Abstract
One way to secure Information Technology (IT) systems is with authentication mechanisms that distinguish between users. Users who differ in their cognitive and motor abilities, cultural background and personal characteristics should be able to operate the IT system including its security features. If system design fails to consider user diversity, users might bypass or disable the security feature, reducing system security. Providing universal accessesibility and acceptability is generally a challenge, especially when dealing with IT security. We present a conceptual model that explores and establishes guidelines for the inclusion of biometric authentication in systems which serve a wide range of users. Aspects of this model were examined in laboratory settings using a task which simulates mobile access to an eBanking system with biometric authentication. Younger and older participants used the authentication mechanism. The age groups clearly differed in their interaction with the IT and the security system. Designing security system for universal access remains a major challenge.
Chapter PDF
Similar content being viewed by others
References
Ashbourne, J.: Practical Biometrics: From Aspiration to Implementation. Springer, London (2004)
Braghin, C.: Biometric Authentication. Technical Report, Department of Computer Science, University of Helsinki (2000)
Braz, C., Robert, J.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conference of the Association Francophone D’interaction Homme-Machine, IHM 2006, Montreal, Canada, April 18-21, vol. 133, pp. 199–203. ACM, New York (2006)
Brostoff, S., Sasse, M.A.: Are Passfaces more usable than passwords? A field trial investigation. In: Proceedings of HCI 2000, Sunderland, UK, pp. 405–424. Springer, Heidelberg (2000)
Ebert, E.J.J.: The role of cognitive resources in the valuation of near and far future events. Acta Psychology 108(2), 155–171 (2001)
Hofstede, G.: Culture’s consequences: Comparing values, behaviors, institutions, and organizations across nations. Sage Publications, Inc., Newbury Park (1984)
Jain, K.A., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology 14(1), 4–20 (2004)
Kowalki, S., Goldstein, M.: Consumers’ Awareness of, Attitudes Towards and Adoption of Mobile Phone Security. In: Proceedings of the 20 International Symposium on Human Factors in Telecommunication (HFT 2006), Nice, France (2008)
Riley, C., Buckner, K., Johnson, G., Benyon, D.: Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & Society 24(3), 295–306 (2009)
Rogers, E.M.: Diffusion of Innovations. Free press, New York (1995)
Sasse, M.A.: Usability and Trust in Information Systems. Cyber Trust & Crime Prevention Project. University College London (2004)
Scheuermann, D., Schwiderski-Grosche, S., Struif, B.: Usability of Biometrics in Relation to Electronic Signatures. EU Study 502533/8. GMD-German National Research Center for Information Technology. Institute for Secure Telecooperation, SIT (2000)
Seidler, R.D., Stelmach, G.E.: Reduction in sensorimotor control with age. QuestI. 47, 386–394 (1995)
Uzoka, F.E., Ndzinge, T.: Empirical analysis of biometric technology adoption and acceptance in Botswana. Journal of Systems and Software 82(9), 1550–1564 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cohen, S., Ben-Asher, N., Meyer, J. (2011). Towards Information Technology Security for Universal Access. In: Stephanidis, C. (eds) Universal Access in Human-Computer Interaction. Design for All and eInclusion. UAHCI 2011. Lecture Notes in Computer Science, vol 6765. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21672-5_48
Download citation
DOI: https://doi.org/10.1007/978-3-642-21672-5_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21671-8
Online ISBN: 978-3-642-21672-5
eBook Packages: Computer ScienceComputer Science (R0)