Authentication Mechanisms for Mobile Learning Applications: a Usability Study

  • Authors

    • Kang Hean Yong
    • Norliza Katuk
    • Nur Haryani Zakaria
    2018-11-27
    https://doi.org/10.14419/ijet.v7i4.19.22047
  • User authentication, social network, social network login, social login, user credentials.
  • Authentication is a security component that maintains user access to applications. It has been the primary reason for users to create usernames and passwords before they can use applications. In creating usernames and passwords; users are required to fill in their personal information in which it is a time-consuming process. Additionally, it also increases the number of usernames and passwords that users need to remember which leads to password fatigue. Social login is a way to address this problem. With the benefits that social login could offer, this study aims to study the usability of social login for mobile learning. Further, the user’s preference towards authentication mechanisms used for mobile learning applications was identified. An experimental study was conducted using a mobile learning application named LANGKAWI ISLANDS. Forty participants participated in this study on a voluntary basis and used the traditional and social login on LANGKAWI ISLANDS. The time taken by the participants to sign up the application using both mechanisms was recorded. The usability of the authentication mechanisms was evaluated using a self-report questionnaire. Then, the participants stated their preference for the authentication mechanisms. The results suggest that the social login is more usable than the traditional authentication mechanism. Further, the users’ signup process for LANGKAWI ISLANDS is much faster using social login and has been the primary users’ preference for mobile learning authentication mechanism.

     

     

  • References

    1. [1] H. R. Marriott and M. D. Williams, "Developing a Theoretical Model to Examine Consumer Acceptance Behavior of Mobile Shopping," in Conference on e-Business, e-Services and e-Society, 2016, pp. 261-266.

      [2] S. R. Jan, F. Ullah, H. Ali, and F. Khan, "Enhanced and Effective Learning through Mobile Learning an Insight into Students Perception of Mobile Learning at University Level," International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN, pp. 2395-1990, 2016.

      [3] C. P. Lim and D. Churchill, "Mobile learning," Interactive Learning Environments, vol. 24, pp. 273-276, 2016/02/17 2016.

      [4] M. Sarrab, M. Elbasir, and S. Alnaeli, "Towards a quality model of technical aspects for mobile learning services: An empirical investigation," Computers in Human Behavior, vol. 55, pp. 100-112, 2016.

      [5] A. Tanti and D. Buhalis, "The influences and consequences of being digitally connected and/or disconnected to travellers," Information Technology & Tourism, vol. 17, pp. 121-141, 2017.

      [6] L. K. Moey, N. Katuk, and M. H. Omar, "Social login privacy alert: Does it improve privacy awareness of facebook users?," in Computer Applications & Industrial Electronics (ISCAIE), 2016 IEEE Symposium on, 2016, pp. 95-100.

      [7] Y. Madani, J. Bengourram, and M. Erritali, "Social Login and Data Storage in the Big Data File System HDFS," in Proceedings of the International Conference on Compute and Data Analysis, 2017, pp. 91-97.

      [8] Y. Madani, J. Bengourram, M. Erritali, B. Hssina, and M. Birjali, "Adaptive e-learning using Genetic Algorithm and Sentiments Analysis in a Big Data System," International Journal of Advanced Computer Science And Applications, vol. 8, pp. 394-403, 2017.

      [9] N. B. Ismail and H. M. Dahlan, "Technical features for social commerce website," in Student Project Conference (ICT-ISPC), 2017 6th ICT International, 2017, pp. 1-5.

      [10] S.-T. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov, "A billion keys, but few locks: the crisis of web single sign-on," in Proceedings of the 2010 workshop on New security paradigms, 2010, pp. 61-72.

      [11] M. Tsikerdekis, "Real-Time Identity Deception Detection Techniques for Social Media: Optimizations and Challenges," IEEE Internet Computing, 2017.

      [12] Y. Li, J. Jiang, and T. Liu, "Inferring User Consumption Preferences from Social Media," IEICE Transaction on Information and Systems, vol. 100, pp. 537-545, 2017.

      [13] N. Katuk, H. M. Tahir, N. H. Zakaria, and M. S. Halim, "Can single sign-on improve password management? A focus group study," in Pattern Analysis, Intelligent Security and the Internet of Things, ed: Springer, 2015, pp. 85-93.

      [14] S. Iaconesi, "Interface and Data Biopolitics in the Age of Hyperconnectivity. Implications for Design," The Design Journal, vol. 20, pp. S3935-S3944, 2017.

      [15] C. Zuo, Q. Zhao, and Z. Lin, "AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 799-813.

      [16] M. Aristeidou, E. Scanlon, and M. Sharples, "Design Guidelines for Sensor-based Mobile Learning Applications," 2017.

      [17] J. Krämer, D. Schnurr, and M. Wohlfarth, "Winners, Losers, and Facebook: The Role of Social Logins in the Online Advertising Ecosystem," 2017.

      [18] T. Geethamanasa and M. N. Rajeswari, "Involving Community Media To E-Business Wintry-Commence Invention Proposal Using Microblogging Information," International Journal Of Innovative Technology And Research, vol. 5, pp. 6367-6369, 2017.

      [19] S. Egelman, "My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2013, pp. 2369-2378.

      [20] A. Hussain, N. L. Hashim, N. Nordin, and H. M. Tahir, "A metric-based evaluation model for applications on mobile phones," Journal of ICT, vol. 12, pp. 55-71, 2013.

      [21] A. M. Lund, "Measuring usability with the USE questionnaire," Usability interface, vol. 8, pp. 3-6, 2001.

      [22] H. A. Mahmoud and S. Hassan, "Using Microsoft Multipoint Technology and Interaction Design to Leverage Collaboration among Primary School Students," in The proceedings of 5th International Conference on Knowledge Management 2010, 2010, pp. 174-179.

      [23] M. I. Sabri and A. Hussain, "Mobile recommender application for promoting electricity saving among Iraqis," in AIP Conference Proceedings, 2017, p. 020124.

      [24] A. Hussain, M. Isam, and E. O. Mkpojiogu, "A UX Assessment of Mobile Recommender App for Household Electrical Energy Savings," Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 9, pp. 23-27, 2017.

      [25] M. N. F. A. Razak, A. Hussain, and M. M. F. Hamdi, "Usability study of youtube websites for Malaysian teenagers," in AIP Conference Proceedings, 2017, p. 020121.

  • Downloads

  • How to Cite

    Hean Yong, K., Katuk, N., & Haryani Zakaria, N. (2018). Authentication Mechanisms for Mobile Learning Applications: a Usability Study. International Journal of Engineering & Technology, 7(4.19), 193-198. https://doi.org/10.14419/ijet.v7i4.19.22047