An Improved User Authentication Model for Mobile Application Systems: Statistical Assessment of User Acceptance
Kartini Mohamed1, Fatimah Sidi2, Iskandar Ishak3, Marzanah A. Jabar4, Siti Raba’ah Hamzah5
1Kartini Mohamed*, Group Human Resource, SIRIM Berhad, Persiaran Dato’ Menteri, Peti Surat Shah Alam, Selangor, Malaysia.
2Fatimah Sidi, Department of Computer Science, Faculty of Computer Science and Information Technology, University Putra Malaysia.
3Iskandar Ishak, Department of Computer Science, Faculty of Computer Science and Information Technology, University Putra Malaysia.
4Marzanah A. Jabar, Department of Software Engineering and Information System, Faculty of Computer Science and Information Technology, University Putra Malaysia.
5Siti Raba’ah Hamzah, Department of Professional Development and Continuing Education, Faculty of Educational Studies, University Putra Malaysia.
Manuscript received on September 12, 2019. | Revised Manuscript received on September 22, 2019. | Manuscript published on October 30, 2019. | PP: 3448-3451 | Volume-9 Issue-1, October 2019 | Retrieval Number: A2658109119/2019©BEIESP | DOI: 10.35940/ijeat.A2658.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: One of the reasons mobile phones become one of the worldwide commonly usedcommunication devices nowadays is because they allow the installation of various mobile apps which are mostly interesting and useful to mobiles users. Unfortunately, mobile apps involve transmissions of digital data wirelessly and vulnerable to hacking activities. An improved user authentication modelhas been introduced in this study. Its strength in preventing hacking activities and the level of user acceptance are being analyzed. The strength is built based on the multi-factoring, ciphering and watermarking techniques being introduced in the model. It is technically measured based on the vulnerability and penetration tests done by an appointed independent party but excluded in this paper. On the other hand, the level of acceptance is measured using a quantitative method. Even though the quantitative method in this study undergoes expert review, pilot study and survey, this paper only focuses on the survey since its outcome is used to conclude the level of acceptance by mobile users. The statistical analysis results indicate that mobile users perceive ciphering technique contributes the most to this strength while watermarking technique has the strongest relationshipsandbecome the dominant factor in making the model acceptable by users.
Keywords: Mobile Application Systems, Survey, Quantitative Methodology, User Authentication.