Information Technology Reference
In-Depth Information
including descriptive statistics as well as the evaluation of the relevance of each
item and of the corresponding hypothesis 6 . The most substantial and only strong
success factor is User acceptance and Ease of Use of an implemented authenti-
cation method. Furthermore, six moderate success factors have been identified,
four at the system level and each one at the method and provider level.
4.4 Discussion and Implications
According to the experts' judgement, AaaS is a significant future technology for
both private users and organizations in order to increasingly replace or supple-
ment existing password-based authentication with stronger methods. Primary
authentication methods will be token-based; biometric ones are evaluated to be
rather supplementary even in the medium to long run. Considering the deter-
mined success factors, possible reasons might, for instance, include an expected
lower end user acceptance or data protection-related concerns [e.g., 4, 12]. How-
ever, actual reasons must be investigated in more detail and in regard to specific
use cases.
Private user-centric applications include public fields such as e-Government
and rather critical private web-based services such as e-Banking. Here, mainly
soft tokens and device-dependent hard-tokens will be used for the implemen-
tation of AaaS. Expert feedback furthermore indicates that services for public
applications will mainly be based on electronic identity cards (eID) while private
scenarios will utilize more ubiquitous soft-token-based methods. For organiza-
tional and business user-centric applications, hardware tokens based on dedi-
cated reading devices promise highest security [4] and are despite of involved
costs clearly most important for the implementation of AaaS systems.
Fig. 4. Systematization of determined Success Factors
6 [+] support, [-] falsification of a hypothesis.
 
Search WWH ::




Custom Search