{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:07:09Z","timestamp":1761646029613,"version":"3.41.2"},"reference-count":19,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2014,6,3]],"date-time":"2014-06-03T00:00:00Z","timestamp":1401753600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6,3]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 This paper aims to design a compact scheme of behavioural biometric-based user authentication, develop an adaptive mechanism that selects an appropriate classifier in an adaptive way and conduct a study to explore the effect of this mechanism. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 As a study, the proposed adaptive mechanism was implemented using a cost-based metric, which enables mobile phones to adopt a less costly classifier in an adaptive way to build the user normal-behaviour model and detect behavioural anomalies. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The user study with 50 participants indicates that our proposed mechanism can positively affect the authentication performance by maintaining the authentication accuracy at a relatively high and stable level. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title>\n               <jats:p> \u2013 The authentication accuracy can be further improved by incorporating other appropriate classifiers (e.g. neural networks) and considering other touch-gesture-related features (e.g. the speed of a touch). <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 This work explores the effect of adaptive mechanism on behavioural biometric-based user authentication. The results should be of interest for software developers and security specialists in deciding whether to implement such a mechanism for enhancing authentication performance on mobile phones. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 The user study with 50 participants indicates that this mechanism can positively affect the authentication performance by maintaining the authentication accuracy at a relatively high and stable level. To the best of our knowledge, our work is an early work discussing the implementation of an adaptive mechanism on a mobile phone.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/imcs-09-2013-0062","type":"journal-article","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T23:10:25Z","timestamp":1403219425000},"page":"155-166","source":"Crossref","is-referenced-by-count":15,"title":["The effect of adaptive mechanism on behavioural biometric based mobile phone authentication"],"prefix":"10.1108","volume":"22","author":[{"given":"Weizhi","family":"Meng","sequence":"first","affiliation":[]},{"given":"Duncan","family":"S. Wong","sequence":"additional","affiliation":[]},{"given":"Lam-For","family":"Kwok","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020123104382168600_b1","doi-asserted-by":"crossref","unstructured":"Ahmed, A.A.E.\n                and \n                  Traore, I.\n                (2007), \u201cA new biometric technology based on mouse dynamics\u201d, IEEE Transactions on Dependable and Secure Computing, Vol. 4 No. 3, pp. 165-179.","DOI":"10.1109\/TDSC.2007.70207"},{"key":"key2020123104382168600_b2","doi-asserted-by":"crossref","unstructured":"Bergadano, F.\n               , \n                  Gunetti, D.\n                and \n                  Picardi, C.\n                (2002), \u201cUser authentication through keystroke dynamics\u201d, ACM Transactions on Information and System Security, Vol. 5 No. 4, pp. 367-397.","DOI":"10.1145\/581271.581272"},{"key":"key2020123104382168600_b3","doi-asserted-by":"crossref","unstructured":"Clarke, N.L.\n                and \n                  Furnell, S.M.\n                (2005), \u201cTelephones-a survey of attitudes and practices\u201d, Computers and Security, Vol. 24 No. 7, pp. 519-527.","DOI":"10.1016\/j.cose.2005.08.003"},{"key":"key2020123104382168600_b4","unstructured":"De Luca, A.\n               , \n                  Hang, A.\n               , \n                  Brudy, F.\n               , \n                  Lindner, C.\n                and \n                  Hussmann, H.\n                (2012), \u201cTouch me once and i know it\u2019s you!: implicit authentication based on touch screen patterns\u201d, Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI) in Austin, TX, USA, 2012, ACM, New York, NY, pp. 987-996."},{"key":"key2020123104382168600_b5","doi-asserted-by":"crossref","unstructured":"Feng, T.\n               , \n                  Liu, Z.\n               , \n                  Kwon, K.-A.\n               , \n                  Shi, W.\n               , \n                  Carbunary, B.\n               , \n                  Jiang, Y.\n                and \n                  Nguyen, N.\n                (2012), \u201cContinuous mobile authentication using touchscreen gestures\u201d, Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST) in Greater Boston, MA, 2012, IEEE, pp. 451-456.","DOI":"10.1109\/THS.2012.6459891"},{"key":"key2020123104382168600_b6","doi-asserted-by":"crossref","unstructured":"Frank, M.\n               , \n                  Biedert, R.\n               , \n                  Ma, E.\n               , \n                  Martinovic, I.\n                and \n                  Song, D.\n                (2012), \u201cTouchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication\u201d, IEEE Transactions on Information Forensics and Security, Vol. 8 No. 1, pp. 136-148.","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"key2020123104382168600_b7","doi-asserted-by":"crossref","unstructured":"Gaffney, J.E.\n                and \n                  Ulvila, J.W.\n                (2001), \u201cEvaluation of intrusion detectors: a decision theory approach\u201d, Proceedings of the 2001 IEEE Symposium on Security and Privacy in Oakland, CA, USA, 2001, IEEE, pp. 50-61.","DOI":"10.1109\/SECPRI.2001.924287"},{"key":"key2020123104382168600_b8","unstructured":"Jermyn, I.\n               , \n                  Mayer, A.\n               , \n                  Monrose, F.\n               , \n                  Reiter, M.K.\n                and \n                  Rubin, A.D.\n                (1999), \u201cThe design and analysis of graphical passwords\u201d, Proceedings of the 8th USENIX Security Symposium in Washington, DC, USA, 1999, USENIX Association, pp. 1-15."},{"key":"key2020123104382168600_b9","doi-asserted-by":"crossref","unstructured":"Karlson, A.K.\n               , \n                  Brush, A.B.\n                and \n                  Schechter, S.\n                (2009), \u201cCan i borrow your phone?: understanding concerns when sharing mobile phones\u201d, Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI) in Boston, MA, USA, 2009, ACM, New York, NY, pp. 1647-1650.","DOI":"10.1145\/1518701.1518953"},{"key":"key2020123104382168600_b10","doi-asserted-by":"crossref","unstructured":"Kim, D.\n               , \n                  Dunphy, P.\n               , \n                  Briggs, P.\n               , \n                  Hook, J.\n               , \n                  Nicholson, J.W.\n               , \n                  Nicholson, J.\n                and \n                  Olivier, P.\n                (2010), \u201cMulti-touch authentication on tabletops\u201d, Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI) in Atlanta, GA, USA, 2010, ACM, New York, NY, pp. 1093-1102.","DOI":"10.1145\/1753326.1753489"},{"key":"key2020123104382168600_b11","unstructured":"Power, R.\n                (2011), \u201cMobility and security: dazzling opportunities, profound challenges\u201d, Online available at: www.mcafee.com\/mobilesecurityreport (accessed 15 August 2013)."},{"key":"key2020123104382168600_b12","doi-asserted-by":"crossref","unstructured":"Meng, Y.\n                (2012), \u201cMeasuring intelligent false alarm reduction using an ROC curve-based approach in network intrusion detection\u201d, Proceedings of the 5th International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA) in Tianjin, China, 2012, IEEE, pp. 108-113.","DOI":"10.1109\/CIMSA.2012.6269608"},{"key":"key2020123104382168600_b13","unstructured":"Meng, Y.\n               , \n                  Wong, D.S.\n               , \n                  Schlegel, R.\n                and \n                  Kwok, L.-F.\n                (2012), \u201cTouch gestures based biometric authentication scheme for touchscreen mobile phones\u201d, Proceedings of the 8th China International Conference on Information Security and Cryptology (INSCRYPT) in Beijing, China, 2012, Springer-Verlag, Heidelberg, pp. 331-350."},{"key":"key2020123104382168600_b14","doi-asserted-by":"crossref","unstructured":"Potharaju, R.\n               , \n                  Newell, A.\n               , \n                  Nita-Rotaru, C.\n                and \n                  Zhang, X.\n                (2012), \u201cPlagiarizing smartphone applications: attack strategies and defense techniques\u201d, Proceedings of the 5th International Symposium on Engineering Secure Software and Systems (ESSoS), Paris, France, 2012, Springer-Verlag, Heidelberg, pp. 106-120.","DOI":"10.1007\/978-3-642-28166-2_11"},{"key":"key2020123104382168600_b15","doi-asserted-by":"crossref","unstructured":"Pusara, M.\n                and \n                  Brodley, C.E.\n                (2004), \u201cUser re-authentication via mouse movements\u201d, Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC) in Washington DC, 2004, ACM, New York, NY, pp. 1-8.","DOI":"10.1145\/1029208.1029210"},{"key":"key2020123104382168600_b16","doi-asserted-by":"crossref","unstructured":"Shepard, R.N.\n                (1967), \u201cRecognition memory for words, sentences, and pictures\u201d, Journal of Verbal Learning and Verbal Behavior, Vol. 6 No. 1, pp. 156-163.","DOI":"10.1016\/S0022-5371(67)80067-7"},{"key":"key2020123104382168600_b17","doi-asserted-by":"crossref","unstructured":"Tari, F.\n               , \n                  Ozok, A.A.\n                and \n                  Holden, S.H.\n                (2006), \u201cA comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords\u201d, Proceedings of the 2nd Symposium on Usable Privacy and Security (SOUPS) in Pittsburgh, 2006, ACM, New York, NY, pp. 56-66.","DOI":"10.1145\/1143120.1143128"},{"key":"key2020123104382168600_b18","unstructured":"WEKA\n                (2012), \u201cWaikato environment for knowledge analysis: data mining software in Java\u201d, available at: www.cs.waikato.ac.nz\/ml\/weka\/ (accessed 15 May 2013)."},{"key":"key2020123104382168600_b19","doi-asserted-by":"crossref","unstructured":"Zahid, S.\n               , \n                  Shahzad, M.\n               , \n                  Khayam, S.A.\n                and \n                  Farooq, M.\n                (2009), \u201cKeystroke-based user identification on smart phones\u201d, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID) in Saint-Malo, France, 2009, Springer-Verlag, Heidelberg, pp. 224-243.","DOI":"10.1007\/978-3-642-04342-0_12"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IMCS-09-2013-0062","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMCS-09-2013-0062\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMCS-09-2013-0062\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:50:48Z","timestamp":1753393848000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/22\/2\/155-166\/179422"}},"subtitle":[],"editor":[{"given":"Mr","family":"Veniamin Ginodman, Ms. Natalya Obelets, Mr Ram Herkanaidu","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,6,3]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6,3]]}},"alternative-id":["10.1108\/IMCS-09-2013-0062"],"URL":"https:\/\/doi.org\/10.1108\/imcs-09-2013-0062","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2014,6,3]]}}}