User Perception and Acceptance of Biometrics M. Angela Sasse Professor of Human-Centred Technology Department of Computer Science University College London,

Slides:



Advertisements
Similar presentations
WHOIS – Data Elements – making a Difference ICANN Carthage Meeting October 2003 Marilyn Cade, Director AT&T Commercial and Business Constituency (BC)
Advertisements

1 FPEG Identity theft & payment fraud point December 2007.
The Perception of Privacy Risk Gerald W. Gates Chief Privacy Officer U.S. Census Bureau.
Excerpts from the Voting Rights Act of 1965 An act To enforce the fifteenth amendment to the Constitution of the United States, and for other purposes.
Strategic Centre for Organised Crime Partnerships and engagement with communities.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Breaking Trust On The Internet
Ethics What is it, why is it relevant to HCI, why is it important?
SECURITY STRATEGIES OF THE REGION Witek Nowosielski.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
1 Suzanne Lockhart M.A. Criminology thesis University of Melbourne, 2005 Current: PhD candidate University of S.A Identity Fraud – Displacement effects.
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
Electronic Authentication for Flexible Learning Workshop Presentation (5 August 2003) Chris Connolly, CEO, Galexia Consulting.
Biometrics and Authentication Shivani Kirubanandan.
Identity Cards: Strategy, Implementation & Challenges A Melodrama in Three Parts Simon Davies Director, Privacy International Visiting Fellow, London School.
The University of California Strengthening Business Practices: The Language of Our Control Environment Dan Sampson Assistant Vice President Financial Services.
The Charity Commission for England and Wales Beryl Hobson Head of Large Charities Division.
Car Seat Education for Refugees: Bridging Barriers.
Migration and the European Labour Market: The Stockholm Programme and Beyond Anne Hartung Assistant Professor, free Research Assistant, Aigul Alieva PhD.
Action to cut smoking rates and reduce tobacco use needs to take place locally, nationally and regionally if we are to have the most cost effective policies.
Introduction to the Public Safety System Created by Curt Harrell & Jesse Kuzy for.
February 25 th Agenda Aims of Partnering Trusted Partner concept Accounts and services Delivery / kiosk network BHSF – working in partnership.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Definition of Home Visit
Mini Checkout Copyright Agenda 1.About us 2.Current Waiting Line Model 3.Disadvantages 4.Proposed Service Model and Benefits 5.Existing vs Proposed.
AUDITS What you should know - a campus perspective. Franz Lozano Director/Budget Officer (former Internal Auditor) San Francisco State University Academic.
30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology.
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
By Renata Jaruseviciute 1 ©Renata Jaruseviciute.  Financial Crime definition & types  Regulatory body  Legislation  Questions to be asked yourself.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Assessment Review. Standard 1:Standard 1: Students will examine personal values and character traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
E-Science Projects and Security M. Angela Sasse & Mike Surridge.
The Fifteenth National HIPAA Summit Overview of Approaches to Security Officer Training John Parmigiani December 12, 2007.
Peer Outreach Team We are a diverse group of 33 young people aged between 15 – 25 from different boroughs around London, who help the GLA engage with young.
FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt
Jackie Driver Head of Good Relations Disability Related Harassment Review January 2013.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Looking at the challenges that face a large heterogeneous IT infrastructure, in terms of security, scale, communication, IT literacy / competence, autonomy.
My Time, My Community – volunteering and citizenship Andrew Tyson.
Educating Professionals Creating and Applying Knowledge Engaging our Communities GIVING VOICE TO HEALTH AND SAFETY: CALD WORKERS’ EXPERIENCES IN AGED CARE.
Are you fit for funding? Angela Richardson Cheshire Community Foundation WARRINGTON THIRD SECTOR ASSEMBLY North West Funders Forum.
University of Sunderland MSc HIM Computer Legislation.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Community BASED Policing/ ADELIN+JANNU. Structure Of Presentation Introduction for Community Based Policing Four basic principles of Community Based Policing.
AREA REP SUPPORT SKILLS B. This training follows Skill Building A Area Reps will continue with advanced trainings Area Reps will join monthly support.
INFLUENCES ON THE USE OF ALCOHOL, TOBACCO, AND OTHER DRUGS THE ROLE OF FAMILY, COMMUNITY, AND CULTURAL NORMS.
Schools as organisations
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Federalism. Objectives Define and give examples of national and State powers by completing a chart Examine scenarios and identify the type of power.
Smart Data infrastructure
The prevention of fraud in land registration systems
Information Security, Theory and Practice.
Add video notes to lecture
Hacking: public policy
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Richard Purcell Corporate Privacy Officer Microsoft Corporation
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Computers and Homeland Security
Computer Crime and Security Measures
UNIT NINE| LAW AND ORDER
Identity & Access Management
Insights from Children about Abuse and Neglect
Introduction to Projects
Chapter 4: Security Policies
Anna Adams Martina Angela Sasse
Presentation transcript:

User Perception and Acceptance of Biometrics M. Angela Sasse Professor of Human-Centred Technology Department of Computer Science University College London, UK

Background 20+ years usability research, 10+ years usability and effectiveness of security systems Specific biometrics experience –2000/1 BIOVISION (EU Roadmap Project) –2004 BioPII (German Federal Office for Information Security) –2005- Member of the Biometrics Advisory Group to UK Home Office

Overview User Perception – what is it? Expectation management Creeping functions, creepy missions

User perception First impressions count Problems with usability reduce confidence Rejection is personal Perceived utility and value One technology – many systems, many experiences

First impressions count Offputting: systems that are –Dirty/unhygienic –Scary –Rickety Technology as a “barrier” Violation of deeply engrained social norms (“What to you mean I can’t smile?”)

Low usability reduces confidence In technology Organisations who build/run it Basics What kind of system is it? What do I have to do? Don’t make user twist/turn/dance Anything that requires posters & instruction is NOT “walk-up-and-use”

Rejection is personal FaceIrisFinger Demo Rep. Group 0.15%12.3%0.69% Diff. ability Group 2.73%39%3.91% People are not “goats” Don’t make them feel that their biometrics are “not good enough” Impact on self-esteem and self-image Minorities may be particularly sensitive Impact on users’ lives

Utility & value Utility for user? –Better processes –Convenience –Value-added services Depends to design of end-to-end process & environment, not just biometric system Visible improvement of something they care about

Managing expectations Users evaluate performance against expectations Similar systems But also: expectations created by communications about systems Positive perception requires meeting or exceeding expectations

UK ID cards programme Promised at the outset that introduction of ID card and National Identity Register would –Prevent terrorism and serioius crime –Reduce illegal immigration, welfare fraud, health tourism … High support (85%) (responding to those ideas) Today: well below 50%, especially with young & technology-literate Much harder to work your way up from decline …

Many systems, many usages Range of high-low performance Cheap systems less likely to work & simple to overcome But: users cannot tell difference Intermingling with different purposes –Border control vs. payment for drinks –Integration with other systems - CCTV

"We were aiming for it to scan 12 pupils a minute, but it was only managing 5 so has been temporarily suspended as we do not want pupils' meals getting cold while they wait in the queue." Failure to identify + meet requirements = failure. Perception spreads to technology in general

User Acceptance requires Perceived need Utility/convenience for users Trust in operator –reliability of recognition –security of data –use for advertised purposes only

Creeping functions, creepy missions Shift of risk – ID theft vs. physical attack Opportunistic usage of data Advancements in technology of technology Shifting policies

Opportunistic use of data Law enforcement: investigation/evidence Use of investigatory powers by local authorities in UK –Residence in school district –Infringement of rubbish policies –Tax matters –Shellfish harvesting

Conclusions 1.Much homework to be done: -Usability -Universal access -Utility and convenience for users 2.Testing, testing, … and learning and improvement 3.Quality assurance, usability and performance standards

Conclusions 6.Continuing “arms race” of new technologies, more & more data increases burden on users 7.Careful management of expectations – don’t promise what you can’t deliver 8.Strategies for managing perceptions and expectations in face of increasing diversity of systems and applications Separate “high assurance” and “convenience” biometrics?