THE USER EXPERIENCE INFLUENCE ON THE AUTHENTICATION METHODS CHOICE
The article examines the importance of user experience (UX) in authentication processes, highlighting its impact on the efficiency and comfort of interacting with systems. A review of modern authentication methods shows that, despite the popularity of passwords, existing alternatives can offer a higher level of security. Key criteria for choosing authentication methods are identified as security, ease of use, and accessibility. In the information environment, cyberattacks cause serious harm, threatening the safety of important data and even the full operation of an organization. Malicious actors use various methods to hack systems and steal personal and financial information, leading to significant financial losses and erosion of customer trust. Analytics in this area is an important aspect of company operations. The article analyzes common mistakes organizations make when choosing authentication methods and the impact of cyberattacks on these decisions. Since multi-factor authentication provides control over access to important company systems and allows reducing the risk of data leaks. In addition, its implementation and use save employees' time, making it an effective tool for business protection in the modern digital world.
Abselyamov A.-H.A., Maslova M.A., Lagutkina T.V. The User Experience Influence on the Authentication Methods Choice // Research result. Information technologies. – T.11, № 1, 2026. – P. 3-11. DOI: 10.18413/2518-1092-2026-11-1-0-1
















While nobody left any comments to this publication.
You can be first.
1. Best Methods of User Authentication // skyeng.ru – URL: https://skyeng.ru/it-industry/it/luchshiye-metody-autentifikatsii-polzovatelya/
2. Avetisyan V.A. Analysis of Existing Models of Information Security in Organizations / V.A. Avetisyan, M.A. Maslova, S.P. Belov // Information Security in the Context of Society Development: Proceedings of the III International Scientific-Practical and Scientific-Methodological Conference, Belgorod, March 28, 2023. – Belgorod: Autonomous Non-Commercial Organization of Higher Education “Belgorod University of Cooperation, Economics and Law”, 2023. – Pp. 67-79.
3. Kartsan I.N. The Impact of Cybersecurity on Information Processing in Developing New Technologies / I.N. Kartsan, Yu.Yu. Goncharenko // Issues of control of economic activity and financial audit, national security, systems analysis and management: Proceedings of the VII All-Russian scientific and practical conference, Moscow, December 29, 2021. – Moscow: Federal State Budgetary Scientific Institution "Expert-Analytical Center", 2022. – Pp. 471-479.
4. Two-factor authentication: pros and cons of the main... // kontur.ru/ – URL: https://kontur.ru/aegis/blog/55728-dvuhfaktornaya_autentifikaciya
5. Kuzminykh E.S. Analysis of the growth of cyberattacks and the information security market of the Russian Federation / E.S. Kuzminykh, M.A. Maslova // Scientific result. Information technologies. – 2023. – Vol. 8, No. 2. – Pp. 11-17.
6. Cyber fraud: portrait of the victim | Bank of Russia... // cbr.ru – URL: https://cbr.ru/statistics/information_security/cyber_portrait/2024/
7. The Pros and Cons of Two-Factor Authentication Types and Methods // www.makeuseof.com – URL: https://www.makeuseof.com/tag/pros-cons-2fa-types-methods/
8. Defining Evaluation Criteria for Selecting the Optimal... // moluch.ru – URL: https://moluch.ru/archive/131/36402
9. How to Choose a Vendor for Two-Factor Authentication: 10... // www.anti-malware.ru – URL: https://www.anti-malware.ru/practice/methods/how-to-choose-2fa-vendor
10. Belov E.B. On the Issue of Information Security Culture / E.B. Belov, M.I. Ozhiganova, A.D. Kostyukov // Sociotechnical and Humanitarian Aspects of Information Security: Proceedings of the All-Russian Scientific and Practical Conference, Pyatigorsk, April 10–13, 2019. – Pyatigorsk: Pyatigorsk State University, 2019. – Pp. 43-48.
11. Protecting Biometric Data of Artificial Intelligence Systems from Adversarial Attacks / V.M. Gerasimov, M.A. Maslova, E.I. Khalilaeva, N.S. Smirnov // Information and Security. – 2023. – Vol. 26, No. 1. – Pp. 133–142.
12. Authentication Error: What It Is, Causes, and Solutions // skyeng.ru – URL: https://skyeng.ru/magazine/wiki/it-industriya/chto-takoe-oshibka-autentifikatcii/
13. Frequently Encountered Errors When Using 2FA and Their... // sky.pro – URL: https://sky.pro/wiki/profession/chasto-vstrechayushiesya-oshibki-pri-ispolzovanii-2fa-i-ih-resheniya/
14. An Expert Warned of the Vulnerability of Two-Factor... // 1prime.ru – URL: https://1prime.ru/20251005/ekspert--863169642.html
15. Can Attackers Bypass Multi-Factor... // www.keepersecurity.com – URL: https://www.keepersecurity.com/blog/ru/2024/03/14/can-mfa-be-bypassed-by-cybercriminals/
16. Authentication: Resistance to Cyberattacks, MFA Prospects... // cisoclub.ru – URL: https://cisoclub.ru/autentifikacija/
17. Devitsyna S.N., Pilkevich P.V. Ensuring Compatibility of Technical Components When Creating an Information Security Incident Monitoring System. – Cybersecurity Issues. – 2024. – No. 4 (62). – Pp. 38-44.
18. Review of authentication methods and protocols... / Habr // habr.com – URL: https://habr.com/ru/companies/dataart/articles/262817/
19. Authentication systems and methods... – Kontur.Egida // kontur.ru – URL: https://kontur.ru/aegis/blog/54186-sistemy_i_metody_autentifikacii_polzovatelej
20. Kuzminykh E.S. Analysis of network attacks and protection against them / E.S. Kuzminykh, A.Yu. Mordvinova // Problems of design, application and security of information systems in the digital economy: Proceedings of the XXII International Scientific and Practical Conference, Rostov-on-Don, November 21–22,
2022. – Rostov-on-Don: Rostov State University of Economics "RINH", 2022. – P. 105–109.