2021
DOI: 10.3390/jcp1040036
|View full text |Cite
|
Sign up to set email alerts
|

Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach

Abstract: Smartphone user authentication based on passwords, PINs, and touch patterns raises several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) technologies provide a promising solution which can increase smartphone security and mitigate users’ concerns. Until now, research in BBCA technologies has mainly focused on developing novel behavioral biometrics continuous authentication systems and their technical characteristics, overlooking users’ attitudes towards BBCA. To address this gap, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 95 publications
0
4
0
Order By: Relevance
“…The study also revealed differences in users' security requirements for different mobile applications, but it disregarded correlations to users' willingness to use CAuthN. The study by Skalkos et al [86] surveyed attitudes toward CAuthN of 778 users from the U.S. in a smartphone context. They found that privacy concerns had little to moderate effect on users' appraisals of the degree and likelihood of harm from the use of biometric systems.…”
Section: User Perceptionsmentioning
confidence: 99%
“…The study also revealed differences in users' security requirements for different mobile applications, but it disregarded correlations to users' willingness to use CAuthN. The study by Skalkos et al [86] surveyed attitudes toward CAuthN of 778 users from the U.S. in a smartphone context. They found that privacy concerns had little to moderate effect on users' appraisals of the degree and likelihood of harm from the use of biometric systems.…”
Section: User Perceptionsmentioning
confidence: 99%
“…In addition, Crossler et al (2013) argued that cyberspace self-protection research addresses primarily users in organizational settings as an important component of guaranteeing data security within organizations. Moreover, researchers have adapted the PMT to comprehend individual behaviors regarding the performance of several security measures (Dinev and Hu, 2007; Lee and Larsen, 2009; Johnston and Warkentin, 2010; Liang and Xue, 2010; Skalkos et al , 2021). As a matter of fact, Haag et al (2021) systematically presented and reviewed 67 PMT studies in the field of IS security and they compared their results with the application of PMT in psychology.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…personality variables, prior experience) that lead to the cognitive mediating processes categorized as threat appraisal and coping appraisal, which determines adaptive (to protect self/others) or maladaptive (not to protect) coping modes (Floyd et al, 2000;Rogers, 1975). PMT is an important framework for studying the role of influential factors such as privacy concerns, trust in technology or personal innovativeness in building behavioral intention toward the adoption of IoT devices and their subsequent usage (Skalkos et al, 2021;AlHogail, 2018). Threat appraisal is based on how severe the threat is and the possibility of its actual occurrence.…”
Section: Ics 305mentioning
confidence: 99%