Practical Biometrics: From Aspiration to Implementation
Practical Biometrics: From Aspiration to Implementation
Security and usability: the case of the user authentication methods
IHM '06 Proceedings of the 18th International Conferenceof the Association Francophone d'Interaction Homme-Machine
Empirical analysis of biometric technology adoption and acceptance in Botswana
Journal of Systems and Software
AI & Society - Special Issue: Enculturating Human-Computer Interaction, Guest Editors: M. Rehm, Y. Nakano, E. André, T. Nishida
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
Secure, usable biometric authentication systems
UAHCI'13 Proceedings of the 7th international conference on Universal Access in Human-Computer Interaction: design methods, tools, and interaction techniques for eInclusion - Volume Part I
Hi-index | 0.00 |
One way to secure Information Technology (IT) systems is with authentication mechanisms that distinguish between users. Users who differ in their cognitive and motor abilities, cultural background and personal characteristics should be able to operate the IT system including its security features. If system design fails to consider user diversity, users might bypass or disable the security feature, reducing system security. Providing universal accessesibility and acceptability is generally a challenge, especially when dealing with IT security. We present a conceptual model that explores and establishes guidelines for the inclusion of biometric authentication in systems which serve a wide range of users. Aspects of this model were examined in laboratory settings using a task which simulates mobile access to an eBanking system with biometric authentication. Younger and older participants used the authentication mechanism. The age groups clearly differed in their interaction with the IT and the security system. Designing security system for universal access remains a major challenge.