Reference Hub1
Usability Evaluation of Dialogue Designs for Voiceprint Authentication in Automated Telephone Banking

Usability Evaluation of Dialogue Designs for Voiceprint Authentication in Automated Telephone Banking

Nancie Gunson, Diarmid Marshall, Fergus McInnes, Hazel Morton, Mervyn Jack
Copyright: © 2014 |Volume: 10 |Issue: 2 |Pages: 19
ISSN: 1548-3908|EISSN: 1548-3916|EISBN13: 9781466657137|DOI: 10.4018/ijthi.2014040104
Cite Article Cite Article

MLA

Gunson, Nancie, et al. "Usability Evaluation of Dialogue Designs for Voiceprint Authentication in Automated Telephone Banking." IJTHI vol.10, no.2 2014: pp.59-77. http://doi.org/10.4018/ijthi.2014040104

APA

Gunson, N., Marshall, D., McInnes, F., Morton, H., & Jack, M. (2014). Usability Evaluation of Dialogue Designs for Voiceprint Authentication in Automated Telephone Banking. International Journal of Technology and Human Interaction (IJTHI), 10(2), 59-77. http://doi.org/10.4018/ijthi.2014040104

Chicago

Gunson, Nancie, et al. "Usability Evaluation of Dialogue Designs for Voiceprint Authentication in Automated Telephone Banking," International Journal of Technology and Human Interaction (IJTHI) 10, no.2: 59-77. http://doi.org/10.4018/ijthi.2014040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper describes an empirical investigation of the usability of different dialogue designs for voiceprint authentication in automated telephone banking. Three strategies for voice authentication were evaluated in an experiment with 120 telephone banking end-users: 1-Factor (voiceprint authentication based on customers' utterances of their account number and sort code); 1-Factor with Challenge (1-Factor plus a randomly generated digit string); and 2-Factor (1-Factor plus secret information known only to the caller). The research suggests the 2-Factor approach is the most effective strategy in this context: results from a Likert questionnaire show it to be highly usable and it is rated highest in terms of both security and overall quality. Participants welcome the option to use voiceprint technology but the majority would prefer it to augment rather than replace existing security methods.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.