Skip to main content

The Relationship Between Usability and Biometric Authentication in Mobile Phones

  • Conference paper
  • First Online:
HCI International 2019 - Posters (HCII 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1032))

Included in the following conference series:

  • 1832 Accesses

Abstract

It is estimated that over 1 billion people are active mobile phone users in 2018. When using a mobile phone, there are a variety of ways to authenticate and “secure” the device, and biometric authentication is becoming an increasingly common way to do this, however, biometric authentication is not always as usable as it could be. Both usability and security are important, yet many people believe that there is a trade-off between the two. The focus of this paper was to better understand usability, computer security, and within computer security more specifically biometric authentication, and how all three can work together to create systems that are both usable and secure. A survey and interviews were conducted based on previous research to understand perceptions from the general population, usability experts, and security/biometrics experts. The results do indicate that there is indeed a perceived trade-off between usability and computer security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cranor, L., Garfinkel, S.: Guest editors’ introduction: secure or usable? IEEE Secur. Priv. 2(5), 16–18 (2004)

    Article  Google Scholar 

  2. Griffin, A.: iPhones are unlocked 80 times per day, Apple says as part of security briefing, The Independent UK (2016)

    Google Scholar 

  3. Zirjawi, N., Kurtanovic, Z., Maalej, W.: A survey about user requirements for biometric authentication on smartphones. In: 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), pp. 1–6 (2015)

    Google Scholar 

  4. Riley, C.W., Buckner, K., Johnson, G., Benyon, D.: Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI Soc., 295–306 (2008)

    Google Scholar 

  5. Lovisotto, G., Malik, R., Sluganovic, I., Roeschlin, M., Trueman, P., Martinovic, I.: Mobile biometrics in financial services: a five factor framework. University of Oxford (2017)

    Google Scholar 

  6. El-Abed, M., Giot, R., Hemery, B., Rosenberger, C.: A study of users’ acceptance and satisfaction of biometric systems. In: 44th Annual 2010 IEEE International Carnahan Conference on Security Technology, pp. 170–178 (2010)

    Google Scholar 

  7. Bhagavatula, C., Ur, B., Lacovino, K., Mon Kywe, S., Cranor, L., Savvides, M.: Biometric authentication on iphone and android: usability, perceptions, and influences on adoption. In: Workshop on Usable Security at USEC 2015 (2015)

    Google Scholar 

  8. Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C.: Security, privacy and usability – a survey of users’ perceptions and attitudes. In: Fischer-Hübner, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 153–168. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22906-5_12

    Chapter  Google Scholar 

  9. Ahmed, I.U.: Smartphone authentication, user experience, expectation and satisfaction. Master’s thesis (2017)

    Google Scholar 

  10. Alshamari, M.: A review of gaps between usability and security/privacy. Int. J. Commun. Netw. Syst. Sci. 9, 413–429 (2016)

    Google Scholar 

  11. Sasse, M.A., Smith, M., Herley, C., Lipford, H., Vaniea, K.: Debunking security-usability tradeoff myths. IEEE Secur. Priv. 14, 33–39 (2016)

    Article  Google Scholar 

  12. Yee, K.P.: Guidelines and strategies for secure interaction design. In: Usability and Security: Designing Secure Systems That People Can Use (2005)

    Google Scholar 

  13. Böhm, I., Testor, F.: Biometric systems. Department of Telecooperation University of Linz (2004)

    Google Scholar 

  14. Sahar, F.: Tradeoffs between usability and security. Int. J. Eng. Technol. (2013)

    Google Scholar 

  15. Ben-Asher, N., Meyer, J., Möller, S., Englert, R.: An experimental system for studying the tradeoff between usability and security. In: 2009 International Conference on Availability, Reliability and Security (2009)

    Google Scholar 

  16. Nwokedi, U.O., Amunga, B., Rad, B.B.: Usability and security in user interface design: a systematic literature review (2016)

    Article  Google Scholar 

  17. Pocovnicu, A.: Biometric security for cell phones. Informatica Economica (2009)

    Google Scholar 

  18. Brostoff, G.: Adoption problems? How UX could boost biometrics. Biometric Technol. Today 2017, 9–11 (2017)

    Article  Google Scholar 

  19. Coventry, L.: Usable biometrics. In: Security and Usability: Designing Secure Systems that People Can Use (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carly Grace Allen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Allen, C.G., Komandur, S. (2019). The Relationship Between Usability and Biometric Authentication in Mobile Phones. In: Stephanidis, C. (eds) HCI International 2019 - Posters. HCII 2019. Communications in Computer and Information Science, vol 1032. Springer, Cham. https://doi.org/10.1007/978-3-030-23522-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23522-2_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23521-5

  • Online ISBN: 978-3-030-23522-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics