Odour User Interface for Authentication: Possibility and Acceptance: Case Study
نویسندگان
چکیده
--Historically, some new technologies are faced with rejection or acceptance. So researchers developed TAM (Technology Acceptance Model). TAM depends upon the user perception of the easiness and benefits. Authentication plays an important role in our lives as we use it every day. Odour, as a biometric technique, has some important characteristics, mainly, it is faster and easier since users will be not involved with unfamiliar interfaces such as typing password, signing or even deliberate exposing some part of the body. Odour field is still under development and needs a lot of work. In spite of the few limited researches that discuss the odour as user authentication technique their results predict that it would be good tool. This brings a question about the future of odour authentication systems and using it in real world. A questionnaire was distributed to measure the acceptance of using odour as authentication system and analyzed the collect data. It is concluded that it would be successfully used in authentication systems.
منابع مشابه
Usability evaluation of the user interface in electronic prescribing systems of Iran Health Insurance Organization and Social Security Organization
Introduction: The e-prescribing system is one of the basic technologies in the health system structure which was developed with the aim of properly managing healthcare resources and services, preventing common manual prescribing errors, and increasing patient safety. Given that the user interface of e-prescribing system is considered as the main factor of user acceptance, the purpose of the pre...
متن کاملSmart City Reference Model: Interconnectivity for On-Demand User to Service Authentication
The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implement...
متن کاملOn the user acceptance of graphical passwords
In this paper we investigate options for improving the user acceptance of graphical passwords. We conducted a survey with a dual purpose. Firstly, we explored the users’ reluctance to adopt graphical passwords. Secondly, we treated the graphical password authentication process as a biometric. By doing this, we proposed a distance metric to compare the user authentication response with the right...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملInvestigating the Level of Observing the Evaluation Criteria for User Interface in library services providing to the blind and deaf users in the word
Purpose: Digital library user interfaces has a determining role in desirable performance of this kind of libraries. Digital Library service providers to the blind and deaf users will have their best performance when the users (deaf and blind users) could have a proper interaction with them. This study aims to evaluate and analyze the criteria related to user interface in digital libraries servi...
متن کامل