{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:50:13Z","timestamp":1759092613290,"version":"3.41.0"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","award":["2019R1C1C1007118"],"award-info":[{"award-number":["2019R1C1C1007118"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]},{"name":"ICT Consilience Creative","award":["IITP-2019-2015-0-00742"],"award-info":[{"award-number":["IITP-2019-2015-0-00742"]}]},{"name":"MSIT (Ministry of Science and ICT), Korea"},{"name":"IITP"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2020,11,30]]},"abstract":"<jats:p>The latest smartphones have started providing multiple authentication options including PINs, patterns, and passwords (knowledge based), as well as face, fingerprint, iris, and voice identification (biometric-based). In this article, we conducted two user studies to investigate how the convenience and security of unlocking phones are influenced by the provision of multiple authentication options. In a task-based user study with 52 participants, we analyze how participants choose an option to unlock their smartphone in daily life. The user study results demonstrate that providing multiple biometric-based authentication choices does not really influence convenience, because fingerprint had monopolistic dominance in the usage of unlock methods (111 of a total of 115 unlock trials that used a biometric-based authentication factor) due to users\u2019 habitual behavior and fastness in unlocking phones. However, convenience was influenced by the provision of both knowledge-based and biometric-based authentication categories, as biometric-based authentication options were used in combination with knowledge-based authentication options\u2014pattern was another frequently used unlock method. Our findings were confirmed and generalized through a follow-up survey with 327 participants. First, knowledge-based and biometric-based authentication options are used interchangeably. Second, providing multiple authentication options for knowledge-based authentication may influence convenience\u2014both PINs (55.7%) and patterns (39.2%) are quite evenly used. Last, in contrast to knowledge-based authentication, providing multiple authentication choices for biometric-based authentication has less influence on choosing unlock options\u2014fingerprint scanner is the most frequently used option (134 of 187 unlock methods used among biometric-based authentication options).<\/jats:p>","DOI":"10.1145\/3410155","type":"journal-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T04:14:17Z","timestamp":1598415257000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones"],"prefix":"10.1145","volume":"23","author":[{"given":"Geumhwan","family":"Cho","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Republic of Korea"}]},{"given":"Jun Ho","family":"Huh","sequence":"additional","affiliation":[{"name":"Samsung Research, Samsung Electronics, Republic of Korea"}]},{"given":"Soolin","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Republic of Korea"}]},{"given":"Junsung","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Republic of Korea"}]},{"given":"Heesung","family":"Park","sequence":"additional","affiliation":[{"name":"Samsung Research, Samsung Electronics, Republic of Korea"}]},{"given":"Yenah","family":"Lee","sequence":"additional","affiliation":[{"name":"Samsung Research, Samsung Electronics, Republic of Korea"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, British Columbia, Canada"}]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"volume-title":"Proceedings of the 13rd Symposium on Usable Privacy and Security.","year":"2017","author":"Albayram Yusuf","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","unstructured":"Android. 2019. Set your device for automatic unlock. Retrieved from https:\/\/support.google.com\/nexus\/answer\/6093922.  Android. 2019. Set your device for automatic unlock. Retrieved from https:\/\/support.google.com\/nexus\/answer\/6093922."},{"key":"e_1_2_1_3_1","unstructured":"Apple. 2017. iOS Security: iOS 10. Retrieved from https:\/\/www.apple.com\/business\/docs\/iOS_Security_Guide.pdf.  Apple. 2017. iOS Security: iOS 10. Retrieved from https:\/\/www.apple.com\/business\/docs\/iOS_Security_Guide.pdf."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23003"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_3"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052989"},{"volume-title":"Proceedings of the 11st Symposium on Usable Privacy and Security.","year":"2015","author":"Cherapau Ivan","key":"e_1_2_1_7_1"},{"volume-title":"Proceedings of the 33rd ACM Conference on Human Factors in Computing Systems.","year":"2015","author":"Luca Alexander De","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660273"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2841113.2841114"},{"volume-title":"Strauss","year":"1999","author":"Glaser Barney G.","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858267"},{"volume-title":"Proceedings of the 10th Symposium on Usable Privacy and Security.","year":"2014","author":"Harbach Marian","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098974"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.02.003"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.06.017"},{"volume-title":"Proceedings of the 12nd Symposium on Usable Privacy and Security.","year":"2016","author":"Mare Shrirang","key":"e_1_2_1_18_1"},{"volume-title":"Samsung Galaxy S8 Becomes World\u2019s Best-Selling Android Smartphone in Q2","year":"2017","author":"Mawston Neil","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300393"},{"volume-title":"Proceedings of the 12nd Symposium on Usable Privacy and Security.","year":"2016","author":"Stobert Elizabeth","key":"e_1_2_1_21_1"},{"volume-title":"Proceedings of the 10th Symposium on Usable Privacy and Security.","year":"2014","author":"Stobert Elizabeth","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420976"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858546"},{"volume-title":"Proceedings of the 11st Symposium on Usable Privacy and Security.","year":"2015","author":"Ur Blase","key":"e_1_2_1_26_1"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410155","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:40:59Z","timestamp":1750200059000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410155"}},"subtitle":["The More, the Better?"],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,11,30]]}},"alternative-id":["10.1145\/3410155"],"URL":"https:\/\/doi.org\/10.1145\/3410155","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2019-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}