Biometrics are physiological features that allow individuals to be identified. Popular biometrics include fingerprints, faces, and irises. A common use of biometric systems is to authenticate users desiring access to a system or resource. Universal Access can be promoted with biometrics. Biometrics provide a secure way to access information technology, although the use of biometrics presents challenges and opportunities unique to other authentication methods (such as passwords and tokens). Biometric systems are also vulnerable to poor usability. Such systems must be engineered with wide user accessibility and acceptability in mind, but also need to provide robust security. This paper considers the application of biometrics in Universal Access systems with regards to usability and security.


universal access biometrics security usability 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Stephanidis, C.: The Universal Access Handbook. CRC (2009)Google Scholar
  2. 2.
    Bahr, G.S., Mayron, L.M., Gacey, H.J.: Cyber risks to secure and private universal access. In: Stephanidis, C. (ed.) Universal Access in HCI, Part I, HCII 2011. LNCS, vol. 6765, pp. 433–442. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  3. 3.
    Al-Harby, F., Qahwaji, R., Kamala, M.: Users acceptance of secure biometrics authentication system: Reliability and validate of an extended utaut model. Networked Digital Technologies, 254–258 (2010)Google Scholar
  4. 4.
    Toledano, D., Fernández Pozo, R., Hernández Trapote, Á., Hernández Gómez, L.: Usability evaluation of multi-modal biometric verification systems. Interacting with Computers 18(5), 1101–1122 (2006)CrossRefGoogle Scholar
  5. 5.
    Jain, A., Ross, A., Nandakumar, K.: Introduction to biometrics. Springer (2011)Google Scholar
  6. 6.
    Cohen, S., Ben-Asher, N., Meyer, J.: Towards information technology security for universal access. In: Stephanidis, C. (ed.) Universal Access in HCI, Part I, HCII 2011. LNCS, vol. 6765, pp. 443–451. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  7. 7.
    Braz, C., Robert, J.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conferenceof the Association Francophone d’Interaction Homme-Machine, pp. 199–203. ACM (2006)Google Scholar
  8. 8.
    Cranor, L., Garfinkel, S.: Guest editors’ introduction: Secure or usable? IEEE Security & Privacy 2(5), 16–18 (2004)CrossRefGoogle Scholar
  9. 9.
    Kumar, N.: Password in practice: a usability study. Journal of Global Research in Computer Science 2(5), 107–112 (2011)Google Scholar
  10. 10.
    Sasse, M.: Computer security: Anatomy of a usability disaster, and a plan for recovery. In: Proceedings of CHI 2003 Workshop on HCI and Security Systems. Citeseer (2003)Google Scholar
  11. 11.
    Sasse, M., Brostoff, S., Weirich, D.: Transforming the weakest linka human/computer interaction approach to usable and effective security. BT Technology Journal 19(3), 122–131 (2001)CrossRefGoogle Scholar
  12. 12.
    Greene, S.: Security Policies and Procedures: Principles and Practices. Prentice Hall Security Series. Prentice-Hall, Inc. (2005)Google Scholar
  13. 13.
    Pfleeger, C., Pfleeger, S.: Security in computing. Prentice Hall PTR (2006)Google Scholar
  14. 14.
    Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? a field trial investigation. People and Computers, 405–424 (2000)Google Scholar
  15. 15.
    Patrick, A.S.: Usability and acceptability of biometric security systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 105–105. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  16. 16.
    International Organization for Standardization: 9241-11. Ergonomic Requirements for Office Work with Visual Display Terminals (VDTs)–Part II Guidance on Usability (1998)Google Scholar
  17. 17.
    Shneiderman, B.: Universal usability. Communications of the ACM 43(5), 84–91 (2000)CrossRefGoogle Scholar
  18. 18.
    Kainda, R., Flechais, I., Roscoe, A.: Security and usability: Analysis and evaluation. In: ARES 2010 International Conference on Availability, Reliability, and Security, pp. 275–282. IEEE (2010)Google Scholar
  19. 19.
    Whitten, A., Tygar, J.: Why johnny cant encrypt: A usability evaluation of pgp 5.0. In: Proceedings of the 8th USENIX Security Symposium, vol. 99. McGraw-Hill (1999)Google Scholar
  20. 20.
    Garfinkel, S.: Design principles and patterns for computer systems that are simultaneously secure and usable. PhD thesis, Massachusetts Institute of Technology (2005)Google Scholar
  21. 21.
    Riley, C., Buckner, K., Johnson, G., Benyon, D.: Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society 24(3), 295–306 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Liam M. Mayron
    • 1
  • Yasser Hausawi
    • 1
  • Gisela Susanne Bahr
    • 1
  1. 1.Florida Institute of TechnologyMelbourneUSA

Personalised recommendations