Skip to main content

A Visuo-Biometric Authentication Mechanism for Older Users

  • Conference paper

Abstract

The Web is an invaluable resource for users of all ages, but it especially offers facilities which can make a huge difference to the lives of elderly users, many of whom have to contend with limited mobility and frequent illness. Whereas there is some understanding of the issues that pertain to designing websites for this group of users, the issue of specialized Web authentication has not received much attention. Web authentication is often treated as a one-size-fits-all problem with ubiquitous use of the password, and indeed authentication is seldom tailored to the needs of either the site or the target users. Sites are seldom subjected to a risk analysis before an authentication mechanism is chosen. This paper proposes a technique for matching the risk levels of a website to the security rating of an authentication mechanism and presents an authentication mechanism that is tailored to the needs of elderly users for protecting sites with a low risk rating. Usage data from a field test of this mechanism is reported, which show that the mechanism is indeed feasible and meets older users’ needs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Akatsu, H. & Miki, H. [2004], Usability Research for the Elderly People, Oki Technical Review 71(3).

    Google Scholar 

  • Bartomoleo, P., Bachoud-Lévi, A.-C., Chokron, S. & Degos, J.-D. [2002], Visually and Motor-based Knowledge of Letters: Evidence from a Pure Alexic Patient, Neurosychologica 40(8), 1363–71.

    Article  Google Scholar 

  • BBC [2003], Clue to Old Age Memory Loss. http://news.bbc.co.uk/2/hi/health/3040203.stm.

    Google Scholar 

  • Berghel, H. [2000], Identity Theft, Social Security Numbers, and the Web, Communications of the ACM 43(2), 17–21.

    Article  Google Scholar 

  • Braghin, C. [2000], Biometric Authentication. Available at http://citeseer.ist.psu.edu/436492.html (last accessed 2005-04-13).

    Google Scholar 

  • Chisnell, D. & Redish, J. [2005], Who is the Older Adult in Your Audience?, intercom. http://www.stc.org/intercom/PDFs/2005/200501_10.pdf (last accessed 2005-04-13).

    Google Scholar 

  • Chisnell, D., Lee, A. & Redish, J. [2004], Design Web Sites for Older Users: Comparing AARP’s Studies to Earlier Findings. http://www.aarp.org/olderwiserwired/oww-features/Articles/a2004-03-03-comparison-studies.html (last accessed 2005-04-13).

    Google Scholar 

  • Damle, P. [2002], Social Engineering: A Tip of the Iceberg, Information Systems Control Journal 2. http://www.isaca.org/Template.cfm?Section=Archives&CONTENTID=17032&TEMPLATE=/ContentManagement/ContentDisplay.cfm.

    Google Scholar 

  • De Angeli, A., Coutts, M., Coventry, L. & Johnson, G. I. [2002], VIP: A Visual Approach to User Authentication, in S. Levialdi (ed.), Proceedings of the Conference on Advanced Visual Interface (AVI2002), ACM Press, pp.316–23.

    Google Scholar 

  • Dhamija, R. & Perrig, A. [2000], Déjà vu: A User Study Using Images for Authentication, in Proceedings of 9th USENIX Security Symposium, The USENIX Association, Denver, Colorado, pp.45–58. http://www.usenix.org/events/sec2000/full_papers/dhamija/dhamija.pdf.

    Google Scholar 

  • Doran, G. D. [1999], Touchy Subject Biometric Technology: Is It Time for Your Computer to Get to Know You?, http://www.entrepreneur.com/Magazines/Copy_of_MA_SegArticle/0,4453,230131,00.html. Entrepreneur magazine.

    Google Scholar 

  • Ellison, C., Hall, C., Milbert, R. & Schneier, B. [2000], Protecting Secret Keys with Personal Entropy, Future Generation Computer Systems 16, 311–8.

    Article  Google Scholar 

  • Engardio, P. & Matlack, C. [2005], Global Aging. Business Week, JANUARY 31, http://www.businessweek.com/magazine/content/05_05/b3918011.htm.

    Google Scholar 

  • Friedman, B., Hurley, D., Howe, D. C., Nissenbaum, H. & Felten, E. [2002], Users’ Conceptions of Risks and Harms on the Web: A Comparative Study, in D. Wixon (ed.), Proceedings of SIGCHI Conference on Human Factors in Computing Systems: Changing our World, Changing Ourselves (CHI’02), CHI Letters 4(1), ACM Press, pp.614–615.

    Google Scholar 

  • Garfinkel, S. [2002], Biometrics Slouches Toward the Mainstream. CSO Online. http://www.csoonline.com/read/090402/machine.html.

    Google Scholar 

  • Gill, J. [2004], Design of Smart Card Systems to Meet the Needs of Disabled and Elderly Persons. Tiresias.org Scientific and Technological Reports. http://www.tiresias.org/reports/ecart.htm.

    Google Scholar 

  • Hawthorn, D. [2003], How universal is good design for older users?, in CUU’ 03: Proceedings of the 2003 conference on Universal Usability, ACM Press, pp. 38–45.

    Google Scholar 

  • Heckman, J. G., Lang, C. J. & Neundorfer, B. [2001], Recognition of Familiar Handwriting in Stroke and Dementia, Neurology 57(11), 2128–31.

    Google Scholar 

  • IASEP [2000], Data Security Protocol for Education, http://iasep.soe.purdue.edu/Protocol/home_page.htm. Center for Information Assurance and Security and the Indiana Assessment System of Education Proficiencies. Purdue Research Foundation.

    Google Scholar 

  • Knoblich, G. & Prinz, W. [2001], Recognition of self-generated actions from kinematic displays of drawing, Journal of Experimental Psychology: Human Perception and Performance 27(2), 456–65.

    Article  Google Scholar 

  • Leonard, K. [2003], The Importance of Being Secure: The ROI of Web Security, Information Systems Control Journal 5. http://www.isaca.org/Template.cfm?Section=Archives&CONTENTID=16729&TEMPLATE=/ContentManagement/ContentDisplay.cfm.

    Google Scholar 

  • Longcamp, M., Anton, J. L., Roth, M. & Velay, J. L. [2003], Visual Presentation of Single Letters Activates a Premotor Area Involved in Writing, Neuroimage 19(4), 1492–500.

    Article  Google Scholar 

  • Mavis, B. E. & Brocato, J. J. [1998], Postal Surveys versus Electronic Mail Surveys. The Tortoise and the Hare Revisited, Evaluation & The Health Professions 21(3), 395–408.

    Article  Google Scholar 

  • Miller, J. C. [2000], Risk Assessment for your Web Site, http://www.irmi.com/irmicom/expert/articles/2000/schoenfeld09.aspx. IRMI.com. International Risk Management Institute.

    Google Scholar 

  • Park, D. C., Puglisi, J. T. & Smith, A. D. [1986], Memory for pictures: Does an age-related decline exist?, Journal of Psychology and Aging 1(1), 11–7.

    Article  Google Scholar 

  • Renaud, K. & De Angeli, A. [2004], My Password is Here! An Investigation into Visuo-spatial Authentication Mechanisms, Interacting with Computers 16(6), 1017–41.

    Article  Google Scholar 

  • Renaud, K. V. [2004], Quantification of Authentication Mechanisms — A Usability Perspective, Journal of Web Engineering 3(2), 95–123.

    Google Scholar 

  • Schreider, T. [2003], Risk Assessment Tools: A Primer, Information Systems Control Journal 2. http://www.isaca.org/TemplateRedirect.cfm?template=/ContentManagement/ContentDisplay.cfm&ContentID=16222.

    Google Scholar 

  • Seki, K., Yajima, M. & Sugishita, M. [1995], The Efficacy of Kinesthetic Reading Treatment for Pure Alexia, Neuropsychologica 33(5), 595–609.

    Article  Google Scholar 

  • Srihari, S. N., Tomai, C., Lee, S. & Zhang, B. [2003], Individuality of Numerals, in A. Antonacopoulos (ed.), Proceedings of the Seventh IEEE International Conference on Document Analysis and Recognition, IEEE Computer Society Press, Edinburgh, Scotland, pp. 1096–100.

    Chapter  Google Scholar 

  • Starren, J., Sengupta, S., Hripcsak, G., Ring, G., Klerer, R. & Shea, S. [2001], Making Grandma’s Data Secure: A Security Architecture for Home Telemedicine, in S. Bakken (ed.), Proceedings of the AMIA Symposium, AMIA, pp.657–61.

    Google Scholar 

  • Trostel, P. A. & Taylor, G. A. [2001], Theory of Time Preference, Economic Inquiry 39(3), 379–95.

    Article  Google Scholar 

  • Walker, T. [2001], Fighting Security Breaches and Cyberattacks with Two-factor Authentication Technology, Information Systems Control Journal 2. http://www.isaca.org/TemplateRedirect.cfm?template=/ContentManagement/ContentDisplay. cfm&ContentID=17187.

    Google Scholar 

  • Weinshall, D. [2004], Secure Authentication Schemes suitable for an Associative Memory, Technical Report TR 2004-30, Hebrew University, Leibniz Center for Research in Computer Science.

    Google Scholar 

  • Zimmer, A. [1982], Do We See What Makes Our Script Characteristic — Or Do We Only Feel It? Modes of Sensory Control in Handwriting, Psychological Research 44(2).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag London Limited

About this paper

Cite this paper

Renaud, K. (2006). A Visuo-Biometric Authentication Mechanism for Older Users. In: McEwan, T., Gulliksen, J., Benyon, D. (eds) People and Computers XIX — The Bigger Picture. Springer, London. https://doi.org/10.1007/1-84628-249-7_11

Download citation

  • DOI: https://doi.org/10.1007/1-84628-249-7_11

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-192-1

  • Online ISBN: 978-1-84628-249-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics