User psychology vital for biometric success

September 2001 Access Control & Identity Management

Biometrics is becoming increasingly popular as a secure and reliable alternative to password systems. However, user psychology must be taken into account when implementing such biometric systems.

This is according to Rhys Taylor, Director of Pretoria-based PreWorX, who cautions that while there are undeniable benefits to be had through the implementation and use of biometric systems, these benefits can be eroded if there is inconsistent use of these systems due to lack of user buy-in and commitment. The move away from password-based security in favour of fingerprint recognition systems is being led by financial institutions, healthcare organisations, military and government agencies, says Taylor.

"They realise that eliminating employees' needs to maintain and update passwords saves time and money for the business. However, if users are not happy about using biometric devices, they are not likely to be consistent in using them, potentially producing a much higher than average error rate. Conversely, if users are intrigued by, and enthusiastic about, using them, they are likely to use them as intended, be more consistent and the business will enjoy relatively low error rates."

Biometrics describes automated methods of establishing someone's identity from their unique physiological or behavioural characteristics. Biometrics finger scanning involves an electronic reading of a finger to create a template against which future verifications are made.

Taylor says there can also be users who have no particular bias against biometrics, but they are nervous about using such devices: users who experience physical difficulty in using them; badly trained users; those who have a poor reference template; and those who are by nature intolerant of change.

User psychology and biometrics

"Users' temperaments, understanding and current state of mind can have a dramatic impact on real system performance," he notes. Taylor adds that 'user psychology and biometrics' as a topic is seldom considered, but it should be factored into the design and implementation of biometric systems. "One should aim for well educated users who have good quality reference templates and who are happy with the overall concept and its benefits - people who will have received proper and comprehensive training in the use of the biometric system.

"The larger the user base, the more important this becomes as the instances of 'unusual' requirements or misunderstandings increase." Taylor advises that in some public applications, such as prison visitor or benefit payment systems, there are tangible and immediate benefits to users in operating a biometric system correctly - moreover they are required to do so by the authorities. In these situations there are users who want to be verified correctly, and who may accept a methodology they would not do elsewhere. However, in corporate environments where users may have a choice in using the system, companies need to strive to make it an interesting experience, coupled with clearly defined and communicated user benefits.

In conclusion, Taylor says users should therefore be the primary focus of the system design - not the technology. "Users must be taken into account at each stage of the process and their requirements and operating experience must be carefully considered."

For further details contact Rhys Taylor, PreWorX on tel: (012) 804 0080, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...