Proceedings of the International Conference on Advanced Visual Interfaces 2020
DOI: 10.1145/3399715.3399823
|View full text |Cite
|
Sign up to set email alerts
|

Don't Use Fingerprint, it's Raining!

Abstract: This paper investigates how smartphone users perceive switching from their primary authentication mechanism to a fallback one, based on the context. This is useful in cases where the primary mechanism fails (e.g., wet fingers when using fingerprint). While prior work introduced the concept, we are the first to investigate its perception by users and their willingness to follow a system's suggestion for a switch. We present findings from a two-week field study (N=29) using an Android app, showing that users are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…There are also prototype systems that were not built to transition into practice, but rather to shed light on users' perception of different authentication concepts on doors (Mecke et al, 2018) or on mobile devices (Prange et al, 2020). USEC researchers have also built prototype systems to investigate the extent to which security systems from mobile devices can be adapted for virtual reality applications (George et al, 2017) or to study the impact of different input techniques and threat models on users' security (Mathis, Williamson, et al, 2021).…”
Section: Engagement With Industry and Transition To Practicementioning
confidence: 99%
“…There are also prototype systems that were not built to transition into practice, but rather to shed light on users' perception of different authentication concepts on doors (Mecke et al, 2018) or on mobile devices (Prange et al, 2020). USEC researchers have also built prototype systems to investigate the extent to which security systems from mobile devices can be adapted for virtual reality applications (George et al, 2017) or to study the impact of different input techniques and threat models on users' security (Mathis, Williamson, et al, 2021).…”
Section: Engagement With Industry and Transition To Practicementioning
confidence: 99%