User perspectives on the security of access data, operator handover procedures and ‘insult rate’ for speaker verification in automated telephone services
User attitudes and perceived security of different security data types.
User attitudes towards dialogue messages for verification failure.
The influence of multiple rejections (‘insult rate’) on user attitudes.
Best strategies for completing user verification with combinations of automated systems and human telephone agents. Results show that users have strong opinions towards the above issues and consequently that speaker verification procedures in automated telephone services need to be carefully researched and designed.
Unable to display preview. Download preview PDF.
- Furui, S. (1994): An Overview of Speaker Recognition Technology. Proceedings of ESCA Workshop on Automatic Speaker Recognition Identification Verification, pp. 1–9.Google Scholar
- Rosenberg, A. E. (1976): Automatic Speaker Verification: A Review. Proc. IEEE, 64(4), pp. 475–487.Google Scholar
- Jack, M.A., J. C. Foster and F. W. Stentiford (1992): “Design and Evaluation of Automated Telephone Services”, IEE Colloquium on ‘Telecommunications, Consumer and Industrial Applications of Speech Technology', IEE Colloquium Digest No. 1992/114, pp. 611–614.Google Scholar