Investigating What You Share: Privacy Perceptions of Behavioural Biometrics | SpringerLink
Skip to main content

Investigating What You Share: Privacy Perceptions of Behavioural Biometrics

  • Conference paper
  • First Online:
HCI International 2021 - Posters (HCII 2021)

Abstract

This study examines people’s perceptions of biometrics, in the context of the inherent privacy concerns surrounding behavioural biometrics as an alternative to conventional password systems. We present the knowledge and opinions of behavioural biometrics collected in this study. The main theme which is present throughout the research is that users have privacy concerns around behavioural biometrics, but that these concerns do not necessarily translate into privacy-conscious actions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)

    Article  Google Scholar 

  2. Bhagavatula, R., Ur, B., Iacovino, K., Kywe, S.M., Cranor, L.F., Savvides, M.: Biometric authentication on iPhone and android: usability, perceptions, and influences on adoption (2015)

    Google Scholar 

  3. Braun, V., Clarke, V.: Thematic analysis (2012)

    Google Scholar 

  4. Buckley, O., Nurse, J.R.: The language of biometrics: analysing public perceptions. J. Inf. Secur. Appl. 47, 112–119 (2019)

    Google Scholar 

  5. Cornacchia, M., Papa, F., Sapio, B.: User acceptance of voice biometrics in managing the physical access to a secure area of an international airport. Technol. Anal. Strateg. Manag. 32, 1–15 (2020)

    Article  Google Scholar 

  6. Fagan, M., Khan, M.M.H.: Why do they do what they do?: a study of what motivates users to (not) follow computer security advice. In: Twelfth Symposium on Usable Privacy and Security (\(\{\)SOUPS\(\}\) 2016), pp. 59–75 (2016)

    Google Scholar 

  7. Furnell, S., Evangelatos, K.: Public awareness and perceptions of biometrics. Comput. Fraud Secur. 2007(1), 8–13 (2007)

    Article  Google Scholar 

  8. Gehringer, E.F.: Choosing passwords: security and human factors. In: IEEE 2002 International Symposium on Technology and Society (ISTAS 2002). Social Implications of Information and Communication Technology. Proceedings (Cat. No. 02CH37293), pp. 369–373. IEEE (2002)

    Google Scholar 

  9. Goodman, L.A.: Snowball sampling. Ann. Math. Statist. 32(1), 148–170 (1961). https://doi.org/10.1214/aoms/1177705148

    Article  MathSciNet  MATH  Google Scholar 

  10. Information Commissioner’s Office: Information commissioner’s annual report and financial statements 2019–20. Technical Report. Information Commissioner’s Office (2020)

    Google Scholar 

  11. Information Commissioner’s Office (2020). https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/special-category-data/what-are-the-conditions-for-processing/#conditions1

  12. Inglesant, P.G., Sasse, M.A.: The true cost of unusable password policies: password use in the wild. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 383–392 (2010)

    Google Scholar 

  13. Krupp, A., Rathgeb, C., Busch, C.: Social acceptance of biometric technologies in germany: a survey. In: 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), pp. 1–5. IEEE (2013)

    Google Scholar 

  14. Mwapasa, M., et al.: “Are we getting the biometric bioethics right?”-the use of biometrics within the healthcare system in Malawi. Glob. Bioeth. 31(1), 67–80 (2020)

    Article  Google Scholar 

  15. Norval, A., Prasopoulou, E.: Seeing like a citizen: exploring public views of biometrics. Polit. Stud. 67(2), 367–387 (2019)

    Article  Google Scholar 

  16. Steinfeld, N.: “I agree to the terms and conditions”: (how) do users read privacy policies online? An eye-tracking experiment. Comput. Hum. Behav. 55, 992–1000 (2016)

    Article  Google Scholar 

  17. Yampolskiy, R.V., Govindaraju, V.: Taxonomy of behavioural biometrics. In: Behavioral Biometrics for Human Identification: Intelligent Applications, pp. 1–43. IGI Global (2010)

    Google Scholar 

  18. Zimmermann, V., Gerber, N.: “If it wasn’t secure, they would not use it in the movies” – security perceptions and user acceptance of authentication technologies. In: Tryfonas, T. (ed.) HAS 2017. LNCS, vol. 10292, pp. 265–283. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-58460-7_18

    Chapter  Google Scholar 

  19. Zimmermann, V., Gerber, N.: The password is dead, long live the password-a laboratory study on user perceptions of authentication schemes. Int. J. Hum. Comput. Stud. 133, 26–44 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sally Earl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Earl, S., Campbell, J., Buckley, O. (2021). Investigating What You Share: Privacy Perceptions of Behavioural Biometrics. In: Stephanidis, C., Antona, M., Ntoa, S. (eds) HCI International 2021 - Posters. HCII 2021. Communications in Computer and Information Science, vol 1420. Springer, Cham. https://doi.org/10.1007/978-3-030-78642-7_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78642-7_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78641-0

  • Online ISBN: 978-3-030-78642-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics