Until you have something to lose! Loss aversion and two-factor authentication adoption

Purpose – In this study, the authors seek to understand factors that naturally influence users to adopt two-factor authentication (2FA) without even trying to intervene by investigating factors within individuals that may influence their decision to adopt 2FA by themselves. Design/methodology/approa...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmad R. Pratama, Firman M. Firmansyah
Format: Article
Language:English
Published: Emerald Publishing 2025-01-01
Series:Applied Computing and Informatics
Subjects:
Online Access:https://www.emerald.com/insight/content/doi/10.1108/ACI-12-2020-0156/full/pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832583475124764672
author Ahmad R. Pratama
Firman M. Firmansyah
author_facet Ahmad R. Pratama
Firman M. Firmansyah
author_sort Ahmad R. Pratama
collection DOAJ
description Purpose – In this study, the authors seek to understand factors that naturally influence users to adopt two-factor authentication (2FA) without even trying to intervene by investigating factors within individuals that may influence their decision to adopt 2FA by themselves. Design/methodology/approach – A total of 1,852 individuals from all 34 provinces in Indonesia participated in this study by filling out online questionnaires. The authors discussed the results from statistical analysis further through the lens of the loss aversion theory. Findings – The authors found that loss aversion, represented by higher income that translates to greater potential pain caused by losing things to be the most significant demographic factor behind 2FA adoption. On the contrary, those with a low-income background, even if they have some college degree, are more likely to skip 2FA despite their awareness of this technology. The authors also found that the older generation, particularly females, to be among the most vulnerable groups when it comes to authentication-based cyber threats as they are much less likely to adopt 2FA, or even to be aware of its existence in the first place. Originality/value – Authentication is one of the most important topics in cybersecurity that is related to human-computer interaction. While 2FA increases the security level of authentication methods, it also requires extra efforts that can translate to some level of inconvenience on the user's end. By identifying the associated factors from the user's ends, a necessary intervention can be made so that more users are willing to jump on the 2FA adopters' train.
format Article
id doaj-art-635448baddae40c78112f7be0eff87b6
institution Kabale University
issn 2634-1964
2210-8327
language English
publishDate 2025-01-01
publisher Emerald Publishing
record_format Article
series Applied Computing and Informatics
spelling doaj-art-635448baddae40c78112f7be0eff87b62025-01-28T12:19:18ZengEmerald PublishingApplied Computing and Informatics2634-19642210-83272025-01-01211/2536410.1108/ACI-12-2020-0156Until you have something to lose! Loss aversion and two-factor authentication adoptionAhmad R. Pratama0Firman M. Firmansyah1Informatics, Universitas Islam Indonesia, Yogyakarta, IndonesiaTechnology and Society, Stony Brook University, Stony Brook, New York, USAPurpose – In this study, the authors seek to understand factors that naturally influence users to adopt two-factor authentication (2FA) without even trying to intervene by investigating factors within individuals that may influence their decision to adopt 2FA by themselves. Design/methodology/approach – A total of 1,852 individuals from all 34 provinces in Indonesia participated in this study by filling out online questionnaires. The authors discussed the results from statistical analysis further through the lens of the loss aversion theory. Findings – The authors found that loss aversion, represented by higher income that translates to greater potential pain caused by losing things to be the most significant demographic factor behind 2FA adoption. On the contrary, those with a low-income background, even if they have some college degree, are more likely to skip 2FA despite their awareness of this technology. The authors also found that the older generation, particularly females, to be among the most vulnerable groups when it comes to authentication-based cyber threats as they are much less likely to adopt 2FA, or even to be aware of its existence in the first place. Originality/value – Authentication is one of the most important topics in cybersecurity that is related to human-computer interaction. While 2FA increases the security level of authentication methods, it also requires extra efforts that can translate to some level of inconvenience on the user's end. By identifying the associated factors from the user's ends, a necessary intervention can be made so that more users are willing to jump on the 2FA adopters' train.https://www.emerald.com/insight/content/doi/10.1108/ACI-12-2020-0156/full/pdfTwo-factor authenticationAwarenessAdoptionLoss aversionDemographics factorsVulnerable groups
spellingShingle Ahmad R. Pratama
Firman M. Firmansyah
Until you have something to lose! Loss aversion and two-factor authentication adoption
Applied Computing and Informatics
Two-factor authentication
Awareness
Adoption
Loss aversion
Demographics factors
Vulnerable groups
title Until you have something to lose! Loss aversion and two-factor authentication adoption
title_full Until you have something to lose! Loss aversion and two-factor authentication adoption
title_fullStr Until you have something to lose! Loss aversion and two-factor authentication adoption
title_full_unstemmed Until you have something to lose! Loss aversion and two-factor authentication adoption
title_short Until you have something to lose! Loss aversion and two-factor authentication adoption
title_sort until you have something to lose loss aversion and two factor authentication adoption
topic Two-factor authentication
Awareness
Adoption
Loss aversion
Demographics factors
Vulnerable groups
url https://www.emerald.com/insight/content/doi/10.1108/ACI-12-2020-0156/full/pdf
work_keys_str_mv AT ahmadrpratama untilyouhavesomethingtoloselossaversionandtwofactorauthenticationadoption
AT firmanmfirmansyah untilyouhavesomethingtoloselossaversionandtwofactorauthenticationadoption