Understanding user perceptions of transparent authentication on a mobile device

Crawford, Heather and Renaud, Karen (2014) Understanding user perceptions of transparent authentication on a mobile device. Journal of Trust Management, 1 (1). pp. 1-28. 7. (https://doi.org/10.1186/2196-064X-1-7)

[thumbnail of Crawford-Renaud-JTM2014-Understanding-user-perceptions-transparent-authentication-mobile-device]
Preview
Text. Filename: Crawford_Renaud_JTM2014_Understanding_user_perceptions_transparent_authentication_mobile_device.pdf
Final Published Version
License: Creative Commons Attribution 2.5 logo

Download (892kB)| Preview

Abstract

Due to the frequency with which smartphone owners use their devices, effortful authentication methods such as passwords and PINs are not an effective choice for smartphone authentication. Past research has offered solutions such as graphical passwords, biometrics and password hardening techniques. However, these solutions still require the user to authenticate frequently, which may become increasingly frustrating over time. Transparent authentication has been suggested as an alternative to such effortful solutions. It utilizes readily available behavioral biometrics to provide a method that runs in the background without requiring explicit user interaction. In this manner, transparent authentication delivers a less effortful solution with which the owner does not need to engage as frequently. We expand the current research into transparent authentication by surveying the user, an important stakeholder, regarding their opinions towards transparent authentication on a smartphone. We asked 30 participants to complete a series of tasks on a smartphone that was ostensibly protected with varying degrees of transparent authentication. We then surveyed participants regarding their opinions of transparent authentication, their opinions of the sensitivity of tasks and data on smartphones, and their perception of the level of protection provided to the data and apps on the device. We found that 90% of those surveyed would consider using transparent authentication on their mobile device should it become available. Furthermore, participants had widely varying opinions of the sensitivity of the experiment’s tasks, showing that a more granular method of smartphone security is justified. Interestingly, we found that the complete removal of security barriers, which is commonly cited as a goal in authentication research, does not align with the opinions of our participants. Instead, we found that having a few barriers to device and data access aided the user in building a mental model of the on-device security provided by transparent authentication. These results provide a valuable understanding to inform development of transparent authentication on smartphones since they provide a glimpse into the needs and wants of the end user.