Please use this identifier to cite or link to this item:
http://ir.lib.seu.ac.lk/handle/123456789/5824
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mehraj, Haider | - |
dc.contributor.author | Jayadevappa, D. | - |
dc.contributor.author | Abdul Haleem, Sulaima Lebbe | - |
dc.contributor.author | Parveen, Rehana | - |
dc.contributor.author | Madduri, Abhishek | - |
dc.contributor.author | Ayyagari, Maruthi Rohit | - |
dc.contributor.author | Dhabliya, Dharmesh | - |
dc.date.accessioned | 2021-10-28T05:02:23Z | - |
dc.date.available | 2021-10-28T05:02:23Z | - |
dc.date.issued | 2021-10-06 | - |
dc.identifier.citation | Pattern Recognition Letters, Volume 152, 2021, Pages 218-224 | en_US |
dc.identifier.issn | 0167-8655 | - |
dc.identifier.uri | https://doi.org/10.1016/j.patrec.2021.10.002 | - |
dc.identifier.uri | http://ir.lib.seu.ac.lk/handle/123456789/5824 | - |
dc.description.abstract | Nowadays, Passwords are to identify users of Social Networking Sites (SNS). However, there are some downsides to it such as the user forgetting their password or the account being hacked by an attacker. To retrieve their password, websites are asking for an alternate email address or security question. Due to its expanding features and popularity, social media has become more vulnerable. It is no secret that social media providers leave security to the discretion of users during the development, which raises serious concerns. Earlier research has been supported by the Protective Motivation Theory (PMT), which provides a hypothetical structure for analyzing the protection of Internet users. According to the current internet safety search, new engines incorporated into a PMT structure for perhaps the first time. Adaptation assessment variables, including the strength of behavior, the effectiveness of responses, and individual responsibility, were the most important predictors of online safety intentions. A multi-factor authentication mechanism linked to a trust model used on SNS. The needs, actions, and behaviors of users are particularly adaptable to confidence systems. The level of threat was also a significant predictor. The explanatory power of the standard PMT model with the multi-factor authentication technique was raised by 15% by incorporating new components such as past experiences, behavioral control, habitual strength, security and safety support, and individual responsibility. The results are considered in the advanced evolution of PMT in the context of Internet security for home computer users. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.subject | Trusted authentication | en_US |
dc.subject | Security vulnerabilities | en_US |
dc.subject | Social media | en_US |
dc.subject | Protective motivation theory | en_US |
dc.subject | Multi-factor authentication | en_US |
dc.subject | Prevention strategy | en_US |
dc.title | Protection Motivation Theory using Multi-factor authentication for providing security over Social Networking Sites | en_US |
Appears in Collections: | Research Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Protection motivation theory using multi-factor ....pdf | 191.7 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.