Integrating User Experience and Acceptance in Authentication: A Synthesis of Technology Acceptance Model and User-Centered Design Principles

© 2024 by IJCTT Journal
Volume-72 Issue-4
Year of Publication : 2024
Authors : Saurav Bhattacharya, Sriram Panyam, Gaurav Deshmukh, Sudha Gatala, Vamsi Vemoori, Dhruv Seth
DOI :  10.14445/22312803/IJCTT-V72I4P102

How to Cite?

Saurav Bhattacharya, Sriram Panyam, Gaurav Deshmukh, Sudha Gatala, Vamsi Vemoori, Dhruv Seth, "Integrating User Experience and Acceptance in Authentication: A Synthesis of Technology Acceptance Model and User-Centered Design Principles," International Journal of Computer Trends and Technology, vol. 72, no. 4, pp. 15-23, 2024. Crossref,

This paper examines the intersection of the Technology Acceptance Model (TAM) and User-Centered Design (UCD) principles within the realm of usable authentication, aiming to bridge the current research gap by synthesizing the literature on the subject. We employ a systematic literature review to map the existing landscape, identify the integration of TAM and UCD in usable authentication, and highlight areas lacking in application. Our findings reveal a sporadic application of both frameworks together and underscore the potential for a more holistic approach to authentication system design that prioritizes user acceptance, usability, and security. By proposing actionable insights and recommendations for future research, this study not only enriches the theoretical understanding of usable authentication but also guides the development of user-friendly and secure authentication systems. The integration of TAM and UCD principles is advocated as a comprehensive strategy to enhance both the design process and the acceptance of authentication technologies, aiming to foster systems that are technically robust and widely adopted by users.

Technology Acceptance Model, User-Centered Design, Usable Authentication, User Acceptance, System Design, Security Technology, Literature Review, Framework Integration, Design.


[1] Fred D. Davis, “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Quarterly, vol. 13, no. 3, pp. 319-340, 1989.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Donald A. Norman, and Stephen W. Draper, “User Centered System Design: New Perspectives on Human-Computer Interaction,” The American Journal of Psychology, vol. 101, no. 1, pp. 148-151, 1988.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Fahad Al-Harby, Rami Qahwaji, and Mumtaz Kamala, “Towards an Understanding of User Acceptance to Use Biometrics Authentication Systems in E-commerce: Using an Extension of the Technology Acceptance Model,” International Journal of E-Business Research, vol. 6, no. 3, pp. 24-42, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Niranjan Gandhi, and Kanchan Patil, “Understanding the Users’ Intention to Use the Three-Factor Authentication for Preserving the Privacy of Patient Data,” Journal of Applied Security Research, vol. 18, no. 3, pp. 597-626, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Mark Moran et al., “Tablet Personal Computer Integration in Higher Education: Applying the Unified Theory of Acceptance and Use Technology Model to Understand Supporting Factors,” Journal of Educational Computing Research, vol. 42, no. 1, pp. 79-101, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Sameena Naaz et al., “OdorTAM: Technology Acceptance Model for Biometric Authentication System Using Human Body Odor,” International Journal of Environmental Research and Public Health, vol. 19, no. 24, pp. 1-17, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Dicky Jhon Anderson Butarbutar et al., “Digital Bank User Acceptance Analysis Using the Extended Technology Acceptance Model,” Journal of Systems and Information Technology, vol. 5, no. 3, pp. 36-40, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] La Ode Abdul Wahid, and Ahmad R. Pratama, “Factors Influencing Smartphone Owners' Acceptance of Biometric Authentication Methods,” Journal of Information, Communication and Ethics in Society, vol. 14, no. 2, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Yen Xin Tok, Norliza Katuk, and Ahmad Suki Che Mohamed Arif, “Smart Home Multi-factor Authentication using Face Recognition and One-time Password on Smartphone,” International Journal of Interactive Mobile Technologies, vol. 15, no. 24, pp. 32-48, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Lazarus Kwao, Richard Millham, and Enoch Opanin Gyamfi, “An Integrated Success Model for Adopting Biometric Authentication Technique for District Health Information Management System 2, Ghana,” SSRN Electronic Journal, 2020.
[CrossRef] [Google Scholar] [Publisher Link]