44th Annual 2010 IEEE International Carnahan Conference on Security Technology 2010
DOI: 10.1109/ccst.2010.5678678
|View full text |Cite
|
Sign up to set email alerts
|

A study of users' acceptance and satisfaction of biometric systems

Abstract: International audienceBiometric authentication methods are being increasingly used for many types of applications. Since such methods necessitate humans to interact with a device, effective implementation requires consideration of the perceptions and responses of end users. Towards this goal, we present in this paper a modalityindependent evaluation methodology to study users' acceptance and satisfaction of biometric systems. It is based on the use of a questionnaire and some data mining tools for the analysis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 47 publications
(44 citation statements)
references
References 25 publications
0
44
0
Order By: Relevance
“…Towards this goal, we present in this paper a modality-independent evaluation methodology for the security evaluation of biometric systems. It uses a database of common threats and vulnerabilities of biometric systems resulting to the results of desk research and laboratory testing [6] [7], and the notion of risk factor. The proposed method produces a security index (between 0 and 100, the highest score 100 corresponds to an unsecure system) which allows easily to compare the security level of biometric systems.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Towards this goal, we present in this paper a modality-independent evaluation methodology for the security evaluation of biometric systems. It uses a database of common threats and vulnerabilities of biometric systems resulting to the results of desk research and laboratory testing [6] [7], and the notion of risk factor. The proposed method produces a security index (between 0 and 100, the highest score 100 corresponds to an unsecure system) which allows easily to compare the security level of biometric systems.…”
Section: Discussionmentioning
confidence: 99%
“…The proposed list was created to the results of desk research. It also noted threats and vulnerabilities that we found it valuable when collecting the GREYC-Kesytroke database [6], and during the usability study [7] of biometric systems. The list is based on an extended model to Ratha et al [3] model as illustrated in Figure 2, and it is divided into two sets:…”
Section: A Common Threats and Vulnerabilities Of Biometric Systemsmentioning
confidence: 99%
“…A consumer perspective of a biometric system are presented, for instance, by Lancelot Miltgen et al in [22] or by El-Abed et al in [23]. In state-of-art articles, the following factors may be important in studying the users' perception: -Sociodemography: depends on age, gender, religion, abilities and personal experiences of users; -Confidence: depends on users' feedback and if they trust the system; -Ease of use: depends on processing time and a sensor quality; -Privacy issues: depends on potential risk, if the system is easy to defraud, if the template is secured; -Physical invasiveness: depends on a biometric sensor, if the contact is needed or the sample acquisition is contactless; -Cultural issues: depends on the user culture.…”
Section: User Acceptancementioning
confidence: 99%
“…As researches found [24] [25], user acceptance is an important factor in the implementation of biometric systems. As users have impact on biometric systems operational performance, it is essential to address user concerns even if not felt necessary by the universities administrators to attain user confidence during the biometric system registration.…”
Section: Biometric Technology User Acceptancementioning
confidence: 99%