{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:41Z","timestamp":1725490241136},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540733188"},{"type":"electronic","value":"9783540733218"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73321-8_102","type":"book-chapter","created":{"date-parts":[[2007,8,23]],"date-time":"2007-08-23T21:39:51Z","timestamp":1187905191000},"page":"904-914","source":"Crossref","is-referenced-by-count":15,"title":["The Effects of Human Interaction on Biometric System Performance"],"prefix":"10.1007","author":[{"given":"Eric P.","family":"Kukula","sequence":"first","affiliation":[]},{"given":"Stephen J.","family":"Elliott","sequence":"additional","affiliation":[]},{"given":"Vincent G.","family":"Duffy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"102_CR1","unstructured":"International Organization for Standardization, ISO\/IEC JTC1\/SC37 Standing Document 2 - Harmonized Biometric Vocabulary, ANSI, p. 66 (2007)"},{"issue":"3","key":"102_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1207\/s15327051hci1303_2","volume":"13","author":"W. Gray","year":"1998","unstructured":"Gray, W., Salzman, M.: Damaged merchandise? A review of experiments that compare usability evaluation methods. Human-Computer Interaction\u00a013(3), 203\u2013261 (1998)","journal-title":"Human-Computer Interaction"},{"key":"102_CR3","unstructured":"Mansfield, A., Wayman, J.: Best Practices in Testing and Reporting Performances of Biometric Devices, Biometric Working Group, pp. 1\u201332 (2002)"},{"key":"102_CR4","unstructured":"International Organization for Standardization, ISO\/IEC 19795-1: Information technology - Biometrics performance testing and reporting - Part 1: Principles and framework, ANSI, p. 64 (2006)"},{"key":"102_CR5","unstructured":"Rood, E., Jain, A.: Biometric Research Agenda: Report of the NSF Workshop, 2003, National Science Foundation, Morgantown (2003)"},{"volume-title":"Biometrics: Advanced Identity Verification: The Complete Guide","year":"2000","key":"102_CR6","unstructured":"Ashbourn, J. (ed.): Biometrics: Advanced Identity Verification: The Complete Guide, vol.\u00a0200. Springer, New York (2000)"},{"key":"102_CR7","unstructured":"Miller, R.: Finger Dimension Comparison Identification System, United States (1971)"},{"key":"102_CR8","unstructured":"IBG. Biometrics Market and Industry Report 2006-2010 (2006) (cited 2006 September 12), available from: \n \n http:\/\/www.biometricgroup.com\/reports\/public\/market_report.html"},{"key":"102_CR9","first-page":"1","volume-title":"Advances in Fingerprint Technology","author":"J. Berry","year":"2001","unstructured":"Berry, J., Stoney, D.: History & Development of Fingerprinting. In: Lee, H.C., Gaensslen, R.E. (eds.) Advances in Fingerprint Technology, pp. 1\u201340. CRC Press, Stoney (2001)"},{"key":"102_CR10","unstructured":"Burke, J.: AuthenTec Ships Record 10 Million Biometric Fingerprint Sensors (2006) (cited August 10, 2006), available from: \n \n http:\/\/www.authentec.com\/news.cfm?newsID=217"},{"key":"102_CR11","unstructured":"Elliott, S., Kukula, E., Sickler, N.: The challenges of environment and the human biometric device interaction on biometric system performance. In: International Workshop on Biometric Technologies - Special forum on Modeling and Simulation in Biometric Technology. 2004. Calgary, Alberta, Canada (2004)"},{"key":"102_CR12","doi-asserted-by":"crossref","unstructured":"Kang, K., et al.: A Study on Performance Evaluation of Fingerprint Sensors in Audio- and Video-Based Biometric Person Authentication. In: Goos, G., Hartmanis, J., van Leeuwen, J. (eds.), pp. 574\u2013583. Springer, Heidelberg (2003)","DOI":"10.1007\/3-540-44887-X_68"},{"key":"102_CR13","unstructured":"Modi, S., Elliott, S.: Impact of Image Quality on Performance: Comparison of Young and Elderly Fingerprints. In: 6th International Conference on Recent Advances in Soft Computing (RASC 2006), Canterbury, UK (2006)"},{"volume-title":"39th Annual International Carnahan Conference on Security Technology (ICCST)","year":"2005","author":"N. Sickler","key":"102_CR14","unstructured":"Sickler, N., Elliott, S.: Evaluation of fingerprint image quality across an elderly population vis-a-vis an 18-25 year old population. In: 39th Annual International Carnahan Conference on Security Technology (ICCST), Las Palmas de Gran Canaria, 2005, IEEE, Spain (2005)"},{"volume-title":"1991 IEEE International Conference on Systems, Man, and Cybernetics, Decision Aiding for Complex Systems","year":"1991","author":"W. Nelson","key":"102_CR15","unstructured":"Nelson, W., Kishon, E.: Use of dynamic features for signature verification. In: 1991 IEEE International Conference on Systems, Man, and Cybernetics, Decision Aiding for Complex Systems 1991, IEEE, Charlottesvill, VA (1991)"},{"volume-title":"1995 European Convention on Security and Detection","year":"1995","author":"D.J. Hamilton","key":"102_CR16","unstructured":"Hamilton, D.J., et al.: Low cost dynamic signature verification system. In: 1995 European Convention on Security and Detection, IEEE, Brighton, UK (1995)"},{"volume-title":"16th International Conference on Pattern Recognition","year":"2002","author":"C. Vielhauer","key":"102_CR17","unstructured":"Vielhauer, C., Steinmetz, R., Mayerhofer, A.: Biometric hash based on statistical features of online signatures. In: 16th International Conference on Pattern Recognition, IEEE, Los Alamitos (2002)"},{"volume-title":"Automatic Signature Verification: The State of the Art - 1989-1993","year":"1994","author":"F. Leclerc","key":"102_CR18","unstructured":"Leclerc, F., Plamondon, R.: Automatic Signature Verification: The State of the Art - 1989-1993. World Scientific Publishing Co, Singapore (1994)"},{"issue":"2","key":"102_CR19","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/21.229453","volume":"23","author":"J.-J. Brault","year":"1993","unstructured":"Brault, J.-J., Plamondon, R.: A Complexity Measure of Handwritten Curves: Modeling of Dynamic Signature Forgery. IEEE Transactions on Systems, Man, and Cybernetics\u00a023(2), 400\u2013413 (1993)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"issue":"2","key":"102_CR20","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/5.554220","volume":"85","author":"V. Nalwa","year":"1997","unstructured":"Nalwa, V.: Automatic On-Line Signature Verification. Proceedings of the IEEE\u00a085(2), 215\u2013239 (1997)","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"102_CR21","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1108\/09593849410076799","volume":"7","author":"R. Clarke","year":"1994","unstructured":"Clarke, R.: Human identification in information systems: Management challenges and public policy issues. Information Technology & People\u00a07(4), 6\u201337 (1994)","journal-title":"Information Technology & People"},{"volume-title":"Designing Interactions","year":"2007","author":"B. Moggridge","key":"102_CR22","unstructured":"Moggridge, B.: Designing Interactions, vol.\u00a0766. The MIT Press, Cambridge (2007)"},{"key":"102_CR23","first-page":"247","volume-title":"Contemporary Ergonomics 2003","author":"L.A. Coventry","year":"2003","unstructured":"Coventry, L.A., De Angeli, A., Johnson, G.: Biometric Verification at a Self Service Interface. In: McCabe, P. (ed.) Contemporary Ergonomics 2003, pp. 247\u2013252. Taylor and Francis, London (2003)"},{"volume-title":"Conference on Human Factors in Computing Systems 2003","year":"2003","author":"L.A. Coventry","key":"102_CR24","unstructured":"Coventry, L.A., De Angeli, A., Johnson, G.: Usability and biometric verification at the ATM interface. In: Conference on Human Factors in Computing Systems 2003, Ft. Lauderdale, ACM Press, Florida (2003)"},{"volume-title":"ARES 2006","year":"2006","author":"C. Maple","key":"102_CR25","unstructured":"Maple, C., Norrington, P.: The Usability and Practicality of Biometric Authentication in the Workplace. In: ARES 2006. First International Conference on Availability, Reliability and Security, IEEE, Vienna, Austria (2006)"},{"volume-title":"Conference on Human Factors in Computing Systems 2006","year":"2006","author":"M. Theofanos","key":"102_CR26","unstructured":"Theofanos, M., et al.: Does habituation affect fingerprint quality? In: Conference on Human Factors in Computing Systems 2006, Montr\u00e9al, Qu\u00e9bec, ACM Press, Canada (2006)"},{"key":"102_CR27","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/0167-4048(95)00005-S","volume":"14","author":"F. Deane","year":"1995","unstructured":"Deane, F., et al.: Perceived acceptability of biometric security systems. Computers & Security\u00a014, 225\u2013231 (1995)","journal-title":"Computers & Security"},{"issue":"4","key":"102_CR28","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/0953-5438(96)87700-9","volume":"7","author":"F. Deane","year":"1995","unstructured":"Deane, F., et al.: Theoretical Examination of the Effects of Anxiety and Electronic Performance Monitoring on Behavioural Biometric Security Systems. Interacting with Computers\u00a07(4), 395\u2013411 (1995)","journal-title":"Interacting with Computers"},{"issue":"2","key":"102_CR29","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1006\/ijhc.1997.0167","volume":"48","author":"R. Henderson","year":"1998","unstructured":"Henderson, R., et al.: Electronic Monitoring Systems: An Examination of Physiological Activity and Task Performance within a Simulated Keystroke Security and Electronic Performance Monitoring System. International Journal of Human-Computer Studies\u00a048(2), 143\u2013157 (1998)","journal-title":"International Journal of Human-Computer Studies"},{"key":"102_CR30","unstructured":"Kukula, E., et al.: Biometrics and Manufacturing: A Recommendation of Working Height to Optimize Performance of a Hand Geometry Machine. Purdue University Biometrics Standards, Performance, & Assurance Laboratory, p. 18 (2006)"},{"key":"102_CR31","volume-title":"Fitting the Task to the Man: A Textbook of Occupational Ergonomics","author":"E. Grandjean","year":"1988","unstructured":"Grandjean, E.: Fitting the Task to the Man: A Textbook of Occupational Ergonomics, 4th edn. Taylor & Francis, London (1988)","edition":"4"},{"volume-title":"Handbook of Usability Testing: How to Plan, Design, and Conduct Effective Tests","year":"1994","author":"R. Rubin","key":"102_CR32","unstructured":"Rubin, R.: Handbook of Usability Testing: How to Plan, Design, and Conduct Effective Tests. John Wiley and Sons, Inc., New York (1994)"},{"issue":"2&3","key":"102_CR33","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1080\/07370024.1990.9667154","volume":"5","author":"P. Polson","year":"1990","unstructured":"Polson, P., Lewis, C.: Theory-Based Design for Easily Learned Interfaces. Human-Computer Interaction\u00a05(2&3), 191\u2013220 (1990)","journal-title":"Human-Computer Interaction"},{"volume-title":"Human Performance Engineering: A Guide for System Designers","year":"1982","author":"R. Bailey","key":"102_CR34","unstructured":"Bailey, R.: Human Performance Engineering: A Guide for System Designers. Prentice Hall, Englewood Cliffs (1982)"},{"volume-title":"An Introduction to Human-Computer Interaction","year":"1989","author":"P. Booth","key":"102_CR35","unstructured":"Booth, P.: An Introduction to Human-Computer Interaction. Lawrence Erlbaum Associates, London (1989)"},{"volume-title":"IEEE International Conference on Systems, Man, and Cybernetics","year":"1992","author":"M. Chignell","key":"102_CR36","unstructured":"Chignell, M., Hancock, P.: Design orientation and ergonomics. In: Chignell, M. (ed.) IEEE International Conference on Systems, Man, and Cybernetics, 1992, IEEE, Chicago, IL (1992)"},{"issue":"3","key":"102_CR37","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1145\/3166.3170","volume":"2","author":"J. Gould","year":"1985","unstructured":"Gould, J., Lewis, C.: Designing for Usability: Key Principles and What Designers Think. Communications of the ACM\u00a02(3), 300\u2013311 (1985)","journal-title":"Communications of the ACM"},{"key":"102_CR38","unstructured":"Intern. Organization for Standardization, ISO 9241: Ergonomic requirements for office work with visual display terminals (VDTs) - Part 11: Guidance on usability, p. 28 (1998)"},{"key":"102_CR39","unstructured":"Pheasant, S.: Bodyspace: Anthropometry, Ergonomics, and the Design of Work. In: Haslegrave, C. (ed.): 3rd edn., vol.\u00a0332. Taylor and Francis, Boca Raton (2006)"},{"volume-title":"Manufacturing Systems Engineering Series","year":"2003","author":"F. Tayyari","key":"102_CR40","unstructured":"Tayyari, F., Smith, J.: Occupational Ergonomics: Principles and Applications. In: Parsaei, H. (ed.) Manufacturing Systems Engineering Series, vol.\u00a0452, Kluwer Academic Publishers, Norwell (2003)"},{"issue":"3","key":"102_CR41","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSECP.2003.1203228","volume":"1","author":"S. Smith","year":"2003","unstructured":"Smith, S.: Humans in the Loop: Human-Computer Interaction and Security. IEEE Security and Privacy\u00a01(3), 75\u201379 (2003)","journal-title":"IEEE Security and Privacy"},{"issue":"12","key":"102_CR42","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/322796.322806","volume":"42","author":"A. Adams","year":"1999","unstructured":"Adams, A., Sasse, M.: Users are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures. Communications of the ACM\u00a042(12), 41\u201346 (1999)","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Digital Human Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73321-8_102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:14:13Z","timestamp":1582409653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73321-8_102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540733188","9783540733218"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73321-8_102","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}