase instead of complex passwords. Three core aspects need to be assessed in conjunction with each other (security, memorisation and typing) to determine whether user-friendly passphrases can support user authentication better than passwords.


Author(s):  
Noris Mohd Norowi ◽  
Siti Norhanida Hairudin ◽  
Lili Nurliyana Abdullah

RelayVio is designed and developed as android based mobile applications for all users, particularly users of domestic violence victims and their families in Malaysia. The main function of this app is to encourage domestic violence victims to document evidence of violence by way of writing notes, capturing images and recording dates and times of the occurrence. The app also allows victims to sending messages to a domestic violence hotline (Talian Nur), or can directly connect to 999 in the event of an emergency. The app also aims to educate the general public on the signs, dangers and help they can get relating to domestic violence abuse, through the use of animation (3D stop motion). getting information about the act of domestic violence. The method used in the development of mobile applications is ADDIE, which consists of analysis, design, system development, implementation and evaluation. An interview with a sociologist was conducted as an expert review, as well as a usability study of the app. Results show that the majority of the participants agreed that RelayVio app will be able to facilitate victims of domestic violence to gather information and keep documentation of the abuse as a form of evidence against their abusers.


2020 ◽  
Vol 3 (2) ◽  
pp. 31-43
Author(s):  
Michael Bwalya ◽  
Christopher Chembe

Smartphones have become a major part of human’s life. And also it has been seen that new mobile applications are built day by day. Currently mobile applications are playing major role in many areas such as banking, social networking, financial apps, entertainment and many more. With this increasing number of applications, security is an important issue. The growth of android market has increased security risk and thus focus should be given to the security. Security is the biggest issue in the field of mobile technology. Therefore, mobile applications need to be assessed and ensure that secure coding practices have been followed during development. Mobile application security breach can lead to fraudulent transactions through mobile applications, confidentiality and revenue loss through communications services misuse. Data that is shared on an unsecured channel is vulnerable to attacks and to stop unauthorized access to this data, there is need to encrypt the data before it is sent to the server. In this research work, different cryptographic algorithms for encrypting data and secure data sharing in mobile applications across communications channels were examined. Simulation methodology was used to investigate a suitable cryptographic algorithm and to design a security framework for mobile applications to solve mobile application security problems. The proposed framework employs the use of Advanced Encryption Standard (AES) algorithm for encrypting meter readings data being exchanged between a smart phone and the server. The results obtained from the simulation of the security framework, showed that the four fields namely: Account number, image path, meter number and phone number on which AES encryption was applied were in an unreadable format (ciphertext), implying that the fields have been successfully encrypted. This solution allows application users to transfer (upload readings) data between a smart phone and database server in a secure manner without facing the problem of data attack. Data being uploaded to the server is encrypted before it is transferred and decrypted once it reaches the server side. This solution addresses android application security in the application and network communications layers and data transmission. The research paper ensures information security is guaranteed between an organisation and its customers.


Author(s):  
AzizahChe Omar Et.al

This paper reports an ongoing project related to the development of iZakatKedah mobile application. The developed prototype has been evaluated through expert review method. The results of the expert evaluation have been reported in the previous paper. Thus, the main aim of this paper is to test the user experience of iZakatKedah mobile application to the zakat payers in terms of user usefulness, ease of use, and ease of learning. There are 31 of zakat payers from Kedah State, Malaysia involves in the user experienceexperiment. Upon utilizes the iZakatKedah mobile application, a set of user experience questionnaires has been distributed to the respondents. The collected data were analyzed and presented in the form of descriptive statistics. The results reveal that most of the respondents agreed thatthe iZakatKedah mobile applicationis useful, easy to use, easy to learn, and overall, they are satisfied.


Sign in / Sign up

Export Citation Format

Share Document