Show simple item record

dc.contributor.author
Zimmermann, Verena
dc.contributor.author
Gerber, Nina
dc.contributor.editor
Tryfonas, Theo
dc.date.accessioned
2022-06-22T11:45:52Z
dc.date.available
2022-06-22T08:56:17Z
dc.date.available
2022-06-22T11:45:52Z
dc.date.issued
2017-05
dc.identifier.isbn
978-3-319-58460-7
en_US
dc.identifier.isbn
978-3-319-58459-1
en_US
dc.identifier.issn
0302-9743
dc.identifier.issn
1611-3349
dc.identifier.other
10.1007/978-3-319-58460-7_18
en_US
dc.identifier.uri
http://hdl.handle.net/20.500.11850/553968
dc.description.abstract
Whereas the text password is still ubiquitous as authentication scheme, its shortcomings are well-acknowledged within the research community. A plurality of alternatives such as other knowledge-based, token-based or biometric authentication schemes have been developed. Although the usability of these schemes has been analyzed, the results concerning further user perceptions are complex and somewhat ambiguous. Further, most of these results stem from focus groups and surveys where the actual interaction with the systems was not tested. To shine light on this topic we conducted a laboratory study with 35 participants to compare and understand user perceptions of several biometric and non-biometric authentication schemes. We simulated the interaction with authentication schemes to protect our participants? data and to avoid affecting influences of particular implementations. The results showed that the text password is still popular among the participants for reasons of familiarity and due to privacy aspects, namely because no personal information has to be provided. Fingerprint and iris recognition were well liked among the biometrics by many participants due to the perceived security of using a unique feature for authentication. However, the use of personal information also raised privacy concerns in others. This leads to the assumption that there might be two user groups preferring either passwords or biometrics. The assumption along with possible influencing variables such as authentication context or familiarity should be addressed in future research. The simulation of authentication schemes could further be improved by addressing realistic error rates to increase external validity of the study design.
en_US
dc.language.iso
de
en_US
dc.publisher
Springer
en_US
dc.subject
Security, Usability and Society
en_US
dc.subject
Authentication
en_US
dc.subject
Biometrics
en_US
dc.subject
Security perception
en_US
dc.subject
Acceptance
en_US
dc.title
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
en_US
dc.type
Conference Paper
dc.date.published
2017-05-13
ethz.book.title
Human Aspects of Information Security, Privacy and Trust
en_US
ethz.journal.title
Lecture Notes in Computer Science
ethz.journal.volume
10292
en_US
ethz.journal.abbreviated
LNCS
ethz.pages.start
265
en_US
ethz.pages.end
283
en_US
ethz.event
5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2017)
en_US
ethz.event.location
Vancouver, BC, Canada
en_US
ethz.event.date
July 9-14, 2017
en_US
ethz.publication.place
Cham
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02045 - Dep. Geistes-, Sozial- u. Staatswiss. / Dep. of Humanities, Social and Pol.Sc.
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02045 - Dep. Geistes-, Sozial- u. Staatswiss. / Dep. of Humanities, Social and Pol.Sc.::09775 - Zimmermann, Verena / Zimmermann, Verena
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02045 - Dep. Geistes-, Sozial- u. Staatswiss. / Dep. of Humanities, Social and Pol.Sc.::09775 - Zimmermann, Verena / Zimmermann, Verena
en_US
ethz.date.deposited
2022-06-22T08:56:22Z
ethz.source
BATCH
ethz.eth
no
en_US
ethz.availability
Metadata only
en_US
ethz.rosetta.installDate
2022-06-22T11:46:00Z
ethz.rosetta.lastUpdated
2022-06-22T11:46:00Z
ethz.rosetta.exportRequired
true
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=%E2%80%9CIf%20It%20Wasn%E2%80%99t%20Secure,%20They%20Would%20Not%20Use%20It%20in%20the%20Movies%E2%80%9D%20%E2%80%93%20Security%20Perceptions%20and%20User%20Acceptance%2&rft.jtitle=Lecture%20Notes%20in%20Computer%20Science&rft.date=2017-05&rft.volume=10292&rft.spage=265&rft.epage=283&rft.issn=0302-9743&1611-3349&rft.au=Zimmermann,%20Verena&Gerber,%20Nina&rft.isbn=978-3-319-58460-7&978-3-319-58459-1&rft.genre=proceeding&rft_id=info:doi/10.1007/978-3-319-58460-7_18&rft.btitle=Human%20Aspects%20of%20Information%20Security,%20Privacy%20and%20Trust
 Search print copy at ETH Library

Files in this item

FilesSizeFormatOpen in viewer

There are no files associated with this item.

Publication type

Show simple item record