Role of Usability on using Biometrics for Cybersecurity

  • Yasser Hausawi Assistant Professor



Biometrics are traits that allow individuals to be identified. Popular biometrics include fingerprints, faces, and irides. A common use of biometric systems is for authentication of users desiring access to a system or resource. However, the use of biometrics presents challenges and opportunities unique to other authentication methods, such as passwords and tokens. Biometric systems are also vulnerable to poor usability. Such systems must be engineered with wide user accessibility and acceptability in mind, but must still provide robust security as well. As lack of usability causes systems' failures, and enhancing systems' usability reduces such failures. This article first presents an overview of biometric systems employed today, including their usage and security merits. We then consider the specific role usability plays on both the development and long-term utility of biometric systems used for Cybersecurity.


(1) Mayron, L. M and Hausawi, Y and Bahr, G. S., “Secure, usable biometric authentication systems, International Conference on Universal Access in Human-Computer Interaction, Springer, p. 195—204 (2013)

(2) Toledano, D.T. and Fernndez Pozo, R. and Hernndez Trapote, and Hernndez Gmez, L, “Usability evaluation of multi-modal biometric verification systems”, Interacting with Computers, v. 18, no. 5, Elsevier, p. 1101--1122, (2006)

(3) Al-Harby, F. and Qahwaji, R. and Kamala, M., “UsersÕ Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model”, Networked Digital Technologies, Springer, p. 254—258 (2010)

(4) Jain, A.K. and Ross, A.A. and Nandakumar, K., “Introduction to biometrics “, Springer (2011)

(5) Braz, C. and Robert, J.M., “Security and usability: the case of the user authentication methods”, Proceedings of the 18th International Conference of the Association Francophone d'Interaction Homme-Machine, ACM, p. 199—203 (2006)

(6) Cranor, L.F. and Garfinkel, S, “Guest Editors' Introduction: Secure or Usable? “, Security and Privacy, IEEE, v. 2, no. 5, p. 16—18, (2004)

(7) Kumar, N, “Password in practice: a usability study”, Journal of Global Research in Computer Science, v. 2, no. 5, p. 107--112, (2011)

(8) Sasse, M.A. and Brostoff, S. and Weirich, D, “Transforming the Ôweakest linkÕÑa human-computer interaction approach to usable and effective security”, BT technology journal, Springer, v. 19, no. 3, p. 122--131, (2001)

(9) Riley, C. and Buckner, K. and Johnson, G. and Benyon, D, “Culture & biometrics: regional differences in the perception of biometric authentication technologies”, AI and society, v. 24, no. 3, Springer, p. 295--306, (2009)

(10) Fernandez-Saavedra, B. and Alonso-Moreno, R. and Uriarte-Antonio, J. and Sanchez-Reillo, R, “Evaluation methodology for analyzing usability factors in biometrics “, Aerospace and Electronic Systems Magazine, IEEE, v. 25, no. 8, p. 20—31, (2010)

(11) Kukula, E.P. and Sutton, M.J. and Elliott, S.J, “The Human-Biometric-Sensor Interaction Evaluation Method: Biometric Performance and Usability Measurements”, Instrumentation and Measurement, IEEE Transactions on, v. 59, no. 4, p. 784--791, (2010)

(12) Hausawi, Y. M,. "Towards a Usable-Security Engineering Framework for Enhancing Software Development" Florida Institute of Technology (2015)

(13) Sasse, M.A, “Computer security: Anatomy of a usability disaster, and a plan for recovery”, Proceedings of CHI 2003 Workshop on HCI and Security Systems, Citeseer (2003)

(14) Patrick, A.S, “Usability and acceptability of biometric security systems”, Lecture Notes in Computer Science, SPRINGER-VERLAG, p. 105--105, (2004)

(15) Garfinkel, S, “Design principles and patterns for computer systems that are simultaneously secure and usable” Massachusetts Institute of Technology (2005)

(16) Ferreira, A. and Rusu, C. and Roncagliolo, S, “Usability and security patterns “, Advances in Compu ter-Human Interactions, 2009. ACHI'09. Second International Conferences on IEEE, p. 301--305, (2009)

(17) Whitten, A. and Tygar, J.D, “Why Johnny canÕt encrypt: A usability evaluation of PGP 5.0”,

Proceedings of the 8th USENIX Security Symposium,McGraw-Hill, v. 99 , (1999)

(18) Van Der Geest, Thea M and Buimer, Hendrik P, “User-centered priority setting for accessible devices and applications”, Mensch & Computer Workshop band , (2015)

(19) Mahfouz, Ahmed and Mahmoud, Tarek M and Eldin, Ahmed Sharaf, “A survey on behavioral biometric authentication on smartphones”, Journal of information security and applications , (2017)