Human-Centric Passwordless Authentication: Beyond Technology to Workforce Transformation
DOI:
https://doi.org/10.22399/ijcesen.4002Keywords:
passwordless authentication, enterprise security, human-centric design, workflow integration, persona-based authentication, adaptive architectureAbstract
The modern enterprise authentication environment is confronted with unprecedented challenges derived from password-based security designs that introduce systemic risks with enormous operating expenses. Conventional password infrastructures create cascading security breaches via credential compromise events, while at the same time wasting organizational resources through support overhead and productivity degradation. The shift to passwordless authentication marks a seismic paradigm change toward human-oriented security design that focuses on user workflow incorporation as opposed to technology-driven deployments. Organizations need to implement persona-based authentication strategies that identify heterogeneous workforce needs among knowledge workers, frontline workers, and privileged users. Passwordless deployments need to be based on advanced collaborative frameworks under which Human Resources, Information Technology, and business unit leadership collaborate in strategic partnership. Authentication journey mapping methods allow for evidence-based technology selection that aligns specific authentication techniques with tested workflow requirements instead of forcing generic solutions on heterogeneous populations. Implementation failures are always due to poor lifecycle planning, especially in new employee onboarding and authenticator recovery situations. Phased deployment approaches with robust communication campaigns yield better adoption with reduced operational impact. The future of enterprise authentication requires dynamic multi-authenticator designs with contextual risk-based policies that facilitate transparent user experiences for everyday operations but dynamically increase security controls for high-risk situations.
References
[1] Adarsh Thapa et al., "Security Analysis of User Authentication and Methods," ACM, 2022. [Online]. Available: https://www.researchgate.net/profile/Adarsh-Thapa-2/publication/363090612_Security_Analysis_of_User_Authentication_and_Methods/links/630dc3bcacd814437fea0c95/Security-Analysis-of-User-Authentication-and-Methods.pdf
[2] Kostantinos Papadamou et al., "Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication," arXiv, 2020. [Online]. Available: https://arxiv.org/pdf/1811.08360
[3] Michal Kepkowski et al., "Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study,"arXiv, 2023. [Online]. Available: https://arxiv.org/pdf/2308.08096
[4] Rebecca Acheampong et al., "Enhancing Security and Authenticity in Immersive Environments," MDPI, 2025. [Online]. Available: https://www.mdpi.com/2078-2489/16/3/191
[5] Kemal Bicakci and Yusuf Uzunay, "Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position Paper," arXiv, 2022. [Online]. Available: https://arxiv.org/pdf/2211.07161
[6] Carolina Pereira et al., "Security and Privacy in Physical–Digital Environments: Trends and Opportunities," MDPI, 2025. [Online]. Available: https://www.mdpi.com/1999-5903/17/2/83
[7] Ioanna Anastasaki et al., "User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review," MDPI, 2023. [Online]. Available: https://www.mdpi.com/2078-2489/14/10/538
[8] Thomas Kohler et al., "CO-CREATION IN VIRTUAL WORLDS: THE DESIGN OF THE USER EXPERIENCE," MIS Quarterly, 2011. [Online]. Available: https://www.researchgate.net/profile/Kurt-Matzler/publication/220260164_Co-Creation_in_Virtual_Worlds_The_Design_of_the_User_Experience/links/0912f50bc60cd477d2000000/Co-Creation-in-Virtual-Worlds-The-Design-of-the-User-Experience.pdf?_sg%5B0%5D=started_experiment_milestone&origin=journalDetail&_rtd=e30%3D
[9] Alina Oprea et al., "Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data," arXiv, 2024. [Online]. Available: https://arxiv.org/pdf/1411.5005
[10] Chris Gilbert and Mercy Abiola Gilbert, "Continuous User Authentication on Mobile Devices," International Research Journal of Advanced Engineering and Science, 2025. [Online]. Available: http://irjaes.com/wp-content/uploads/2025/03/IRJAES-V10N1P355Y25.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.