<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2026-11-1-0-1</article-id><article-id pub-id-type="publisher-id">4095</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;THE USER EXPERIENCE INFLUENCE ON THE AUTHENTICATION METHODS CHOICE&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;THE USER EXPERIENCE INFLUENCE ON THE AUTHENTICATION METHODS CHOICE&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Abselyamov</surname><given-names>Amet-Han Alim-ogly</given-names></name><name xml:lang="en"><surname>Abselyamov</surname><given-names>Amet-Han Alim-ogly</given-names></name></name-alternatives><email>batrebless@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Lagutkina</surname><given-names>Tatyana Vladimirovna</given-names></name><name xml:lang="en"><surname>Lagutkina</surname><given-names>Tatyana Vladimirovna</given-names></name></name-alternatives><email>lagutkina.tatiana@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2026</year></pub-date><volume>11</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2026/1/НР.ИТ_11.1_1_lQhKkP1.pdf" /><abstract xml:lang="ru"><p>The article examines the importance of user experience (UX) in authentication processes, highlighting its impact on the efficiency and comfort of interacting with systems. A review of modern authentication methods shows that, despite the popularity of passwords, existing alternatives can offer a higher level of security. Key criteria for choosing authentication methods are identified as security, ease of use, and accessibility. In the information environment, cyberattacks cause serious harm, threatening the safety of important data and even the full operation of an organization. Malicious actors use various methods to hack systems and steal personal and financial information, leading to significant financial losses and erosion of customer trust. Analytics in this area is an important aspect of company operations. The article analyzes common mistakes organizations make when choosing authentication methods and the impact of cyberattacks on these decisions. Since multi-factor authentication provides control over access to important company systems and allows reducing the risk of data leaks. In addition, its implementation and use save employees&amp;#39; time, making it an effective tool for business protection in the modern digital world.</p></abstract><trans-abstract xml:lang="en"><p>The article examines the importance of user experience (UX) in authentication processes, highlighting its impact on the efficiency and comfort of interacting with systems. A review of modern authentication methods shows that, despite the popularity of passwords, existing alternatives can offer a higher level of security. Key criteria for choosing authentication methods are identified as security, ease of use, and accessibility. In the information environment, cyberattacks cause serious harm, threatening the safety of important data and even the full operation of an organization. Malicious actors use various methods to hack systems and steal personal and financial information, leading to significant financial losses and erosion of customer trust. Analytics in this area is an important aspect of company operations. The article analyzes common mistakes organizations make when choosing authentication methods and the impact of cyberattacks on these decisions. Since multi-factor authentication provides control over access to important company systems and allows reducing the risk of data leaks. In addition, its implementation and use save employees&amp;#39; time, making it an effective tool for business protection in the modern digital world.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>user experience</kwd><kwd>authentication</kwd><kwd>security</kwd><kwd>multi-factor authentication</kwd><kwd>biometric authentication</kwd><kwd>information security</kwd></kwd-group><kwd-group xml:lang="en"><kwd>user experience</kwd><kwd>authentication</kwd><kwd>security</kwd><kwd>multi-factor authentication</kwd><kwd>biometric authentication</kwd><kwd>information security</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1. Best Methods of User Authentication // skyeng.ru &amp;ndash; URL: https://skyeng.ru/it-industry/it/luchshiye-metody-autentifikatsii-polzovatelya/</mixed-citation></ref><ref id="B2"><mixed-citation>2. Avetisyan V.A. Analysis of Existing Models of Information Security in Organizations / V.A. Avetisyan, M.A. Maslova, S.P. Belov // Information Security in the Context of Society Development: Proceedings of the III International Scientific-Practical and Scientific-Methodological Conference, Belgorod, March 28, 2023. &amp;ndash; Belgorod: Autonomous Non-Commercial Organization of Higher Education &amp;ldquo;Belgorod University of Cooperation, Economics and Law&amp;rdquo;, 2023. &amp;ndash; Pp. 67-79.</mixed-citation></ref><ref id="B3"><mixed-citation>3. Kartsan I.N. The Impact of Cybersecurity on Information Processing in Developing New Technologies / I.N. Kartsan, Yu.Yu. Goncharenko // Issues of control of economic activity and financial audit, national security, systems analysis and management: Proceedings of the VII All-Russian scientific and practical conference, Moscow, December 29, 2021. &amp;ndash; Moscow: Federal State Budgetary Scientific Institution &amp;quot;Expert-Analytical Center&amp;quot;, 2022. &amp;ndash; Pp. 471-479.</mixed-citation></ref><ref id="B4"><mixed-citation>4. Two-factor authentication: pros and cons of the main... // kontur.ru/ &amp;ndash; URL: https://kontur.ru/aegis/blog/55728-dvuhfaktornaya_autentifikaciya</mixed-citation></ref><ref id="B5"><mixed-citation>5. Kuzminykh E.S. Analysis of the growth of cyberattacks and the information security market of the Russian Federation / E.S. Kuzminykh, M.A. Maslova // Scientific result. Information technologies. &amp;ndash; 2023. &amp;ndash; Vol. 8, No. 2.&amp;nbsp;&amp;ndash; Pp. 11-17.</mixed-citation></ref><ref id="B6"><mixed-citation>6. Cyber fraud: portrait of the victim | Bank of Russia... // cbr.ru &amp;ndash; URL: https://cbr.ru/statistics/information_security/cyber_portrait/2024/</mixed-citation></ref><ref id="B7"><mixed-citation>7. The Pros and Cons of Two-Factor Authentication Types and Methods // www.makeuseof.com &amp;ndash; URL: https://www.makeuseof.com/tag/pros-cons-2fa-types-methods/</mixed-citation></ref><ref id="B8"><mixed-citation>8.&amp;nbsp;Defining Evaluation Criteria for Selecting the Optimal... // moluch.ru &amp;ndash; URL: https://moluch.ru/archive/131/36402</mixed-citation></ref><ref id="B9"><mixed-citation>9. How to Choose a Vendor for Two-Factor Authentication: 10... // www.anti-malware.ru &amp;ndash; URL: https://www.anti-malware.ru/practice/methods/how-to-choose-2fa-vendor</mixed-citation></ref><ref id="B10"><mixed-citation>10. Belov E.B. On the Issue of Information Security Culture / E.B. Belov, M.I. Ozhiganova, A.D. Kostyukov // Sociotechnical and Humanitarian Aspects of Information Security: Proceedings of the All-Russian Scientific and Practical Conference, Pyatigorsk, April 10&amp;ndash;13, 2019. &amp;ndash; Pyatigorsk: Pyatigorsk State University, 2019. &amp;ndash; Pp. 43-48.</mixed-citation></ref><ref id="B11"><mixed-citation>11. Protecting Biometric Data of Artificial Intelligence Systems from Adversarial Attacks / V.M. Gerasimov, M.A. Maslova, E.I. Khalilaeva, N.S. Smirnov // Information and Security. &amp;ndash; 2023. &amp;ndash; Vol. 26, No. 1. &amp;ndash; Pp. 133&amp;ndash;142.</mixed-citation></ref><ref id="B12"><mixed-citation>12. Authentication Error: What It Is, Causes, and Solutions // skyeng.ru &amp;ndash; URL: https://skyeng.ru/magazine/wiki/it-industriya/chto-takoe-oshibka-autentifikatcii/</mixed-citation></ref><ref id="B13"><mixed-citation>13. Frequently Encountered Errors When Using 2FA and Their... // sky.pro &amp;ndash; URL: https://sky.pro/wiki/profession/chasto-vstrechayushiesya-oshibki-pri-ispolzovanii-2fa-i-ih-resheniya/</mixed-citation></ref><ref id="B14"><mixed-citation>14. An Expert Warned of the Vulnerability of Two-Factor... // 1prime.ru &amp;ndash; URL: https://1prime.ru/20251005/ekspert--863169642.html</mixed-citation></ref><ref id="B15"><mixed-citation>15. Can Attackers Bypass Multi-Factor... // www.keepersecurity.com &amp;ndash; URL: https://www.keepersecurity.com/blog/ru/2024/03/14/can-mfa-be-bypassed-by-cybercriminals/</mixed-citation></ref><ref id="B16"><mixed-citation>16. Authentication: Resistance to Cyberattacks, MFA Prospects... // cisoclub.ru &amp;ndash; URL: https://cisoclub.ru/autentifikacija/</mixed-citation></ref><ref id="B17"><mixed-citation>17. Devitsyna S.N., Pilkevich P.V. Ensuring Compatibility of Technical Components When Creating an Information Security Incident Monitoring System. &amp;ndash; Cybersecurity Issues. &amp;ndash; 2024. &amp;ndash; No. 4 (62). &amp;ndash; Pp. 38-44.</mixed-citation></ref><ref id="B18"><mixed-citation>18. Review of authentication methods and protocols... / Habr // habr.com &amp;ndash; URL: https://habr.com/ru/companies/dataart/articles/262817/</mixed-citation></ref><ref id="B19"><mixed-citation>19. Authentication systems and methods... &amp;ndash; Kontur.Egida // kontur.ru &amp;ndash; URL: https://kontur.ru/aegis/blog/54186-sistemy_i_metody_autentifikacii_polzovatelej</mixed-citation></ref><ref id="B20"><mixed-citation>20. Kuzminykh E.S. Analysis of network attacks and protection against them / E.S. Kuzminykh, A.Yu.&amp;nbsp;Mordvinova // Problems of design, application and security of information systems in the digital economy: Proceedings of the XXII International Scientific and Practical Conference, Rostov-on-Don, November 21&amp;ndash;22,</mixed-citation></ref><ref id="B21"><mixed-citation>2022. &amp;ndash; Rostov-on-Don: Rostov State University of Economics &amp;quot;RINH&amp;quot;, 2022. &amp;ndash; P. 105&amp;ndash;109.</mixed-citation></ref></ref-list></back></article>