skip to main content
10.1145/1314333.1314352acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Towards understanding user perceptions of authentication technologies

Published: 29 October 2007 Publication History

Abstract

Digital identities are increasingly being used to facilitate the execution of transactions in various domains. When developing and analyzing digital identity technologies, it is important to consider the perceptions and responses of end users. Users are typically concerned about privacy and security, but do not necessarily understand how these issues are impacted by the use of digital identities. In this paper, we discuss preliminary results of a survey regarding authentication technologies used to generate digital identities. Most respondents were unfamiliar with a majority of the technologies in question (e.g. hand geometry scans), and expressed uncertainty about their use. Perceptions were more positive for the use of authentication technologies in the financial domain, and more negative for their use in the retail domain. The results may inform the design of future systems.

References

[1]
Antón, A. I. and J. Earp. Strategies for Developing Policies and Requirements for Secure E-Commerce Systems. Recent Advances in E-Commerce Security and Privacy, ed. by A. K. Ghosh, Kluwer Academic Publishers, pp. 29--46, 2001.
[2]
Antón, A. I. and C. Potts. Functional paleontology: the evolution of user-visible system services. IEEE Transactions on Software Engineering Volume 29, pp. 151--166, 2003.
[3]
Citizenship and Immigration Canada. Tracking Public Perceptions of Biometrics, 2003. Accessed April 13, 2007 at http://www.cic.gc.ca/english/press/03/poll-biometrics-e.pdf.
[4]
Deane, F., K. Barrelle, R. Henderson and D. Mahar. Perceived acceptability of biometric security systems. Computers & Security Volume 14, pp. 225--231, 1995.
[5]
Earp, J. B., A. I. Antón, L. Aiman-Smith, and W. H. Stufflebeam. Examining Internet Privacy Policies Within the Context of User Privacy Values. IEEE Transactions on Engineering Management 52(2), pp. 227--237, 2005.
[6]
Furnell, S. and Evangelatos, K. Public awareness and perceptions of biometrics. Computer Fraud and Security, Volume 1, pp. 8--13, 2007.
[7]
Furnell, S. M., P. S. Dowland, H. M. Illingworth and P. L. Reynolds. Authentication and Supervision: A Survey of User Attitudes. Computers & Security, Volume 19, pp. 529--539, 2000.
[8]
Giesing, I. User perceptions related to identification through biometrics within electronic business. Master's thesis, University of Pretoria, 2003.
[9]
Green, N. A. Establishing Public Confidence in the Viability of Fingerprint Biometric Technology. Master's thesis, Brigham Young University, 2005.
[10]
James, T., T. Pirim, K. Boswell, B. Reithel and R. Barkhi. Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model. Journal of Organizational and End User Computing Volume 18, pp. 1--24, 2006.
[11]
Magnuson, G. and P. Reid. Privacy and Identity Management Survey: Summary of Results and Findings. 2005, accessed February 12, 2007 at http://www.eds.com/services/whitepapers/downloads/privacy_survey.pdf.
[12]
Moody, J. Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use. Proceedings of the Informing Science and Information Technology Education Joint Conference, Rockhampton, Queensland, Australia, 25--28 June 2004.
[13]
Nunnally, J. Psychometric Theory. New York: McGraw Hill, 1978.
[14]
O'Gorman, L. Comparing Passwords, Tokens, and Biometrics for User Authentication. Proceedings of the IEEE Volume 91, pp. 2021--2040, 2003.
[15]
Perakslis, C. and R. Wolk. Social Acceptance of RFID as a Biometric Security Method. IEEE Technology and Society Magazine, Fall 2006, pp. 34--42.
[16]
Prabhakar, S., Pankanti, S. and Jain, A.K. Biometric Recognition: Security and Privacy Concerns. IEEE Security & Privacy Volume 1, pp. 33--42, 2003.
[17]
Satchell, C., G. Shanks, S. Howard, and J. Murphy. Beyond security: implications for the future of federated digital identity management systems. Proceedings of the 20th Conference of the Computer-Human interaction Special interest Group (CHISIG) of Australia on Computer-Human interaction: Design: Activities, Artefacts and Environments, Sydney, Australia, 20--24 November 2006.
[18]
Strickland, L. S. and L. E. Hunt. Technology, Security, and Individual Privacy: New Tools, New Threats, and New Public Perceptions. Journal of the American Society for Information Science and Technology Volume 56, pp. 221--234, 2005.
[19]
Vethman, A. J. RFID and consumers. Capgemini, March 1, 2005, accessed March 5, 2007 at http://www.capgemini.com/news/2005/Capgemini_European_RFID_report.pdf.
[20]
Woodward, J. D., K. W. Webb, E. M. Newton, M. Bradley and D. Rubenson. Army Biometric Applications. RAND Corporation, 2001.

Cited By

View all
  • (2022)Assessment of How Users Perceive the Usage of Biometric Technology ApplicationsRecent Advances in Biometrics10.5772/intechopen.101969Online publication date: 27-Jul-2022
  • (2022)OdorTAM: Technology Acceptance Model for Biometric Authentication System Using Human Body OdorInternational Journal of Environmental Research and Public Health10.3390/ijerph19241677719:24(16777)Online publication date: 14-Dec-2022
  • (2020)MAFIA: Multi-layered Architecture For IoT-based Authentication2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPS-ISA50397.2020.00035(199-208)Online publication date: Oct-2020
  • Show More Cited By

Index Terms

  1. Towards understanding user perceptions of authentication technologies

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic society
      October 2007
      116 pages
      ISBN:9781595938831
      DOI:10.1145/1314333
      • General Chair:
      • Peng Ning,
      • Program Chair:
      • Ting Yu
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 October 2007

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. authentication
      2. biometrics
      3. digital identities
      4. tokens
      5. user perceptions

      Qualifiers

      • Article

      Conference

      CCS07
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 106 of 355 submissions, 30%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)56
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 13 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Assessment of How Users Perceive the Usage of Biometric Technology ApplicationsRecent Advances in Biometrics10.5772/intechopen.101969Online publication date: 27-Jul-2022
      • (2022)OdorTAM: Technology Acceptance Model for Biometric Authentication System Using Human Body OdorInternational Journal of Environmental Research and Public Health10.3390/ijerph19241677719:24(16777)Online publication date: 14-Dec-2022
      • (2020)MAFIA: Multi-layered Architecture For IoT-based Authentication2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPS-ISA50397.2020.00035(199-208)Online publication date: Oct-2020
      • (2020)A Brief Literature Review and Survey of Adult Perceptions on Biometric Recognition for Infants and Toddlers2020 IEEE International Joint Conference on Biometrics (IJCB)10.1109/IJCB48548.2020.9304868(1-10)Online publication date: 28-Sep-2020
      • (2020)“Are we getting the biometric bioethics right?” – the use of biometrics within the healthcare system in MalawiGlobal Bioethics10.1080/11287462.2020.177306331:1(67-80)Online publication date: 5-Jun-2020
      • (2019)Biometric Systems Interaction Assessment: The State of the ArtIEEE Transactions on Human-Machine Systems10.1109/THMS.2019.291367249:5(397-410)Online publication date: Oct-2019
      • (2019)Factors Affecting e-ID Public Acceptance: A Literature ReviewElectronic Government and the Information Systems Perspective10.1007/978-3-030-27523-5_13(176-188)Online publication date: 26-Aug-2019
      • (2018)Face IDInternational Journal of Information Systems and Change Management10.5555/3302754.330275610:3(227-247)Online publication date: 1-Jan-2018
      • (2018)Patient Preferences for Authentication and SecurityProceedings of the 2018 ACM SIGMIS Conference on Computers and People Research10.1145/3209626.3209702(11-17)Online publication date: 18-Jun-2018
      • (2018)Privacy and biometricsInformation Systems Frontiers10.1007/s10796-016-9667-520:1(91-110)Online publication date: 1-Feb-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media