{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T10:41:27Z","timestamp":1756809687686},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036576"},{"type":"electronic","value":"9783642036583"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03658-3_35","type":"book-chapter","created":{"date-parts":[[2009,8,19]],"date-time":"2009-08-19T17:47:30Z","timestamp":1250704050000},"page":"293-305","source":"Crossref","is-referenced-by-count":4,"title":["Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems"],"prefix":"10.1007","author":[{"given":"Chris","family":"Riley","sequence":"first","affiliation":[]},{"given":"Graham","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Heather","family":"McCracken","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Al-Saffar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","volume-title":"Security and Usability","author":"K. Renaud","year":"2005","unstructured":"Renaud, K.: Evaluating Authentication Mechanisms. In: Cranor, L.F., Garfinkel, S. (eds.) Security and Usability. O\u2019Reilly, Sebastopol (2005)"},{"key":"35_CR2","volume-title":"Security and Usability","author":"L. Coventry","year":"2005","unstructured":"Coventry, L.: Usable Biometrics. In: Cranor, L.F., Garfinkel, S. (eds.) Security and Usability. O\u2019Reilly, Sebastopol (2005)"},{"key":"35_CR3","unstructured":"International Biometrics Group (IBG): Biometrics Market and Industry Report 2009-2014 (2009), http:\/\/www.biometricgroup.com\/reports\/public\/market_report.html"},{"issue":"12","key":"35_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1101779.1101784","volume":"48","author":"A. Chandra","year":"2005","unstructured":"Chandra, A., Calderon, T.: Challenges and Constraints to the Diffusion of Biometrics in Information Systems. Communications of the ACM\u00a048(12), 101\u2013106 (2005)","journal-title":"Communications of the ACM"},{"key":"35_CR5","volume-title":"First International Conference on Availability, Reliability and Security","author":"C. Maple","year":"2006","unstructured":"Maple, C., Norrington, P.: The Usability and Practicality of Biometric Authentication in the Workplace. In: First International Conference on Availability, Reliability and Security. IEEE Computer Society, Los Alamitos (2006)"},{"key":"35_CR6","unstructured":"Celent.: Biometric Technologies: Are We There Yet? Celent Communications, Boston (2006)"},{"issue":"2","key":"35_CR7","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/328236.328110","volume":"43","author":"A. Jain","year":"2000","unstructured":"Jain, A., Hong, L., Pankanti, S.: Biometric Identification. Communications of the ACM\u00a043(2), 91\u201398 (2000)","journal-title":"Communications of the ACM"},{"key":"35_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0747-7","volume-title":"Biometrics: Advanced Identity Management","author":"J. Ashbourn","year":"2000","unstructured":"Ashbourn, J.: Biometrics: Advanced Identity Management. Springer, Heidelberg (2000)"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Patrick, A.: Usability and acceptability of biometric security systems. In: NATO Workshop on Enhancing Information Systems Security Through Biometrics, Ottawa, Canada (2004)","DOI":"10.1007\/978-3-540-27809-2_11"},{"key":"35_CR10","unstructured":"Coventry, L., DeAngeli, A., Johnson, G.I.: Biometric Verification at a Self Service Interface. In: Contemporary Ergonomics 2003, pp. 247\u2013252 (2003b)"},{"key":"35_CR11","volume-title":"The Proceedings of the CHI Conference on Human Factors in Computing Systems, Workshop on Human-Computer Interaction and Security Systems","author":"L. Coventry","year":"2003","unstructured":"Coventry, L., Angeli, A.D., Johnson, G.I.: Honest It\u2019s Me! Self Service Verification. In: The Proceedings of the CHI Conference on Human Factors in Computing Systems, Workshop on Human-Computer Interaction and Security Systems, Fort Lauderdale, Florida (2003a)"},{"key":"35_CR12","unstructured":"Miller, R. C., Chou, V. H., Bernstein, M., Little, G., Kleek, M. V., Karger, D., et al.: Inky: A Sloppy Command Line for the Web with Rich Visual Feedback. In: Symposium on User Interface Software and Technology, Monterey (2000)"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L., Miller, R.C.: Johnny 2: A User Test of Key Continuity Management with S\/MIME and Outlook Express. In: Symposium on Usable privacy and security (SOUPS), Pittsburgh (2005)","DOI":"10.1145\/1073001.1073003"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Theofanos, M., Stanton, B., Orandi, S., Micheals, R., Zhang, N.-F.: Ten-Print Fingerprint Capture: Effect of Instructional Modes on User Performance. In: Human Factors and Ergonomics Society 51st Annual Meeting (2007)","DOI":"10.1037\/e577902012-006"},{"key":"35_CR15","unstructured":"Hoffman, P.: Visualizing the Use of Biometric Systems: Tackling Symbolism, Context and Interpretation. In: International Workshop on Usability and Biometrics, Washington (2008)"},{"key":"35_CR16","unstructured":"Ormiston, G.: Addressing the Worldwide Biometric Enrolment Challenge: Guidance Without Words. In: International Workshop on Usability and Biometrics, Washington (2008)"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Theofanos, M., Micheals, R., Scholtz, J., Morse, E., May, P.: Does Habituation Affect Fingerprint Quality? In: The CHI Conference of Human Factors in Computing Systems, Montr\u00e9al, Canada (2006)","DOI":"10.1145\/1125451.1125714"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Sasse, A.: Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems. IEEE Security & Privacy, 78\u201381 (2007)","DOI":"10.1109\/MSP.2007.69"},{"key":"35_CR19","unstructured":"Sasse, A.: Usability and trust in information systems. Cyber Trust & Crime Prevention Project. University College London, London (2004)"},{"key":"35_CR20","unstructured":"BioSec.: Report on results of first phase usability testing and guidelines for developers. BioSec Consortium (2004)"},{"key":"35_CR21","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.intcom.2006.01.004","volume":"18","author":"D.T. Toledano","year":"2006","unstructured":"Toledano, D.T., Pozo, R.F., Trapote, A.H., Gomez, L.H.: Usability evaluation of multi-modal biometric verification systems. Interacting with Computers\u00a018, 1101\u20131122 (2006)","journal-title":"Interacting with Computers"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03658-3_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:45:44Z","timestamp":1558478744000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03658-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036576","9783642036583"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03658-3_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}