TY - JOUR
T1 - Beyond passwords
T2 - A review of the hidden risks in two-factor authentication
AU - Wang, Pengcheng
AU - Boodraj, Maheshwar
AU - Baskerville, Richard
N1 - Publisher Copyright:
© 2025 Emerald Publishing Limited
PY - 2025
Y1 - 2025
N2 - Purpose – This paper aims to investigate the hidden risks that result from implementing two-factor authentication, a widely adopted technique for enhancing information security. Two-factor authentication systems can provide an effective solution to mitigate the risks associated with single-factor authentication. However, it should be noted that the introduction of a second authentication factor must be carefully evaluated to ensure it does not introduce hidden risks to the system. Design/methodology/approach – The authors undertake a systematic literature review to evaluate and synthesize existing empirical findings on two-factor authentication. Specifically, to enhance the effectiveness of two-factor authentication systems, this study synthesized the two-factor authentication literature to identify potential security risks that the second authentication factor may introduce to the system. Findings – The review of 52 relevant papers reveals that using additional authentication factors beyond passwords may result in high computing power and operational complexity, high operating costs, low reliability and trust and adoption issues, as well as other unanticipated risks. Originality/value – The authors highlight the hidden risks associated with implementing two-factor authentication. They also highlight several inadequacies in the current literature, including the requirement for consistent evaluation methods, a more extensive range of research on various types of two-factor authentications and the use of behavioral techniques to explore how individuals and organizations adopt two-factor authentication. Furthermore, the authors offer researchers and practitioners targeted guidance on designing and implementing various two-factor authentication systems.
AB - Purpose – This paper aims to investigate the hidden risks that result from implementing two-factor authentication, a widely adopted technique for enhancing information security. Two-factor authentication systems can provide an effective solution to mitigate the risks associated with single-factor authentication. However, it should be noted that the introduction of a second authentication factor must be carefully evaluated to ensure it does not introduce hidden risks to the system. Design/methodology/approach – The authors undertake a systematic literature review to evaluate and synthesize existing empirical findings on two-factor authentication. Specifically, to enhance the effectiveness of two-factor authentication systems, this study synthesized the two-factor authentication literature to identify potential security risks that the second authentication factor may introduce to the system. Findings – The review of 52 relevant papers reveals that using additional authentication factors beyond passwords may result in high computing power and operational complexity, high operating costs, low reliability and trust and adoption issues, as well as other unanticipated risks. Originality/value – The authors highlight the hidden risks associated with implementing two-factor authentication. They also highlight several inadequacies in the current literature, including the requirement for consistent evaluation methods, a more extensive range of research on various types of two-factor authentications and the use of behavioral techniques to explore how individuals and organizations adopt two-factor authentication. Furthermore, the authors offer researchers and practitioners targeted guidance on designing and implementing various two-factor authentication systems.
KW - 2FA
KW - Cybersecurity
KW - Information security
KW - Passwords
KW - Risk management
KW - Systematic literature review
KW - Two-factor authentication
UR - https://www.scopus.com/pages/publications/105018689771
U2 - 10.1108/JSIT-03-2025-0140
DO - 10.1108/JSIT-03-2025-0140
M3 - Review article
AN - SCOPUS:105018689771
SN - 1328-7265
JO - Journal of Systems and Information Technology
JF - Journal of Systems and Information Technology
ER -