There is more to biometrics than user identification: Making mobile interactions personal, secure and representative

نویسنده

  • Daniel Buschek
چکیده

This essay contributes an extended view on user information inferred by personal devices to motivate applications of biometrics beyond user identification. We unfold a new design space in two parts: First, we take inspiration from the shared focus on individuality in both biometrics and Belk’s Extended Self (ES, [1, 2]). ES describes that people use (digital) objects to define and reflect on their identities. Following this, we propose that personal devices can use biometrics to assess individual user attributes and behaviour for three application areas related to the core aspects of ES: privacy and security (Having), UI personalisation (Doing), digital self-presentation (Being). Second, we propose to view biometrics as part of a larger class of Implicit Information. Such information is inferred from interactions and sensors to be used across these application domains. We discuss implications and limitations of this view. ACM CCS: Security and privacy → Human and societal aspects of security and privacy → Usability in security and privacy

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

Distributed Speaker Recognition Using the ETSI Distributed Speech Recognition Standard

Biometrics is gaining strong support for the personalization of and the securing of mobile devices. It is not uncommon for individual users to be faced with a half-dozen or more passwords and personal identification numbers. The ubiquity of passwords actually relaxes system security since many users tend to use the same password across all applications, or collect the various passwords in a sin...

متن کامل

AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce

We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless (mobile) devices. In this paper, we propose a new mobile authentication system, not yet...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ASEMC: Authentication for a SEcure M-Commerce

We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless (mobile) devices. In this paper, we propose a new mobile authentication system, not yet...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • it - Information Technology

دوره 58  شماره 

صفحات  -

تاریخ انتشار 2016