Details
Original language | English |
---|---|
Article number | 13 |
Journal | ACM Transactions on Computer-Human Interaction |
Volume | 32 |
Issue number | 2 |
Early online date | 1 Nov 2024 |
Publication status | Published - 19 Apr 2025 |
Abstract
Smart home applications aim to increase convenience, yet often require authentication to protect sensitive data. This is non-trivial: effortful authentication contradicts intended convenience, the multitude of devices raises scalability issues, many devices lack suitable interfaces, and the presence of other inhabitants requires intentional and acceptable interactions. To address these issues, we explored new and creative authentication interactions with an interaction relabeling approach using everyday objects. We conducted six focus group workshops with 20 participants in a living room and a kitchen setting that resulted in a variety of creative authentication interactions with analogue and digital objects. Furthermore, participants created authentication interactions based on tasks that they have to or wish to perform anyway such as cleaning the kitchen - thus primary tasks. This led us to explore the option to transform authentication from being an additional, secondary task toward using primary tasks further in an online study with 194 participants. Relevant implications in terms of acceptable authentication task characteristics, user perceptions, arising security challenges, and psychological habit research are discussed.
Keywords
- authentication, interaction relabelling, smart home, tangible
ASJC Scopus subject areas
- Computer Science(all)
- Human-Computer Interaction
Cite this
- Standard
- Harvard
- Apa
- Vancouver
- BibTeX
- RIS
In: ACM Transactions on Computer-Human Interaction, Vol. 32, No. 2, 13, 19.04.2025.
Research output: Contribution to journal › Article › Research › peer review
}
TY - JOUR
T1 - Authenticate as You Go
T2 - From Exploring Smart Home Authentication with Daily Objects to Authenticating with Primary Tasks
AU - Zimmermann, Verena
AU - Schäfer, Stina
AU - Dürmuth, Markus
AU - Marky, Karola
N1 - Publisher Copyright: © 2025 Copyright held by the owner/author(s).
PY - 2025/4/19
Y1 - 2025/4/19
N2 - Smart home applications aim to increase convenience, yet often require authentication to protect sensitive data. This is non-trivial: effortful authentication contradicts intended convenience, the multitude of devices raises scalability issues, many devices lack suitable interfaces, and the presence of other inhabitants requires intentional and acceptable interactions. To address these issues, we explored new and creative authentication interactions with an interaction relabeling approach using everyday objects. We conducted six focus group workshops with 20 participants in a living room and a kitchen setting that resulted in a variety of creative authentication interactions with analogue and digital objects. Furthermore, participants created authentication interactions based on tasks that they have to or wish to perform anyway such as cleaning the kitchen - thus primary tasks. This led us to explore the option to transform authentication from being an additional, secondary task toward using primary tasks further in an online study with 194 participants. Relevant implications in terms of acceptable authentication task characteristics, user perceptions, arising security challenges, and psychological habit research are discussed.
AB - Smart home applications aim to increase convenience, yet often require authentication to protect sensitive data. This is non-trivial: effortful authentication contradicts intended convenience, the multitude of devices raises scalability issues, many devices lack suitable interfaces, and the presence of other inhabitants requires intentional and acceptable interactions. To address these issues, we explored new and creative authentication interactions with an interaction relabeling approach using everyday objects. We conducted six focus group workshops with 20 participants in a living room and a kitchen setting that resulted in a variety of creative authentication interactions with analogue and digital objects. Furthermore, participants created authentication interactions based on tasks that they have to or wish to perform anyway such as cleaning the kitchen - thus primary tasks. This led us to explore the option to transform authentication from being an additional, secondary task toward using primary tasks further in an online study with 194 participants. Relevant implications in terms of acceptable authentication task characteristics, user perceptions, arising security challenges, and psychological habit research are discussed.
KW - authentication
KW - interaction relabelling
KW - smart home
KW - tangible
UR - http://www.scopus.com/inward/record.url?scp=105004053214&partnerID=8YFLogxK
U2 - 10.1145/3702318
DO - 10.1145/3702318
M3 - Article
AN - SCOPUS:105004053214
VL - 32
JO - ACM Transactions on Computer-Human Interaction
JF - ACM Transactions on Computer-Human Interaction
SN - 1073-0516
IS - 2
M1 - 13
ER -