{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T22:52:09Z","timestamp":1689807129318},"reference-count":47,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,1]]},"abstract":"<p>This paper describes an empirical investigation of the usability of different dialogue designs for voiceprint authentication in automated telephone banking. Three strategies for voice authentication were evaluated in an experiment with 120 telephone banking end-users: 1-Factor (voiceprint authentication based on customers' utterances of their account number and sort code); 1-Factor with Challenge (1-Factor plus a randomly generated digit string); and 2-Factor (1-Factor plus secret information known only to the caller). The research suggests the 2-Factor approach is the most effective strategy in this context: results from a Likert questionnaire show it to be highly usable and it is rated highest in terms of both security and overall quality. Participants welcome the option to use voiceprint technology but the majority would prefer it to augment rather than replace existing security methods.<\/p>","DOI":"10.4018\/ijthi.2014040104","type":"journal-article","created":{"date-parts":[[2014,9,18]],"date-time":"2014-09-18T12:06:08Z","timestamp":1411041968000},"page":"59-77","source":"Crossref","is-referenced-by-count":1,"title":["Usability Evaluation of Dialogue Designs for Voiceprint Authentication in Automated Telephone Banking"],"prefix":"10.4018","volume":"10","author":[{"given":"Nancie","family":"Gunson","sequence":"first","affiliation":[{"name":"Centre for Communication Interface Research, The University of Edinburgh, Edinburgh, UK"}]},{"given":"Diarmid","family":"Marshall","sequence":"additional","affiliation":[{"name":"Centre for Communication Interface Research, The University of Edinburgh, Edinburgh, UK"}]},{"given":"Fergus","family":"McInnes","sequence":"additional","affiliation":[{"name":"Centre for Speech Technology Research, School of Informatics, The University of Edinburgh, Edinburgh, UK"}]},{"given":"Hazel","family":"Morton","sequence":"additional","affiliation":[{"name":"Centre for Communication Interface Research, The University of Edinburgh, Edinburgh, UK"}]},{"given":"Mervyn","family":"Jack","sequence":"additional","affiliation":[{"name":"Centre for Communication Interface Research, The University of Edinburgh, Edinburgh, UK"}]}],"member":"2432","reference":[{"key":"ijthi.2014040104-0","first-page":"639","article-title":"Users are not the enemy","author":"A.Adams","year":"2005","journal-title":"Security and usability"},{"key":"ijthi.2014040104-1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2009.024273"},{"key":"ijthi.2014040104-2","first-page":"1","article-title":"Psychological acceptability revisited","author":"M.Bishop","year":"2005","journal-title":"Security and usability"},{"key":"ijthi.2014040104-3","unstructured":"Business Wire. (2010). Top 3 Israeli banks roll out customer facing voice biometrics technology by Persay. Retrieved April 9, 2013, from http:\/\/www.businesswire.com\/news\/home\/20100415005768\/en\/Top-3-Israeli-Banks-Roll-Customer-Facing"},{"key":"ijthi.2014040104-4","first-page":"175","article-title":"Usable biometrics","author":"L.Coventry","year":"2005","journal-title":"Security and usability"},{"key":"ijthi.2014040104-5","doi-asserted-by":"publisher","DOI":"10.1145\/642637.642639"},{"key":"ijthi.2014040104-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2004.02.002"},{"key":"ijthi.2014040104-7","article-title":"Deja vu: A user study using images for authentication.","author":"R.Dhamija","journal-title":"Proceedings of the 9th USENIX Security Symposium"},{"key":"ijthi.2014040104-8","doi-asserted-by":"crossref","unstructured":"Dutton, R., Foster, J. C., Jack, M. A., & Stentiford, F. (1993, September 22-25). Identifying usability attributes of automated telephone services. Paper presented at the Third European Conference on Speech Communication and Technology, Berlin, Germany.","DOI":"10.21437\/Eurospeech.1993-312"},{"key":"ijthi.2014040104-9","unstructured":"Flare-design. (2013). Voice biometrics at Barclays Bank. Retrieved April 9, 2013, from http:\/\/flare-design.com.au\/voice-biometrics-at-barclays-bank\/"},{"key":"ijthi.2014040104-10","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837124"},{"key":"ijthi.2014040104-11","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280703"},{"key":"ijthi.2014040104-12","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408666"},{"key":"ijthi.2014040104-13","unstructured":"Gartner. (2009). Gartner consumer survey shows that barriers to online banking use continue to fall. Retrieved April 9, 2013, from http:\/\/www.gartner.com\/newsroom\/id\/1020212"},{"key":"ijthi.2014040104-14","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"ijthi.2014040104-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2010.10.001"},{"key":"ijthi.2014040104-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.001"},{"key":"ijthi.2014040104-17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-49127-9_37"},{"key":"ijthi.2014040104-18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.50"},{"key":"ijthi.2014040104-19","unstructured":"Jack, M. A., Foster, J., & Stentiford, F. (1993). Usability analysis of intelligent dialogues for automated telephone services. Paper presented at the Joint ESCA\/NATO Workshop on Applications of Speech Technology."},{"key":"ijthi.2014040104-20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ijthi.2014040104-21"},{"key":"ijthi.2014040104-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.10.001"},{"key":"ijthi.2014040104-23","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143129"},{"key":"ijthi.2014040104-24","unstructured":"Larsen, L. B. (1999). Combining objective and subjective data in evaluation of spoken dialogues. Paper presented at the ESCA Tutorial and Research Workshop (ETRW) on Interactive Dialogue in Multi-Modal Systems."},{"key":"ijthi.2014040104-25","doi-asserted-by":"crossref","unstructured":"Larsen, L. B. (2003). Assessment of spoken dialogue system usability-what are we really measuring? Paper presented at the Eighth European Conference on Speech Communication and Technology.","DOI":"10.21437\/Eurospeech.2003-286"},{"key":"ijthi.2014040104-26","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC1304_01"},{"key":"ijthi.2014040104-27","first-page":"140","article-title":"A technique for the measurement of attitudes.","author":"R.Likert","year":"1932","journal-title":"Archives de Psychologie"},{"key":"ijthi.2014040104-28","unstructured":"Love, S., Dutton, R., Foster, J., & Jack, M. (1992). Towards a usability measure for automated telephone services. Paper presented at the Institute of Acoustics Speech and Hearing Workshop."},{"key":"ijthi.2014040104-29","first-page":"241","author":"A.Martin","year":"2005","journal-title":"The NIST speaker recognition evaluation program. Biometric Systems"},{"key":"ijthi.2014040104-30","doi-asserted-by":"crossref","unstructured":"Morgen, B. (2012). Voice biometrics for customer authentication. Biometric Technology Today, 2012(2), 8-11.","DOI":"10.1016\/S0969-4765(12)70054-1"},{"key":"ijthi.2014040104-31","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2009.07.002"},{"key":"ijthi.2014040104-32","unstructured":"National Australia Bank Limited. (2013). What is speech security? Retrieved April 9, 2013, from http:\/\/www.nab.com.au\/wps\/wcm\/connect\/nab\/nab\/home\/Personal_Finance\/21\/Speech+Security\/?ncID=ZBA"},{"key":"ijthi.2014040104-33","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"ijthi.2014040104-34","doi-asserted-by":"publisher","DOI":"10.4018\/jthi.2013010106"},{"key":"ijthi.2014040104-35","first-page":"319","article-title":"Usability and trust in informations systems","author":"A.Sasse","year":"2005","journal-title":"Introduction: Trust and crime in information societies"},{"key":"ijthi.2014040104-36","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"ijthi.2014040104-37","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.57"},{"key":"ijthi.2014040104-38","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2004.11.007"},{"key":"ijthi.2014040104-39"},{"key":"ijthi.2014040104-40","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2006.01.004"},{"key":"ijthi.2014040104-41","doi-asserted-by":"publisher","DOI":"10.1108\/09685220810908813"},{"key":"ijthi.2014040104-42","doi-asserted-by":"crossref","unstructured":"Wagner, M., Summerfield, C., Dunstone, T., Summerfield, R., & Moss, J. (2006). An evaluation of \u201ccommercial off-the-shelf\u201d speaker verification systems. Paper presented at the Odyssey Speaker Recognition Workshop.","DOI":"10.1109\/ODYSSEY.2006.248085"},{"key":"ijthi.2014040104-43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.09.008"},{"key":"ijthi.2014040104-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.10.001"},{"key":"ijthi.2014040104-45","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.020142"},{"key":"ijthi.2014040104-46","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"}],"container-title":["International Journal of Technology and Human Interaction"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=115216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T16:53:55Z","timestamp":1689526435000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijthi.2014040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijthi.2014040104","relation":{},"ISSN":["1548-3908","1548-3916"],"issn-type":[{"value":"1548-3908","type":"print"},{"value":"1548-3916","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}