1,262 research outputs found

    A Framework for Biometric and Interaction Performance Assessment of Automated Border Control Processes

    Get PDF
    Automated Border Control (ABC) in airports and land crossings utilize automated technology to verify passenger identity claims. Accuracy, interaction stability, user error, and the need for a harmonized approach to implementation are required. Two models proposed in this paper establish a global path through ABC processes. The first, the generic model, maps separately the enrolment and verification phases of an ABC scenario. This allows a standardization of the process and an exploration of variances and similarities between configurations across implementations. The second, the identity claim process, decomposes the verification phase of the generic model to an enhanced resolution of ABC implementations. Harnessing a human-biometric sensor interaction framework allows the identification and quantification of errors within the system's use, attributing these errors to either system performance or human interaction. Data from a live operational scenario are used to analyze behaviors, which aid in establishing what effect these have on system performance. Utilizing the proposed method will aid already established methods in improving the performance assessment of a system. Through analyzing interactions and possible behavioral scenarios from the live trial, it was observed that 30.96% of interactions included some major user error. Future development using our proposed framework will see technological advances for biometric systems that are able to categorize interaction errors and feedback appropriately

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Fulltime biometric mouse design for continuous authentication

    Get PDF
    As we embrace the information and communication technology in our everyday activities and day-to-day transactions, security concerns have increasingly come to light, especially in some of the critical areas of our society today such as education, health and commerce, where such security concerns are even higher. The need for complete and clear authentication and authorisation is of paramount importance. This paper explores andpresents the optimal use of full-time biometric mouse (FBM) for continuous authentication, which would not only enable authentication during log in and start of an application, but will enable continuous authentication throughout a transaction. We formulate a full-time biometric mouse (FBM) design that would ensure thumb positioning and its  ergonomics while ensuring comfort and maximum contact with the scanner to enable continuous authentication of the user in a speedy, easy and non-strenuous way. The mouse employs a simple algorithm that ensures quick operation to cut on possible delays and yet maintain the accuracy of the system

    Multiple multimodal mobile devices: Lessons learned from engineering lifelog solutions

    Get PDF
    For lifelogging, or the recording of one’s life history through digital means, to be successful, a range of separate multimodal mobile devices must be employed. These include smartphones such as the N95, the Microsoft SenseCam – a wearable passive photo capture device, or wearable biometric devices. Each collects a facet of the bigger picture, through, for example, personal digital photos, mobile messages and documents access history, but unfortunately, they operate independently and unaware of each other. This creates significant challenges for the practical application of these devices, the use and integration of their data and their operation by a user. In this chapter we discuss the software engineering challenges and their implications for individuals working on integration of data from multiple ubiquitous mobile devices drawing on our experiences working with such technology over the past several years for the development of integrated personal lifelogs. The chapter serves as an engineering guide to those considering working in the domain of lifelogging and more generally to those working with multiple multimodal devices and integration of their data

    A reference model to analyse User eXperience in integrated product-process design

    Get PDF
    The analysis of human factors is assuming an increasing importance in product and process design and the lack of common references for their assessment in industrial practices had driven to define a reference model to analyse the so-called User eXperience (UX) to support human-centred product-process design. Indeed, the recent advances in ubiquitous computing, wearable technologies and low-cost connected devices offer a huge amount of new tools for UX monitoring, but the main open issue is selecting the most proper devices for the specific application area and properly interpreting the collected information content in respect with the industrial design goals. The research investigates how to analyse the human behaviours of \u201cusers\u201d (i.e., workers) by a reference model to assess the perceived experience and a set of proper technologies for UX investigation for industrial scopes. In particular, the model has been defined for the automotive sector. The paper defines a set of evaluation metrics and a structured protocol analysis to objectify and measure the UX with the final aim to support the requirements definition in product-process design. The model has been defined to fit different cases: vehicle drivers at work, workers in the manufacturing line, and service operator

    Canine-centered interface design: supporting the work of diabetes alert dogs

    Get PDF
    Many people with Diabetes live with the continuous threat of hypoglycaemic attacks and the danger of going into coma. Diabetic Alert Dogs are trained to detect the onset of an attack before the human handler they are paired with deteriorates, giving them time to take action. We investigated requirements for designing an alert system allowing dogs to remotely call for help when their human falls unconscious before being able to react to an alert. Through a multispecies ethnographic approach we focus on teasing out the requirements for a physical canine user interface, involving both dogs, their handlers and trainers in the design. We discuss tensions between the requirements for the canine and the human users, argue the need for increased sensitivity towards the needs of individual dogs that goes beyond breed specific physical characteristics and reflect on how we can move from designing for dogs to designing with dogs

    Absence and Disability Management Practices for an Aging Workforce

    Get PDF
    The goal of Disability and Absence Management programming is to limit absence, control costs, and retain workers to maintain a productive workforce. This can include the development of supportive policies (e.g. flexible work options), manager and employee education, supportive benefit programs, return to work programs, among others. Increasingly, older workers have become a group of interest among Absence and Disability Management professionals, in part because many baby boomers are forgoing retirement and working longer. Projections suggest that by 2020 those 55 and over could account for 25% of workers. This shift is especially important given that disability prevalence increases with age – as the workforce ages, organizations will increasingly need to ensure their programming supports older workers. During the fall and winter of 2012-13, Cornell University’s Employment and Disability Institute and the Disability Management Employer Coalition (DMEC) collaborated on a survey and key informant interviews with DMEC members and conference attendees to learn more about what organizations are doing to respond to and prepare for an aging workforce

    DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution

    Full text link
    Recent research has demonstrated the vulnerability of fingerprint recognition systems to dictionary attacks based on MasterPrints. MasterPrints are real or synthetic fingerprints that can fortuitously match with a large number of fingerprints thereby undermining the security afforded by fingerprint systems. Previous work by Roy et al. generated synthetic MasterPrints at the feature-level. In this work we generate complete image-level MasterPrints known as DeepMasterPrints, whose attack accuracy is found to be much superior than that of previous methods. The proposed method, referred to as Latent Variable Evolution, is based on training a Generative Adversarial Network on a set of real fingerprint images. Stochastic search in the form of the Covariance Matrix Adaptation Evolution Strategy is then used to search for latent input variables to the generator network that can maximize the number of impostor matches as assessed by a fingerprint recognizer. Experiments convey the efficacy of the proposed method in generating DeepMasterPrints. The underlying method is likely to have broad applications in fingerprint security as well as fingerprint synthesis.Comment: 8 pages; added new verification systems and diagrams. Accepted to conference Biometrics: Theory, Applications, and Systems 201
    • 

    corecore