Font Size: a A A

Factors that influence adoption of multi-factored authentication within large organizations

Posted on:2016-06-07Degree:Ph.DType:Dissertation
University:Capella UniversityCandidate:Dillon, Matthew JFull Text:PDF
GTID:1479390017983850Subject:Computer Science
Abstract/Summary:
Multi-factor authentication is the utilization of multiple authentication mechanisms. These mechanisms typically include three categories of authentication: something you know (passwords), something you have (tokens), and something you are (biometrics). A great deal of research has studied the importance of utilizing a combination of multiple authentication schemes within information systems. The established research in the field recommends implementing a multi-factored authentication scheme for verifying users are who they claim to be. This research study focused on the factors that influence information technology managers to recommend adoption of multi-factor authentication schemes within large organizations. A survey instrument collected responses from 388 participants that examined independent variables including: the perceived technology effectiveness, the perceived technology need, the perceived technology reliability, and the perceived cost of the technology. The research aimed to correlate the aforementioned independent variables with the participants' decisions to recommend implementing a multi-factor authentication scheme. The results indicate that there is a strong correlation between the independent variables of the perceived technology effectiveness, the perceived technology need, the perceived technology reliability, and the perceived cost of the technology and the dependent variable of the decision to recommend a multi-factored authentication scheme within the organization. Although the results indicated a high correlation, the percentage of the respondents represented by the correlation was between 27%-38%. The low representation of the correlated values indicated that future research could be examined to determine if there are potential issues with technology acceptance model. Specifically when using technology acceptance model to determine acceptance of multiple technologies that may be classified in a single grouping; such as, multi-factor authentication. The results of this research will assist in advancing the body of knowledge in information security in addition to technology adoption studies.
Keywords/Search Tags:Authentication, Technology, Adoption
Related items