Functional Paleontology: The Evolution of User-Visible System Services
IEEE Transactions on Software Engineering
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Journal of the American Society for Information Science and Technology - Intelligence and Security Informatics
Beyond security: implications for the future of federated digital identity management systems
OZCHI '06 Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments
Cognitive security for personal devices
Proceedings of the 1st ACM workshop on Workshop on AISec
Influencing users towards better passwords: persuasive cued click-points
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1
Exploring usability effects of increasing security in click-based graphical passwords
Proceedings of the 26th Annual Computer Security Applications Conference
Biometrics: body odor authentication perception and acceptance
ACM SIGCAS Computers and Society
Evaluation of biometric systems: a study of users' acceptance and satisfaction
International Journal of Biometrics
Biometric authentication on a mobile device: a study of user effort, error and task disruption
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Digital identities are increasingly being used to facilitate the execution of transactions in various domains. When developing and analyzing digital identity technologies, it is important to consider the perceptions and responses of end users. Users are typically concerned about privacy and security, but do not necessarily understand how these issues are impacted by the use of digital identities. In this paper, we discuss preliminary results of a survey regarding authentication technologies used to generate digital identities. Most respondents were unfamiliar with a majority of the technologies in question (e.g. hand geometry scans), and expressed uncertainty about their use. Perceptions were more positive for the use of authentication technologies in the financial domain, and more negative for their use in the retail domain. The results may inform the design of future systems.