Submit your papers Submit Now
International Peer-Reviewed Journal
For Enquiries: editor@iiardjournals.org
📄 Download Paper

The Human Factor in Access Control and Authentication: A Comprehensive Survey Analysis

Gbeneowei Chinyere Ebideinere

Abstract

In today's digitally-driven landscape, data security is paramount as organizations, governments, and individuals increasingly rely on interconnected systems to manage sensitive information. While technical aspects of access control and authentication mechanisms have been extensively studied, the human dimension remains under-explored. This research investigates user perceptions, adoption patterns, and security consciousness regarding traditional and emerging authentication mechanisms through a comprehensive survey of 450 participants across diverse demographics. The study reveals significant gaps between perceived security and actual usage patterns, with password-based systems maintaining dominance (4.6/5 usage frequency) despite low security perceptions (2.5/5). Multi-factor authentication (MFA) shows strong security perception (4.2/5) but moderate adoption (3.4/5), primarily influenced by organizational size and IT proficiency. Emerging technologies like Al-driven access control and blockchain authentication show promising adoption willingness (3.5/5) but face significant privacy (3.8/5) and complexity (3.5/5) concerns. The research identifies critical human factors affecting security implementation success and provides evidence-based recommendations for designing more effective, user-centric security systems that balance security requirements with usability considerations.

Keywords

Data Security Access Control Authentication Human Factors Multi-Factor Authentication Al Security Blockchain Authentication Security Perception Usability-Security Trade-off

References

Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems (3rd ed.). Wiley. Bishop, M. (2018). Introduction to Computer Security. Addison-Wesley Professional. Dastane, O. (2020). The Effect of Bad Password Habits on Personal Data Breach. EngRN: Computer Engineering. Dawson, M., et al. (2021). Artificial Intelligence Driven Adaptive Access Control Systems: Opportunities and Challenges. Journal of Applied Security Research. Ghazal, R., et al. (2020). Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments. IEEE Access. Istiaque, S., et al. (2021). Artificial Intelligence Based Cybersecurity: Two-Step Suitability Test. IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). Jaafar, F., et al. (2023). On Securing Communications Between Connected Objects Using a Data-Centric Security Approach. 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering. Jain, A. K., Ross, A. A., & Prabhakar, S. (2023). Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security. Kennison, T., & Chan-Tin, E. (2023). Password Authentication Systems in the Age of Cloud Computing. Journal of Cybersecurity Advances. Meyer, P., Morais, M., & Shah, D. (2022). Multi-Factor Authentication: Trends, Challenges, and Best Practices. ACM Computing Surveys. Morais, D., Zúquete, A., & Mendes, A. (2023). Adaptive, Multi-Factor Authentication as a Service for Web Applications. 2023 7th Cyber Security in Networking Conference (CSNet). Nimgaonkar, A., & Kumbhar, R. (2023). Cyber-attacks and digital security: A review. World Journal of Advanced Engineering Technology and Sciences. Pandey, R., Dastane, O., & Safa, N. S. (2022). Emerging Trends in Access Control Models: A Critical Review. Information Systems Security. Sandhu, R., & Munawer, Q. (1998). How to do discretionary access control using roles. Proceedings of the third ACM workshop on Role-based access control. Schneier, B. (2019). Applied Cryptography: Protocols, Algorithms, and Source Code in C (20th Anniversary ed.). Wiley. Stallings, W. (2022). Cryptography and Network Security: Principles and Practice (8th ed.). Pearson. Tariq, N., et al. (2019). The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Sensors. Wang, S., et al. (2019). Decentralized Autonomous Organizations: Concept, Model, and Applications. IEEE Transactions on Computational Social Systems. Zhang, X., & Sandhu, R. (2021). Role-Based Access Control: A Historical Perspective. IEEE Security & Privacy. Zyskind, G., Tariq, H., & Meyer, P. (2022). Blockchain Applications in Authentication and Access Control Systems. ACM Transactions on Privacy and Security.