{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T11:11:32Z","timestamp":1756897892822,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,16]],"date-time":"2022-11-16T00:00:00Z","timestamp":1668556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,16]]},"DOI":"10.1145\/3565494.3565498","type":"proceedings-article","created":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T23:11:06Z","timestamp":1672096266000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Understanding User Perspective in a University Setting to Improve Biometric Authentication Adoption"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6151-2665","authenticated-orcid":false,"given":"Aubrey","family":"Patrick","sequence":"first","affiliation":[{"name":"University of Denver, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6910-2967","authenticated-orcid":false,"given":"Andy","family":"Burris","sequence":"additional","affiliation":[{"name":"University of Denver, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"University of Denver, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8416-1415","authenticated-orcid":false,"given":"Naheem","family":"Noah","sequence":"additional","affiliation":[{"name":"University of Denver, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,12,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Masked face recognition for secure authentication. arXiv preprint arXiv:2008.11104 1","author":"Anwar Aqeel","year":"2020","unstructured":"Aqeel Anwar and Arijit Raychowdhury . 2020. Masked face recognition for secure authentication. arXiv preprint arXiv:2008.11104 1 ( 2020 ), 1\u20138. Aqeel Anwar and Arijit Raychowdhury. 2020. Masked face recognition for secure authentication. arXiv preprint arXiv:2008.11104 1 (2020), 1\u20138."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.004"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23003"},{"key":"e_1_3_2_1_4_1","unstructured":"Aleksandar Brankovi\u0107. 2020. How biometrics provide an amazing UX but fail too often. https:\/\/www.ipification.com\/blog\/how-biometrics-provide-an-amazing-ux-but-fail-too-often\/  Aleksandar Brankovi\u0107. 2020. How biometrics provide an amazing UX but fail too often. https:\/\/www.ipification.com\/blog\/how-biometrics-provide-an-amazing-ux-but-fail-too-often\/"},{"key":"e_1_3_2_1_5_1","first-page":"52","article-title":"A Risk Analysis Approach for Biometric Authentication","volume":"2","author":"Br\u00f6mme Arslan","year":"2006","unstructured":"Arslan Br\u00f6mme . 2006 . A Risk Analysis Approach for Biometric Authentication Technology.Int. J. Netw. Secur. 2 , 1 (2006), 52 \u2013 63 . Arslan Br\u00f6mme. 2006. A Risk Analysis Approach for Biometric Authentication Technology.Int. J. Netw. Secur. 2, 1 (2006), 52\u201363.","journal-title":"Technology.Int. J. Netw. Secur."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2018.8406648"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2019.2897801"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2012.36"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_9"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting. SAGE Publications Sage CA: Los Angeles, CA, HFES, Online, 461\u2013464","author":"Das Sanchari","year":"2020","unstructured":"Sanchari Das , Robert\u00a0 S Gutzwiller , Rod\u00a0 D Roscoe , Prashanth Rajivan , Yang Wang , L Jean\u00a0Camp , and Roberto Hoyle . 2020 . Humans and technology for inclusive privacy and security . In Proceedings of the Human Factors and Ergonomics Society Annual Meeting. SAGE Publications Sage CA: Los Angeles, CA, HFES, Online, 461\u2013464 . Sanchari Das, Robert\u00a0S Gutzwiller, Rod\u00a0D Roscoe, Prashanth Rajivan, Yang Wang, L Jean\u00a0Camp, and Roberto Hoyle. 2020. Humans and technology for inclusive privacy and security. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting. SAGE Publications Sage CA: Los Angeles, CA, HFES, Online, 461\u2013464."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 54th Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences","author":"Das Sanchari","year":"2020","unstructured":"Sanchari Das , Andrew Kim , Ben Jelen , Lesa Huber , and L\u00a0Jean Camp . 2020 . Non-inclusive online security: older adults\u2019 experience with two-factor authentication . In Proceedings of the 54th Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences , Honolulu, Hawaii. Sanchari Das, Andrew Kim, Ben Jelen, Lesa Huber, and L\u00a0Jean Camp. 2020. Non-inclusive online security: older adults\u2019 experience with two-factor authentication. In Proceedings of the 54th Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, Honolulu, Hawaii."},{"volume-title":"Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201919). WAY","author":"Das Sanchari","key":"e_1_3_2_1_12_1","unstructured":"Sanchari Das , Andrew Kim , Ben Jelen , Joshua Streiff , L.\u00a0 Jean Camp , and Lesa Huber . 2019. Towards Implementing Inclusive Authentication Technologies for Older Adults . In Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201919). WAY , Santa Clara , California, USA , 1\u20135. Sanchari Das, Andrew Kim, Ben Jelen, Joshua Streiff, L.\u00a0Jean Camp, and Lesa Huber. 2019. Towards Implementing Inclusive Authentication Technologies for Older Adults. In Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201919). WAY, Santa Clara, California, USA, 1\u20135."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the Ageing Populations-Addressing Global Challenges. ACM, Virtual.","author":"Das Sanchari","year":"2020","unstructured":"Sanchari Das , Andrew Kim , Ben Jelen , Joshua Streiff , L\u00a0Jean Camp , and Lesa Huber . 2020 . Why Don\u2019t Older Adults Adopt Two-Factor Authentication? . In Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the Ageing Populations-Addressing Global Challenges. ACM, Virtual. Sanchari Das, Andrew Kim, Ben Jelen, Joshua Streiff, L\u00a0Jean Camp, and Lesa Huber. 2020. Why Don\u2019t Older Adults Adopt Two-Factor Authentication?. In Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the Ageing Populations-Addressing Global Challenges. ACM, Virtual."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC48465.2019.00043"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025991"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167996.3167997"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA","author":"Das Sanchari","year":"2019","unstructured":"Sanchari Das , Bingxing Wang , Zachary Tingle , and L\u00a0Jean Camp . 2019 . Evaluating User Perception of Multi-Factor Authentication: A Systematic Review . In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019). arxiv, Nicosia, Cyprus, 10\u00a0pages. Sanchari Das, Bingxing Wang, Zachary Tingle, and L\u00a0Jean Camp. 2019. Evaluating User Perception of Multi-Factor Authentication: A Systematic Review. In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019). arxiv, Nicosia, Cyprus, 10\u00a0pages."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3539011"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0075-6"},{"key":"e_1_3_2_1_21_1","volume-title":"CGD NOTES 2020(2019)","author":"Gelb Alan","year":"2019","unstructured":"Alan Gelb and Anit Mukherjee . 2019 . Building on digital ID for inclusive services: lessons from India . CGD NOTES 2020(2019) , 1\u201310. Alan Gelb and Anit Mukherjee. 2019. Building on digital ID for inclusive services: lessons from India. CGD NOTES 2020(2019), 1\u201310."},{"key":"e_1_3_2_1_22_1","volume-title":"Mobile Twin Recognition. In 2020 IEEE International Joint Conference on Biometrics (IJCB). IEEE, IEEE","author":"Gnatyuk Vitaly","year":"2020","unstructured":"Vitaly Gnatyuk and Alena Moskalenko . 2020 . Mobile Twin Recognition. In 2020 IEEE International Joint Conference on Biometrics (IJCB). IEEE, IEEE , Texas, USA, 1\u20139. Vitaly Gnatyuk and Alena Moskalenko. 2020. Mobile Twin Recognition. In 2020 IEEE International Joint Conference on Biometrics (IJCB). IEEE, IEEE, Texas, USA, 1\u20139."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2466\/pms.1974.39.1.109"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDSW.2016.13"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the Tenth USENIX Conference on Usable Privacy and Security","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach , Emanuel Von\u00a0Zezschwitz , Andreas Fichtner , Alexander De\u00a0Luca , and Matthew Smith . 2014 . It\u2019s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception . In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security ( Menlo Park, CA) (SOUPS \u201914). USENIX Association, USA, 213\u2013230. Marian Harbach, Emanuel Von\u00a0Zezschwitz, Andreas Fichtner, Alexander De\u00a0Luca, and Matthew Smith. 2014. It\u2019s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (Menlo Park, CA) (SOUPS \u201914). USENIX Association, USA, 213\u2013230."},{"key":"e_1_3_2_1_26_1","unstructured":"Marian Harbach Emanuel Zezschwitz Andreas Fichtner Alexander De\u00a0Luca and Matthew Smith. 2014. It\u2019s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In SOUPS. ACM California USA.  Marian Harbach Emanuel Zezschwitz Andreas Fichtner Alexander De\u00a0Luca and Matthew Smith. 2014. It\u2019s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In SOUPS. ACM California USA."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280704"},{"key":"e_1_3_2_1_28_1","volume-title":"2011 Fifth international conference on innovative mobile and internet services in ubiquitous computing. IEEE, IEEE, Korean Bible University (KBU)","author":"Hirth Matthias","year":"2011","unstructured":"Matthias Hirth , Tobias Ho\u00dffeld , and Phuoc Tran-Gia . 2011 . Anatomy of a crowdsourcing platform-using the example of microworkers. com . In 2011 Fifth international conference on innovative mobile and internet services in ubiquitous computing. IEEE, IEEE, Korean Bible University (KBU) , Seoul, Korea, 322\u2013329. Matthias Hirth, Tobias Ho\u00dffeld, and Phuoc Tran-Gia. 2011. Anatomy of a crowdsourcing platform-using the example of microworkers. com. In 2011 Fifth international conference on innovative mobile and internet services in ubiquitous computing. IEEE, IEEE, Korean Bible University (KBU), Seoul, Korea, 322\u2013329."},{"key":"e_1_3_2_1_29_1","first-page":"2017","article-title":"Empathize an Identical Twins using Face Recognition","volume":"12","author":"Jayanthi S","year":"2017","unstructured":"S Jayanthi , S Sivakumar , and R Murugesan . 2017 . Empathize an Identical Twins using Face Recognition . International Journal of Computational and Applied Mathematics 12 , 1(2017), 2017 . S Jayanthi, S Sivakumar, and R Murugesan. 2017. Empathize an Identical Twins using Face Recognition. International Journal of Computational and Applied Mathematics 12, 1(2017), 2017.","journal-title":"International Journal of Computational and Applied Mathematics"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_16"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41939-019-00049-y"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/NUiCONE.2013.6780190"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2885276"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3859056"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.133"},{"volume-title":"Computer and network security essentials","author":"Masala L","key":"e_1_3_2_1_36_1","unstructured":"Giovanni\u00a0 L Masala , Pietro Ruiu , and Enrico Grosso . 2018. Biometric authentication and data security in cloud computing . In Computer and network security essentials . Springer , Athens , 337\u2013353. Giovanni\u00a0L Masala, Pietro Ruiu, and Enrico Grosso. 2018. Biometric authentication and data security in cloud computing. In Computer and network security essentials. Springer, Athens, 337\u2013353."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSN.2016.7823994"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2017-0020"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcce.2021.10.001"},{"key":"e_1_3_2_1_41_1","unstructured":"Help\u00a0Net Security. 2021. Combating deepfakes: How we can future-proof our biometric identities. https:\/\/www.helpnetsecurity.com\/2021\/07\/20\/combating-deepfakes\/  Help\u00a0Net Security. 2021. Combating deepfakes: How we can future-proof our biometric identities. https:\/\/www.helpnetsecurity.com\/2021\/07\/20\/combating-deepfakes\/"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300381"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2010.5514556"}],"event":{"name":"MexIHC '22: Mexican International Conference on Human-Computer Interaction","acronym":"MexIHC '22","location":"Virtual Event Mexico"},"container-title":["Proceedings of the 9th Mexican International Conference on Human-Computer Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3565494.3565498","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3565494.3565498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:50Z","timestamp":1750182530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3565494.3565498"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,16]]},"references-count":43,"alternative-id":["10.1145\/3565494.3565498","10.1145\/3565494"],"URL":"https:\/\/doi.org\/10.1145\/3565494.3565498","relation":{},"subject":[],"published":{"date-parts":[[2022,11,16]]},"assertion":[{"value":"2022-12-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}