skip to main content
10.1145/642611.642639acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Usability and biometric verification at the ATM interface

Authors Info & Claims
Published:05 April 2003Publication History

ABSTRACT

This paper describes some of the consumer-driven usability research conducted by NCR Self Service Strategic Solutions in the development of an understanding of usability and user acceptance of leading-edge biometrics verification techniques. We discuss biometric techniques in general and focus upon the usability phases and issues, associated with iris verification technology at the Automated Teller Machine (ATM) user interface. The paper concludes with a review of some of the major research issues encountered, and an outline of future work in the area.

References

  1. Adams, A. and Chang, S.Y. An investigation of keypad interface security. Information & Management, 24, 53--59, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Adams, A. and Sasse, M.A. Users are not the enemy. Communications of the ACM, 42, 41--46, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ashbourn, J. Biometrics. Advanced Identity Verification. Springer Verlag, London, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Clarke, R. Human Identification in Information Systems: Management Challenges and Public Policy Issues. Information technology and People, 74, 6--37, 1994.Google ScholarGoogle Scholar
  5. Coventry, L., De Angeli, A., and Johnson, G. Biometric verification at a self service interface. Proceedings of the British Ergonomic Society Conference (Edinburgh April 2003), Contemporary Ergonomics (to be published).Google ScholarGoogle Scholar
  6. Davies, S.G. How biometrics will fuse flesh and machine, Information Technology and People, 7,4, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  7. De Angeli, A., Coutts, M. Coventry, L., Johnson, G.I, Cameron D., and Fischer M. VIP: a visual approach to user authentication. Proceedings of the Working Conference on Advanced Visual Interfaces AVI 2002, ACM Press, pp. 316--323, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Deane, F.P., Barelle K., Henderson R.D. and Mahar D.P., Employee acceptance of computerised biometrics security systems, Computers and Security, 14, 225--231, 1995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Deane, F.P., Henderson R.D., Mahar D.P. and Saliba A.J. Theoretical examination of the effects of anxiety and electronic performance monitoring on biometric security systems, Interacting with Computers, 7, 395--411, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  10. Dhamija, R. & Perrig, A. Dééjà vu: A User Study Using Images for Authentication. In Proceedings of 9th USENIX Security Symposium, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Feustal, T.C. and Velius, G.A. Speaker identity verification over telephone lines: Where we are and where we are going. Proceedings of the 1989 International Carahan conference on security technology, (3-5 Oct), 181--182, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  12. Gong, L., Lomas, M.A., Needham, R.M. and Saltzer, J.H. Protecting poorly chosen secrets from guessing attacks. IEEE J. on Selected Areas in Communications, 11(5), 648--656, 1993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hide, S. Haslegrave, C.M. Hopkinson, N., Robertson D. and Johnson G.I. Tracking eye positions during the use of an Automatic Teller Machine (ATM), Proceedings of CAES '99, May: Barcelona, Spain. 1999.Google ScholarGoogle Scholar
  14. Mansfield, A.J. & Wayman, J.L. Best Practices in Testing and Reporting Performance of Biometric Devices. NPL Report CMSC 14/02 August 2002.Google ScholarGoogle Scholar
  15. Mansfield, A.J., Kelly, G., Chandler, P. and Kane, J. Biometric product testing final report. www.cesg.gov.uk/technology/biometrics, March 2001.Google ScholarGoogle Scholar
  16. Negin, M., Chmielewski, T.A., Salganicoff, M., Camus, T.A., Cahn von Seelen, M.M., Venetianer, P.L. and Zhang, G.G. An iris biometric system for public and personal use. Computer, 33,2, 70--75, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Phillips, P.J., Martin, A., Wilson, C.L. and Prozybocki, M. An introduction to evaluating biometric systems, Computer, 33,2, 56--62, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Scholtz, J. and Johnson, J. Interacting with identification technology: Can it make us more secure? CHI2002 Extended Abstracts, ACM Press, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Thalheim, L., Krissler, J. and Ziegler, P.M. Bodycheck: Biometric access protection devices and their programs put to the test. C'T, 11, May 22, 2002 (www.heise.de/ct/english/02/11/114/)Google ScholarGoogle Scholar
  20. Westin, A. Biometrics in the mainstream: What does the U.S. public think. Privacy and American Business Newsletter, 9,8, December 2002.Google ScholarGoogle Scholar
  21. Woodward. J.D. Biometrics: Privacy's Foe or Privacy's Friend? Proceedings of IEEE, 85, 9, pp 1480--1492, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  22. Yan, J., Blackwell, A., Anderson, R. and Grant, A. The memorability and security of passwords - Some empirical results. Technical Report No. 500 2001, Computer Laboratory University of Cambridge, http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf, 2001.Google ScholarGoogle Scholar

Index Terms

  1. Usability and biometric verification at the ATM interface

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
          April 2003
          620 pages
          ISBN:1581136307
          DOI:10.1145/642611

          Copyright © 2003 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 April 2003

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          CHI '03 Paper Acceptance Rate75of468submissions,16%Overall Acceptance Rate6,199of26,314submissions,24%

          Upcoming Conference

          CHI '24
          CHI Conference on Human Factors in Computing Systems
          May 11 - 16, 2024
          Honolulu , HI , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader