{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:18:44Z","timestamp":1758269924651,"version":"3.41.0"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2011,2,1]],"date-time":"2011-02-01T00:00:00Z","timestamp":1296518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Data and Information Quality"],"published-print":{"date-parts":[[2011,2]]},"abstract":"<jats:p>The use of stolen personal-identifying information, like Social Security numbers, to commit identity fraud continues to be a major problem. The fact that an impostor can pass as the genuine user by possession of stolen identification information is a weakness in current authentication systems. Adding a biometric layer to the traditional knowledge and token-based authentication systems is one way to counter this problem. Physical biometrics, such as fingerprint systems, are highly accurate; hence, they would be the first choice for such applications but are often inappropriate. Behavioral biometrics, like biometric typing patterns, have the potential to fill this gap as another level of security but this research identified some deficiencies in performance quality. Two research streams for improvements have emerged. The first approach attempts to improve performance by building better classifiers, while the second attempts to attain the same goal by using richer identifying inputs. Both streams assume that the typing biometric patterns are stable over time. This study investigates the validity of this assumption by analyzing how students\u2019 typing patterns behave over time. The results demonstrate that typing patterns change over time due to learning resulting in several performance quality challenges. First, the changing patterns lead to deteriorating authentication accuracy. Second, the relevancy of the reference biometric template created during training becomes questionable. Third, the deterioration in accuracy compromises the security of the whole system and fourth, the net effect brings to question whether the biometric keypad is no longer \u201cfit for use\u201d as an authentication system. These are critical data quality issues that need to be addressed if behavioral biometrics are to play a significant role in minimizing authentication fraud. Possible solutions to the problem, including biometric template updating and choice of uncorrelated PIN combinations, are suggested as potential topics for future research.<\/jats:p>","DOI":"10.1145\/1891879.1891884","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:30:59Z","timestamp":1297794659000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Typing Biometrics"],"prefix":"10.1145","volume":"2","author":[{"given":"Benjamin","family":"Ngugi","sequence":"first","affiliation":[{"name":"Suffolk University"}]},{"given":"Beverly K.","family":"Kahn","sequence":"additional","affiliation":[{"name":"Suffolk University"}]},{"given":"Marilyn","family":"Tremaine","sequence":"additional","affiliation":[{"name":"Rutgers University"}]}],"member":"320","published-online":{"date-parts":[[2011,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(01)00124-2"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Asonov D.","key":"e_1_2_1_2_1","unstructured":"Asonov , D. and Agrawal , R . 2004. Keyboard acoustic emanations . In Proceedings of the IEEE Symposium on Security and Privacy. Asonov, D. and Agrawal, R. 2004. Keyboard acoustic emanations. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2007040101"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0073117"},{"key":"e_1_2_1_6_1","volume-title":"-J","author":"Chang C.-C.","year":"2001","unstructured":"Chang , C.-C. and Lin , C . -J . 2001 . LIBSVM : A library for support vector machines. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm. Chang, C.-C. and Lin, C.-J. 2001. LIBSVM: A library for support vector machines. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593849410076799"},{"key":"e_1_2_1_8_1","unstructured":"Coventry L. 2005. Usable biometrics. In Security and Usability: Designing Secure Systems that People Can Use L. F. Cranor and S. Garfinkel Eds. Coventry L. 2005. Usable biometrics. In Security and Usability: Designing Secure Systems that People Can Use L. F. Cranor and S. Garfinkel Eds."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140135908930419"},{"key":"e_1_2_1_10_1","unstructured":"Denning D. 2001. Why I love biometrics it is \u201cliveness\u201d not secrecy that counts. http:\/\/Infosecuritymag.Techtarget.Com\/Articles\/January01\/Columns_Logoff.Shtml Denning D. 2001. Why I love biometrics it is \u201cliveness\u201d not secrecy that counts. http:\/\/Infosecuritymag.Techtarget.Com\/Articles\/January01\/Columns_Logoff.Shtml"},{"key":"e_1_2_1_11_1","unstructured":"Duda R. Hart P. and Stork D. 2000. Pattern Classification. John Wiley &amp; Sons New York. Duda R. Hart P. and Stork D. 2000. Pattern Classification . John Wiley &amp; Sons New York."},{"key":"e_1_2_1_12_1","volume-title":"Keystroke Timing: Some Preliminary Results. Rand rep. R-256-NFS","author":"Gaines R.","year":"1980","unstructured":"Gaines , R. , Lisowski , W. , Press, W. , and Shapiro, N. 1980 . Authentication by Keystroke Timing: Some Preliminary Results. Rand rep. R-256-NFS . Rand Corporation, Santa Monica, CA. Gaines, R., Lisowski, W., Press, W., and Shapiro, N. 1980. Authentication by Keystroke Timing: Some Preliminary Results. Rand rep. R-256-NFS. Rand Corporation, Santa Monica, CA."},{"volume-title":"Proceedings of the IEEE\/IPSJ International Symposium on Applications and the Internet Workshops.","author":"Galassi U.","key":"e_1_2_1_13_1","unstructured":"Galassi , U. , Giordana , A. , and Mendola , M . 2005. Learning user profile from traces . In Proceedings of the IEEE\/IPSJ International Symposium on Applications and the Internet Workshops. Galassi, U., Giordana, A., and Mendola, M. 2005. Learning user profile from traces. In Proceedings of the IEEE\/IPSJ International Symposium on Applications and the Internet Workshops."},{"key":"e_1_2_1_14_1","unstructured":"Garcia J. 1986. USA patent no. 4621334. United States Patents and Trademark Office. Garcia J. 1986. USA patent no. 4621334. United States Patents and Trademark Office."},{"key":"e_1_2_1_15_1","unstructured":"Gentner D. 1982. Why nouns are learned before verbs: Linguistic relativity versus natural partitioning. In Language Development Earlbaum Hillsdale NJ 301--334. Gentner D. 1982. Why nouns are learned before verbs: Linguistic relativity versus natural partitioning. In Language Development Earlbaum Hillsdale NJ 301--334."},{"key":"e_1_2_1_16_1","first-page":"102","article-title":"Biometrics in access control. A&amp;S","volume":"50","author":"Graeventiz G. V.","year":"2003","unstructured":"Graeventiz , G. V. 2003 . Biometrics in access control. A&amp;S Int. Autom. Secur. 50 , 102 -- 104 . Graeventiz, G. V. 2003. Biometrics in access control. A&amp;S Int. Autom. Secur. 50, 102--104.","journal-title":"Int. Autom. Secur."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"e_1_2_1_18_1","unstructured":"Hicklin A. and Khanna R. 2006. The Role of Data Quality in Biometrics. Mitretek Systems Falls Church VA. Hicklin A. and Khanna R. 2006. The Role of Data Quality in Biometrics . Mitretek Systems Falls Church VA."},{"key":"e_1_2_1_19_1","unstructured":"Hsu C. W. Chang C. C. and Lin C. J. 2003. A Practical Guide to Support Vector Classification. Department of Computer Science and Information Engineering National Taiwan University. Hsu C. W. Chang C. C. and Lin C. J. 2003. A Practical Guide to Support Vector Classification . Department of Computer Science and Information Engineering National Taiwan University."},{"key":"e_1_2_1_20_1","unstructured":"Identity Theft Resource Center. 2006. 2005 disclosures of U.S. data incidents. http:\/\/idtheftmostwanted.org\/ITRC&percnt;20Breach&percnt;20Report&percnt;202005.pdf. Identity Theft Resource Center . 2006. 2005 disclosures of U.S. data incidents. http:\/\/idtheftmostwanted.org\/ITRC&percnt;20Breach&percnt;20Report&percnt;202005.pdf."},{"key":"e_1_2_1_21_1","unstructured":"Identity Theft Resource Center. 2007. 2006 disclosures of U.S. data incidents. http:\/\/idtheftmostwanted.org\/ITRC&percnt;20Breach&percnt;20Report&percnt;202006.pdf. Identity Theft Resource Center . 2007. 2006 disclosures of U.S. data incidents. http:\/\/idtheftmostwanted.org\/ITRC&percnt;20Breach&percnt;20Report&percnt;202006.pdf."},{"key":"e_1_2_1_22_1","unstructured":"Identity Theft Resource Center. 2008. 2007 ITRC breach report. http:\/\/idtheftmostwanted.org\/ITRC&percnt;20Breach&percnt;20Report&percnt;202007.pdf. Identity Theft Resource Center . 2008. 2007 ITRC breach report. http:\/\/idtheftmostwanted.org\/ITRC&percnt;20Breach&percnt;20Report&percnt;202007.pdf."},{"key":"e_1_2_1_23_1","unstructured":"Identity Theft Resource Center. 2009. 2008 ITRC breach report. http:\/\/www.idtheftcenter.org\/artman2\/uploads\/1\/ITRC Breach Report 2008 final 1.pdf. Identity Theft Resource Center . 2009. 2008 ITRC breach report. http:\/\/www.idtheftcenter.org\/artman2\/uploads\/1\/ITRC Breach Report 2008 final 1.pdf."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018428.1020865"},{"volume-title":"1999. Making Large-Scale SVM Learning Practical","author":"Joachims T.","key":"e_1_2_1_25_1","unstructured":"Joachims , T. , Ed. 1999. Making Large-Scale SVM Learning Practical . MIT Press , Cambridge, MA . Joachims, T., Ed. 1999. Making Large-Scale SVM Learning Practical. MIT Press, Cambridge, MA."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"e_1_2_1_27_1","unstructured":"Juran J. and Godfrey B. 1999. Juran\u2019s Quality Handbook 5th Ed. McGraw Hill. Juran J. and Godfrey B. 1999. Juran\u2019s Quality Handbook 5th Ed. McGraw Hill."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290512331321884"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(88)80053-1"},{"key":"e_1_2_1_30_1","unstructured":"Leggett J. Glen W. and Umphress D. 1988. Verification of user identity via keystrokes characteristics. In Human Factors in Management Information Systems J. Carey Ed. Ablex Publishing Norwood NJ. Leggett J. Glen W. and Umphress D. 1988. Verification of user identity via keystrokes characteristics. In Human Factors in Management Information Systems J. Carey Ed. Ablex Publishing Norwood NJ."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102169"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1515693.1516680"},{"volume-title":"Proceedings of the 6th International Symposium on Wearable Computers (ISWC\u201902)","author":"Maeda T.","key":"e_1_2_1_33_1","unstructured":"Maeda , T. , Ando , H. , Sugimoto , M. , Watanabe , J. , and Miki , T . 2002. Wearable robotics as a behavioral interface-The study of the parasitic humanoid . In Proceedings of the 6th International Symposium on Wearable Computers (ISWC\u201902) . Maeda, T., Ando, H., Sugimoto, M., Watanabe, J., and Miki, T. 2002. Wearable robotics as a behavioral interface-The study of the parasitic humanoid. In Proceedings of the 6th International Symposium on Wearable Computers (ISWC\u201902)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1995.1061"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the E-Court Conference.","author":"National Center for State Courts.","year":"2002","unstructured":"National Center for State Courts. 2002 . Biometrics and the courts . In Proceedings of the E-Court Conference. National Center for State Courts. 2002. Biometrics and the courts. In Proceedings of the E-Court Conference."},{"key":"e_1_2_1_38_1","unstructured":"National Instruments Corporation. 2005. LabVIEW. http:\/\/www.ni.com\/labview\/. National Instruments Corporation . 2005. LabVIEW. http:\/\/www.ni.com\/labview\/."},{"volume-title":"Electronic Capture and Analysis of Fraudulent Behavioral Patterns: An Application to Identity Fraud","author":"Ngugi B.","key":"e_1_2_1_39_1","unstructured":"Ngugi , B. 2005. Electronic Capture and Analysis of Fraudulent Behavioral Patterns: An Application to Identity Fraud . New Jersey Institute of Technology , Newark, NJ . Ngugi, B. 2005. Electronic Capture and Analysis of Fraudulent Behavioral Patterns: An Application to Identity Fraud. New Jersey Institute of Technology, Newark, NJ."},{"volume-title":"Guarding Your Business: A Management Approach to Business","author":"O\u2019Gorman L.","key":"e_1_2_1_40_1","unstructured":"O\u2019Gorman , L. 2004. Securing business\u2019s front door-Passwords, tokens and authentication . In Guarding Your Business: A Management Approach to Business , S. Ghosh et al. Eds., Springer , 119--149. O\u2019Gorman, L. 2004. Securing business\u2019s front door-Passwords, tokens and authentication. In Guarding Your Business: A Management Approach to Business, S. Ghosh et al. Eds., Springer, 119--149."},{"volume-title":"Proceedings of the IEEE Computer and Society Conference.","author":"Prabhakar S.","key":"e_1_2_1_41_1","unstructured":"Prabhakar , S. , Pankanti , S. , and Jain , A . 2003. Biometric recognition: Security and privacy concerns . In Proceedings of the IEEE Computer and Society Conference. Prabhakar, S., Pankanti, S., and Jain, A. 2003. Biometric recognition: Security and privacy concerns. In Proceedings of the IEEE Computer and Society Conference."},{"volume-title":"Biometrics for Network Security","author":"Reid P.","key":"e_1_2_1_42_1","unstructured":"Reid , P. 2004. Biometrics for Network Security . Prentice Hall , Upper Saddle River, NJ. Reid, P. 2004. Biometrics for Network Security. Prentice Hall, Upper Saddle River, NJ."},{"key":"e_1_2_1_43_1","unstructured":"Schmidt R. and Lee T. 1999. Motor Control and Learning: A Behavioral Emphasis 3rd Ed. Human Kinetics Champaign IL. Schmidt R. and Lee T. 1999. Motor Control and Learning: A Behavioral Emphasis 3rd Ed. Human Kinetics Champaign IL."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1659225.1659227"},{"key":"e_1_2_1_45_1","first-page":"215","article-title":"Discrimination reaction time for a 1023 alternate task","volume":"66","author":"Siebel R.","year":"1963","unstructured":"Siebel , R. 1963 . Discrimination reaction time for a 1023 alternate task . J. Exper. Psychol. 66 , 3, 215 -- 226 . Siebel, R. 1963. Discrimination reaction time for a 1023 alternate task. J. Exper. Psychol. 66, 3, 215--226.","journal-title":"J. Exper. Psychol."},{"key":"e_1_2_1_46_1","unstructured":"Trujillo-Ortiz A. Hernandez-Walls R. Castro-Perez A. and Barba-Rojo K. 2006. MOUTLIER1: Detection of outlier in multivariate samples test. http:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/12252-moutlier1. Trujillo-Ortiz A. Hernandez-Walls R. Castro-Perez A. and Barba-Rojo K. 2006. MOUTLIER1: Detection of outlier in multivariate samples test. http:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/12252-moutlier1."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518099"},{"key":"e_1_2_1_48_1","unstructured":"Whitman M. and Mattord H. 2005. Principles of Information Security 2nd Ed. Course Technology Boston MA. Whitman M. and Mattord H. 2005. Principles of Information Security 2nd Ed. Course Technology Boston MA."},{"key":"e_1_2_1_49_1","first-page":"407","article-title":"Multivariate statistical outliers","volume":"25","author":"Wilks S. S.","year":"1963","unstructured":"Wilks , S. S. 1963 . Multivariate statistical outliers . Sankhya, Series A25 , 407 -- 426 . Wilks, S. S. 1963. Multivariate statistical outliers. Sankhya, Series A25, 407--426.","journal-title":"Sankhya, Series"},{"volume-title":"Proceedings of the Annual Meeting of the American Statistical Association.","author":"Yang S. S.","key":"e_1_2_1_50_1","unstructured":"Yang , S. S. and Lee , Y . 1987. Identification of a multivariate outlier . In Proceedings of the Annual Meeting of the American Statistical Association. Yang, S. S. and Lee, Y. 1987. Identification of a multivariate outlier. In Proceedings of the Annual Meeting of the American Statistical Association."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.02.004"}],"container-title":["Journal of Data and Information Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1891879.1891884","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1891879.1891884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:40Z","timestamp":1750244380000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1891879.1891884"}},"subtitle":["Impact of Human Learning on Performance Quality"],"short-title":[],"issued":{"date-parts":[[2011,2]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["10.1145\/1891879.1891884"],"URL":"https:\/\/doi.org\/10.1145\/1891879.1891884","relation":{},"ISSN":["1936-1955","1936-1963"],"issn-type":[{"type":"print","value":"1936-1955"},{"type":"electronic","value":"1936-1963"}],"subject":[],"published":{"date-parts":[[2011,2]]},"assertion":[{"value":"2009-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}