{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:34:21Z","timestamp":1730208861407,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,17]]},"DOI":"10.1109\/codit55151.2022.9803965","type":"proceedings-article","created":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:42:22Z","timestamp":1656603742000},"page":"641-646","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing and Comparing Public Perception of Facial Recognition, Iris Verification and Fingerprints Based Authentication Systems"],"prefix":"10.1109","author":[{"given":"Sadia","family":"Riaz","sequence":"first","affiliation":[{"name":"S.P. Jain School of Global Management,UAE"}]},{"given":"Arif","family":"Mushtaq","sequence":"additional","affiliation":[{"name":"City University College of Ajman,Department of Artificial Intelligence &#x0026; Data Science,UAE"}]},{"given":"Hassan","family":"Ibrar","sequence":"additional","affiliation":[{"name":"Dubai Police Headquarters,General Department of Operations,UAE"}]}],"member":"263","reference":[{"journal-title":"Vulnerability In Biometric Authentication Biometrics Finger Vein Recognition","year":"2017","author":"deguchi","key":"ref31"},{"key":"ref30","first-page":"1","article-title":"Te usability construct: a dead end?","author":"tractinsky","year":"2017","journal-title":"Human- Computer Interaction"},{"journal-title":"Is Facial Recognition Too Biased To Be Let Loose?","year":"2021","author":"castelvecchi","key":"ref10"},{"journal-title":"Defund Facial Recognition Before It's Too Late - The Atlantic","year":"2020","author":"devich-cyril","key":"ref11"},{"key":"ref12","article-title":"At Least 11 Police Forces Use Face Recognition In the EU","author":"kayser-bril","year":"0","journal-title":"Algorithm Watch"},{"journal-title":"Is Your Public Transport Ticket the Beginning Of Your Digital Identity?","year":"2021","author":"hersey","key":"ref13"},{"journal-title":"Apple's Penchantfor Consumer Security","year":"2016","author":"bajarin","key":"ref14"},{"journal-title":"Surge in UK adoption of fingerprint recognition points way to mainstream biometric authentication at the expense of the password","year":"2017","author":"deloitte","key":"ref15"},{"journal-title":"Banks turning to voice recognition","year":"2016","key":"ref16"},{"journal-title":"HSBC's voice recognition security breached by customer's brother","year":"2017","key":"ref17"},{"journal-title":"Survey Shows U A E Is Most Enthusiastic about Biometrics","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref28","first-page":"9","article-title":"Ergonomic requirements for office work with visual display terminals (VDTs)","volume":"45","year":"1998","journal-title":"Int Organization for Standardization"},{"key":"ref4","first-page":"319","article-title":"Usability and trust in information systems","author":"sasse","year":"2005","journal-title":"Cyber Trust and Crime Prevention"},{"key":"ref27","article-title":"Ergonomics in design for usability, in people and computer: designing for usability","author":"shackel","year":"1986","journal-title":"Proceedings of the 2nd Conference Human-Computer Interaction Specialist Group British computer Society"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8715264"},{"journal-title":"Dubai Introduces Facial Recognition On Public Transport","year":"2020","author":"saul","key":"ref6"},{"journal-title":"Interaction Design Beyond Human Computer Interaction","year":"2002","author":"preece","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.2873494"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_31"},{"journal-title":"Gulf News","article-title":"UAE Approves Facial Recognition In Some Key Sectors: How the Technology Is Changing Our World","year":"2021","key":"ref7"},{"journal-title":"Biometrics Industry Could Lose B This Year From Pandemic But Facial Recognition Market To Grow","year":"2020","author":"burt","key":"ref2"},{"journal-title":"Biometric presentation attack detection Te international organization for standardization","year":"2017","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642639"},{"key":"ref20","first-page":"947","article-title":"Vulnerabilities of Biometric Authentication, Threats and Countermeasures","volume":"4","author":"alaswad","year":"2014","journal-title":"International Journal of Information & Computation Technology"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(07)70006-4"},{"journal-title":"Handbook of Fingerprint Recognition [M]","year":"2003","author":"maltoni","key":"ref21"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/6294.899930","article-title":"A practical guide to biometric security technology [J]","volume":"3","author":"simon","year":"2001","journal-title":"IT Professional"},{"key":"ref23","first-page":"143","article-title":"Privacy perceptions in biometrics operations","author":"chan","year":"0","journal-title":"In Proceedings of the International Conference on e-Learning e-Business Enterprise Information Systems and e-Government (EEE)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2001.0483"},{"key":"ref25","article-title":"J, Human computer interaction-brief intro","author":"carroll","year":"2013","journal-title":"Encyclopedia of Human-Computer Interaction"}],"event":{"name":"2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)","start":{"date-parts":[[2022,5,17]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2022,5,20]]}},"container-title":["2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9803856\/9803880\/09803965.pdf?arnumber=9803965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T13:58:01Z","timestamp":1686578281000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9803965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/codit55151.2022.9803965","relation":{},"subject":[],"published":{"date-parts":[[2022,5,17]]}}}