FULLTEXT01
FULLTEXT01
Biometric systems have become increasingly popular for user authentication and
identification across various domains, including smartphones, laptops, financial ser-
vices, healthcare, and security. These systems offer enhanced security and quick
access to data, aiming to address the challenges associated with passwords and pins.
However, achieving a method that provides a 100% guarantee in all fields and for all
devices remains a challenge. To explore user perceptions on the acceptance of bio-
metric systems, an online survey was conducted with 99 participants from diverse
backgrounds, education levels, ages, and countries. The survey focused on under-
standing users’ acceptance of biometric systems based on their experiences and per-
spectives. Additionally, it aimed to investigate whether demographic factors, such
as age, education, and background, influence user acceptance. The study also com-
pared the preferred authentication technique among users with findings from previ-
ous studies. The survey results supported previous research, showing that fingerprint
technology is the most recommended and preferred method for user authentication,
followed by facial recognition. This study sheds light on the growing adoption of
biometric systems to overcome password-related issues and provides valuable in-
sights into user preferences for authentication and identification methods.
Keywords: Biometrics Acceptance, Authentication Techniques, User Prefer-
ences, Preferred Techniques, User Experiences, User Perception.
Preface
Undertaking this degree project has been a remarkable journey that has allowed us to
delve into the integration testing domain for complex software systems. We are grateful
to Volvo CE for the opportunity to undertake this thesis project.
I extend my heartfelt gratitude to my supervisor for his unwavering guidance and invalu-
able feedback throughout this project. His expertise and support have been instrumental
in navigating through this endeavor, and I am truly grateful for his responsiveness to my
queries and continuous assurance that we were moving in the right direction.
My sincere thanks also go to the survey participants, whose generous contribution of time
and insights enriched the content of my thesis. Last but not least, I am deeply appreciative
of my family, friends, and all those who have stood by me, offering unwavering support
and encouragement throughout this journey.
Finally, I would like to thank my family, friends, and all who supported me encouraged
me, and always been there for me.
Contents
1 Introduction 1
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Problem formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.5 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.6 Scope/Limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.7 Target group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.8 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2 Method 10
2.1 Research Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2 Reliability and Validity . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.3 Ethical Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3 Research project 15
3.1 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.2 Biometric Authentication Methods (Existing literature reviews) . . . . . . 15
3.2.1 Recognition Types . . . . . . . . . . . . . . . . . . . . . . . . . 16
4 Results 25
4.1 Research Question 1: Are biometric systems for authentication accepted
differently based on demographic characteristics? . . . . . . . . . . . . . 25
4.1.1 Age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.1.2 Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.2 Research Question 2: Do users consider/perceive biometric systems as
secure for authentication? . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.3 Research Question 3: Based on the survey, which type of authentication
provides the best user experience and perspective? . . . . . . . . . . . . . 28
4.4 Evaluation of Common Biometrics Based on Users’ Experiments . . . . . 32
4.5 Acceptance and Most Used Biometric Systems Based on Users’ Perceptions 32
5 Analysis 34
6 Discussion 36
References 41
A Appendix: Survey Questions and Results 44
1
1.1 Background
"Biometric recognition systems should provide a reliable personal recognition scheme
to either confirm or determine the identity of an individual. The system can include
computer systems security, secure electronic banking, mobiles, credit cards, ATMs, and
secure access to buildings, health, and services.
Numerous biometric authentication methods are now employed to ensure secure ac-
cess to private data. These applications find use in diverse fields, including mobile phones,
ATMs, computers, hospitals, banks, and building access. Commercially available biomet-
ric methods like face recognition, iris recognition, fingerprint scanning, hand geometry,
and voice recognition are already used [1].
Among these methods, fingerprint authentication stands out as one of the most widely
used and secure options, implemented in smartphones, passports, airports, computers,
and ATMs. In today’s technologically advanced era, biometric authentication has be-
come an essential tool for protecting users’ sensitive data. While traditional single-factor
authentication, like username and password, is common, it is considered weak. To en-
hance security, two-factor, or multi-factor authentication options, such as fingerprint or
face recognition along with SMS verification, are gaining popularity [3].
To explore the most preferred biometric authentication methods in various fields, in-
cluding mobile phones, computers, etc, a study will be conducted. This study will involve
surveying users to understand their preferences, reasons for feeling secure with certain
biometric systems, and the potential impacts of these techniques. The findings of the sur-
vey will be compared with previous studies to gain a comprehensive understanding of the
topic [4] [2] [5] [6].
Research Questions:
3. Based on the survey, which type of authentication provides the best user experience
and perspective?
By examining the survey responses, we can identify the authentication method that
received the highest preference or satisfaction ratings among the participants.
2
1.2 Related Work
Here you briefly describe what others have done in the field of study or how My research
aims to identify the most commonly used, high-performing, and reliable authentication
methods from the user’s perspective, considering their demographic characteristics and
acceptance of these systems.
The related work section of this paper provides a summary of relevant studies, includ-
ing "Acceptance of Biometrics System for User Authentication and Identification," which
will be compared with my research based on a survey of public beliefs.
A survey conducted by Waheeda Almayyan in December 2019; it was found that the
younger generation in Kuwait showed relatively high acceptance of biometrics. However,
some participants expressed concerns about the potential misuse of biometric data, health
risks, and unauthorized access to information. The survey also highlighted fingerprints as
the most widely accepted and favored biometric method [7].
Another survey conducted by Fletcher, James, and others in May 2017, revealed that
around 74 % of participants accepted or adopted biometric systems for identification and
authentication [8]. The survey consisted of 414 participants, of which 86 % had com-
pleted 2-4 years of university education, and many of the participants accepting biometric
systems fell within the age range of 18-40 years. There was no significant difference be-
tween males and females in terms of accepting biometric systems for authentication. The
preference for fingerprint identification was attributed to its widespread availability and
familiarity on smartphones and computers [8].
In May 2019 O. Buckley & Jason R. published a survey analyzing public perceptions
of acceptance of biometric systems. This indicated that participants had a strong level
of awareness and acceptance of specific biometric methods like fingerprint technology
and face recognition, due to their wide usage in various devices and applications. The
survey also showed that participants under the age of 45 exhibited higher acceptance and
awareness of biometric methods, while education level correlated positively with accep-
tance [9]. The majority of the participants (83 %) were under the age of 45. This age
3
group tends to be more tech-savvy and familiar with emerging technologies, which could
explain their higher acceptance and awareness of biometric methods. Furthermore, the
survey indicated that 67 % of the participants had a bachelor’s degree, suggesting a cor-
relation between education level and acceptance of biometric systems. Higher education
might contribute to a better understanding of the underlying technology and its benefits,
leading to increased acceptance [9].
In November 2022, Kitsiou and others conducted a study in Greece to understand how
demographic and social factors affect individuals’ acceptance of biometric systems. The
study revealed that participants of the 18–22 age group had a higher level of familiarity
and adoption with fingerprint (52 %) and face recognition (50 %) techniques compared to
other age groups and that most participants were willing to replace passwords with finger-
printing, indicating the significance of age in the acceptance of biometric systems [10].
The education level influences the adoption and acceptance of biometric systems. Ap-
proximately (85 %) of participants indicated that biometric systems, in general, have made
their daily lives much easier. This positive perception reflects the convenience and effi-
ciency that biometric systems bring to daily tasks. However, 15 % of participants ex-
pressed opposition, indicating that some individuals may have reservations or concerns
about biometric systems [10]. In terms of gender, women rely on biometric systems more
than men based primarily on the uniqueness of their biometric information, and women
have difficulties remembering passwords more than men.
A study conducted by A. S. Tolba, A.H. El-Baz, and A.A. El-Harby In 2006 high-
lighted the challenges faced by face recognition in specific domains, such as pose and
illumination changes, while acknowledging its widespread usage in smartphones, com-
puters, and other fields. Although face recognition has an accuracy of 95 %, it still
lags behind fingerprint and iris-matching performance in current automatic face recog-
nition systems [11]. Through my survey, I have discovered unique insights that were not
present in other literature reviews. The survey was conducted in both English and Ara-
bic languages, which allowed for participation from individuals with diverse cultural and
technological backgrounds. Furthermore, I have determined the preferred technology for
authentication based on the users’ experiences and perspectives.
However, while this work has been completed, it lacks a demographic aspect based
on gender, specifically examining the perspectives of men and women separately, and the
use of two or more factor authentication.
4
1.3 Problem formulation
The challenges outlined in the "Problems / Challenges & Gaps" section align well with
the findings and insights derived from the "Related work" section provided earlier. Let’s
delve into how these challenges reflect from the related work:
1. Weak or reused passwords: It is normal for most users to forget passwords, espe-
cially if the person has many accounts. According to the results of my study, the
majority of the participants agree and strongly agree that using weak or repeated
passwords for more than one account makes the data easy to hack.
In addition, the observation of participants in the related work section expressing
concerns about weak or reused passwords corresponds directly to the challenge
presented. The study by Fletcher et al. (2017), revealed that participants resorted to
fingerprint identification due to its availability and familiarity on smartphones and
computers, potentially indicating their inclination to avoid the challenge of weak
passwords [8].
5
4. Accuracy Issues: The acknowledgment of accuracy issues in biometric systems, as
described in challenges and gaps, finds resonance in the related work Jain, Deb, and
Engelsma’s (2022) study highlighted the variations in verification accuracy among
different biometric methods, supporting the idea of potential accuracy issues [5].
Biometric systems can sometimes lead to a False Acceptance Rate (FAR) or False
Rejection Rate (FRR) which means accepting an unauthorized user as a genuine
user or rejecting the genuine user. That can happen by mistake due to several
factors such as an injured fingerprint, face, or changing the environment or age,
etc. [14] [2].
5. Single-Factor Risks: The recommendation in the related work by Allen and Ko-
mandur (2019) to use biometrics with two-factor authentication resonates with the
challenge of deploying biometrics in single-factor mode [15]. This suggestion re-
flects the industry’s awareness of the potential risks associated with single-factor
biometric authentication.
Based on the insights from literature reviews and my conducted survey, it is evident that
biometric systems are continuously evolving and improving. However, it is essential to
know there are no authentication systems that can provide a guarantee of 100 % secu-
rity [2].
The gaps in biometric authentication and traditional passwords pertain to weaknesses
and limitations in their usage for user identification. Numerous gaps have been identified
from users’ perspectives and literature review studies and biometric systems may not be
suitable for all users, especially those with disabilities or injuries. Additionally, environ-
mental factors, such as noisy surroundings, injured or wet fingerprints, wearing glasses
or lenses, and poor-quality images, can affect the accuracy and performance of biometric
systems, leading to authentication errors or rejections.
It’s essential to recognize that there are still gaps in biometric authentication technol-
ogy that need to be addressed. Ongoing research and development efforts are essential
in the field of biometric authentication to enhance security, privacy, and usability for all
users. By continuing to push the boundaries of biometric authentication, we can create a
more secure and efficient future for everyone.
6
1.4 Motivation
My study aims to investigate users’ acceptance of biometric systems for authentication
based on their perceptions and experiments while also considering demographic factors.
Additionally, I aim to identify the most preferred biometric systems for authentication
based on users’ feedback from survey questions. This will allow me to compare users’
preferences with existing literature reviews and determine which authentication technol-
ogy is the most secure and preferred.
This study is driven to understand user acceptance of biometric systems for authen-
tication by examining users’ perceptions and conducting experiments. The research will
provide insights into how different demographic groups perceive and accept biometric
authentication, which can help to identify the acceptance of biometric systems based on
factors such as age, education, and cultural background. On the other hand, it will lead
software providers and decision-makers to develop biometric systems to adapt and meet
the needs of different users.
Additionally, the study will enhance user experience by considering users’ percep-
tions and preferences. The study will identify the best and preferred biometric systems
for user authentication. Users’ expectations and preferences can lead to improving user
experiences by aligning the authentication process.
1.5 Results
The findings of my study highlight the preference for and acceptance of fingerprints as a
widely used and secure biometric authentication method. The high percentage of partic-
ipants with educational degrees and young demonstrates the correlation between educa-
tional background and interest in biometric systems.
My findings indicate that participants consider fingerprint technology to be the best
and preferred method for user authentication, aligning with previous studies. The accu-
racy and performance of the fingerprint feature contribute to increasing its acceptance
among users. Following fingerprint technology, facial recognition features are considered
the second-best method for accuracy and performance.
1.6 Scope/Limitation
In this thesis, I conducted a study to compare users’ perceptions and opinions about the
acceptance of biometric systems for user authentication with facts based on previous stud-
ies. I used a survey to collect data from 99 participants and asked them 18 questions about
their preferred and secure authentication techniques. My survey does not cover how to
develop authentication systems, which could lead to further research to evaluate users’
opinions and experiments and develop the system based on this survey result.
7
Limitation:
2. Publication period & number of participants: The survey was only published for
a short period of 10 days due to time constraints, and the number of participants
was relatively small (99 participants). This limited timeframe and participant pool
may affect the generalizability of the findings. A more extended survey period
would allow for more diverse participants, which can provide a representation of
user experiences and preferences. This can help ensure more accurate and reliable
results.
3. Two-factor authentication: Another limitation is that the study did not specifically
focus on two-factor authentication systems, which provide an additional layer of
security. Instead, the study’s primary focus was on user acceptance of biometric
systems compared to traditional passwords and preferred authentication methods.
8
1.8 Outline
This study is structured into 7 chapters for a comprehensive exploration of the topic:
• Chapter 1: Introduction
• Chapter 2: Methodology
• Chapter 4: Results
– Detailed presentation of the obtained results from the survey (Research ques-
tions and answers)
• Chapter 6: Discussion
– Discusses and describes the method and users’ experiments opinions and re-
sults and defines the problem and challenges.
– Conclusion and potential avenues for future research and further exploration.
9
2 Method
The proposed methodology is designed to thoroughly assess users’ acceptance of biomet-
ric systems for authentication compared to traditional methods. As well as the effects of
demographic characteristics on acceptance. To ensure transparency, the following details
regarding the methods employed in the research are provided:
Survey Distribution:
The survey was widely distributed across multiple platforms to ensure a diverse and
extensive participant pool. Specifically, the survey was made accessible through social
media platforms such as LinkedIn, Facebook, and WhatsApp. In addition, the survey
was made available in both English and Arabic languages to cater to a broader demo-
graphic. The distribution strategy aimed to reach a wide range of users, including those
with varying levels of familiarity with biometric authentication.
Publication Channels:
To ensure a broad and diverse participant pool, the survey was posted on various
channels. These channels included:
1. LinkedIn: The survey was shared on professional networks without targeting spe-
cific users. It was open to the public, and anyone could contribute their experiences
and perspectives.
2. Facebook: The survey was posted in relevant groups and communities, particularly
those related to computer science, technology, privacy, and security.
10
with a consent form, ensuring that their responses would remain confidential, and their
identities protected.
Survey Design:
The survey itself was designed as an online questionnaire and was made accessible to
users on various social media platforms, including LinkedIn, Facebook, and WhatsApp. It
sought to gauge user perceptions of biometric authentication through a series of questions
presented in a Likert scale format. This format allowed participants to express their level
of agreement or disagreement with statements regarding biometric authentication clearly.
The questions were mentioned in Chapter Appendix A page (44) This approach enabled
participants to express their level of agreement or disagreement clearly and contributed to
determining the overall acceptance rate of biometric authentication systems.
Data Analysis:
Once the data collection phase was completed, a rigorous data analysis process was
initiated. The objective was to identify the most preferred biometric authentication sys-
tems among users and assess the extent to which users rely on biometric methods com-
pared to traditional passwords. The data analysis involved comparative studies to relate
the findings to existing research, facilitating the derivation of meaningful conclusions.
Results Reporting:
The study’s results were presented, highlighting key findings, and offering recom-
mendations for potential future research endeavors. These findings were contextualized
within the existing literature on biometric authentication systems and were substantiated
by comparisons with previous studies.
Alignment with previous studies:
The survey results were aligned with the findings from previous studies. For instance,
a study conducted in 2014 [16] emphasized the efficiency and safety of specific biometric
methods, such as Finger Vein and Iris recognition. It also underscored the widespread use
and cost-effectiveness of fingerprint authentication across various devices.
Another study conducted in 2022 supported the survey results, affirming strong agree-
ment among participants regarding the dominance of fingerprint authentication [5]. This
study identified similar trends in the survey results conducted in both Arabic and English
languages. Specifically, the survey conducted in Arabic indicated that approximately 56.3
% of respondents strongly agreed, and 40.6 % agreed that fingerprints were the most well-
established and widely used method. The survey conducted in English revealed that 32.8
% strongly agreed, 34.3 % agreed, and 23.9 % were neutral regarding the dominance of
fingerprint authentication.
This methodology provides a robust framework for assessing biometric system accep-
tance and ensures the comprehensive exploration of users’ perceptions. It aims to con-
tribute valuable insights to the field of biometric technology adoption and its alignment
with user preferences and demographics.
11
2.1 Research Method
The research method employed for this study involved the distribution of a survey in
two different languages, English and Arabic, to assess the general public’s acceptance
of biometric systems for authentication. The survey design encompassed questions re-
lated to participants’ experiences and preferences regarding biometric systems and tradi-
tional passwords. The survey was made accessible on various online platforms, including
Google Forms, LinkedIn, Facebook, and WhatsApp.
1. Survey Design: The survey was designed to encompass questions related to par-
ticipants’ experiences and preferences regarding biometric systems and traditional
passwords. The survey was made accessible on various online platforms, includ-
ing Google Forms, LinkedIn, Facebook, and WhatsApp. The survey consists of 18
questions, and it should take about [2-4] minutes to complete.
2. Survey Publication Platforms The survey was published on three main platforms:
LinkedIn, Facebook, and WhatsApp. These platforms were selected due to their
wide user base and accessibility. Only the English version of the survey was shared
on LinkedIn. Both English and Arabic versions were published on Facebook, with
dissemination in technology-related groups and the researcher’s general page. On
WhatsApp, the survey link was directly shared with personal contacts and What-
sApp groups.
3. Survey Language: The survey was conducted in two languages English and Arabic,
which could give participants the freedom to choose the language they prefer or
speak with. That could reach more participants from different countries and differ-
ent languages.
4. Target participants: The survey was open to anyone willing to participate and share
their perspectives and experiences on the topic. It was made accessible to indi-
viduals who came across the survey announcement on the selected social media
platforms.
5. Survey Duration and Participant Numbers: The survey remained open for 10 days,
during which 99 participants responded. Among these, approximately 67 partici-
pants completed the English version, while 32 participants completed the Arabic
version.
12
7. Data Analysis: Once the survey period ended, the responses provided by the partic-
ipants were compiled and analyzed to gain insights into the general public’s accep-
tance of biometric systems for authentication.
1. Content validity: All relevant aspects of acceptance of biometric systems for user
authentication and identification were covered in the survey, ensuring that the ques-
tions encompassed all aspects of the topic.
2. Construct validity: The survey was designed to measure users’ attitudes toward bio-
metric systems for authentication and identification. The questions targeted a large
group of users with varying characteristics, including age, education, and familiar-
ity with traditional passwords compared to biometric systems, to understand users’
different attitudes.
By meticulously conducting these steps, I gained more confidence in the survey’s results.
To further validate the survey, I collected and analyzed various papers from previous lit-
erature reviews, comparing them with users’ opinions and experimental data from my
survey. The results showed remarkable consistency, further reinforcing the survey’s va-
lidity.
By meticulously conducting these steps, I gained more confidence in the survey’s
results. To further validate the survey, I collected and analyzed various papers from previ-
ous literature reviews, comparing them with users’ opinions and experimental data from
my survey. The results showed remarkable consistency, further reinforcing the survey’s
validity.
Reliability and validation may have some issues depending on the participants’ an-
swers/opinions and could be not correct even using only one single authentication tech-
nology. By incorporating these measures and comparing the survey results with existing
13
literature, the survey provides valuable insights into biometric authentication systems and
their acceptance among users.
14
3 Research project
I will conduct literature review studies and a survey for 99 users to determine the ac-
ceptance level of biometric systems for user authentication. The survey will help identify
the preferred authentication method among users based on their perceptions and experi-
ences. Through this survey, I aim to compare and verify whether the results align with the
previous literature review studies.
15
3.2.1 Recognition Types
1. Fingerprint Recognition:
The fingerprint technique has been used for user authentication in many applications
and sections:
• Smartphones, tablets & computers.
• Passports and ID cards. • Security measures at airports and borders to combat illegal
immigration.
• ATMs and banking transfers.
• Secure access to buildings, healthcare, and services, among others. Since the 1980s,
fingerprint technology has been in routine use, and its popularity has grown significantly
in recent times due to its accuracy in user identification. Fingerprint authentication of-
fers high performance, security, permanence, and wide acceptance, making it a preferred
choice for many users across different devices.
2. Face Recognition:
Face recognition is used as a biometric for secure authentication since the face is
unique almost like a fingerprint. Nowadays Cameras use high-resolution capacity to cap-
ture face images and save them to a database to identify user access. These days, a lot of
work has been done throw face recognition, especially on smartphones [18].
16
The facial recognition feature has become more se-
cure and used than before, especially after the im-
provement of smartphone Cameras, and the use of
3D technology to recognize the face and provide users
with secure access to their data.
Figure 4: Face recognition [18]
The adoption of face recognition enhances device security, moving away from con-
ventional methods like PINs and passwords, which may be susceptible to unauthorized
access if written down or easily guessed [19]. Face recognition technology has been suc-
cessfully applied in various sectors, including smartphones, passports, computers, border
control, criminal identification, and access control.
3. Iris Recognition:
Each person has a unique characteristic iris that can be made iris feature distinguishes
features and is used in a wide range of applications. Since iris recognition technology is
new compared to fingerprint and face, it may cost and face some challenges, but it did a
great job.
17
5. DNA Recognition:
6. Retina Recognition:
Retina recognition is regarded as one of the most secure biometric systems due to its
unique nature for each individual, remaining unchanged over time and being resistant to
replication or duplication [20].
18
While hand recognition may require further development to enhance its accuracy,
palm recognition proves more accurate as it is unique to each individual [18]. Soon,
these biometric systems are expected to be available in smartphones and various devices,
especially in countries like the UK and Japan, where these features are already being
utilized and developed.
1. Voice Recognition:
Voice recognition is a biometric system that offers
a unique identity for each individual based on their
voice or speech characteristics. This technology can
be implemented through the microphone of a phone
or computer [17].
The voice biometric system provides efficient secu-
rity for authentication and identification purposes. It
utilizes an automated conversion method to transform
Figure 11: voice Recognition [2] speech or recorded voice into text or numerical data,
depending on the type of password used [23].
The process of voice recognition involves two main steps: training and testing to iden-
tify the person. However, compared to fingerprint biometrics, voice recognition may take
longer. One of the drawbacks of the voice biometric system is its vulnerability to voice
recordings by unauthorized individuals, which compromises its security and makes it less
reliable compared to other biometric systems currently available.
2. Signature Recognition:
However, it is important to note that signature recognition systems may have limita-
tions in terms of accuracy and security. Signatures can be forged or mimicked, which
raises concerns about their reliability as a standalone biometric authentication method.
19
3. Keystroke Recognition:
This feature was introduced as early as 1975 and has been widely used in computers.
However, the process may require some time for training, as it involves analyzing the
finger pressing and position. Users are typically prompted to input their password mul-
tiple times to enable the technology to analyze and save the keystroke patterns for future
recognition.
Today users can utilize touch-screen keyboards instead of physical keyboards, which
allows the system to identify the size of the touching finger, the applied pressure, and the
location on the screen [25].
4. Gait Recognition:
Gait recognition is categorized as a behavioral bio-
metric authentication method, as it requires the anal-
ysis of the user’s walking pattern. Unlike other meth-
ods, gait recognition does not require active involve-
ment from the user. It can automatically verify the
identity of the user without any intervention.
However, gait recognition has shown some limitations
in terms of performance and user acceptance. The
Equal Error Rate (EER) for gait recognition is rela-
tively high, at 20.1 % which is significantly different
from the EER for finger vein recognition, which is
only 0.07 % [25]. This indicates that gait recogni-
tion is not yet secure enough and is still under de-
Figure 14: Gait Recognition [2] velopment. Nevertheless, it has been implemented in
some devices, such as smartphones equipped with ac-
celerometers.
20
The following table shows the advantages and disadvantages of Biometrics System
techniques used by different authors in their papers described in the literature.
21
Finger vein • Fast to verify one input finger vein • High cost.
about 0.8 seconds [18]. • Low Acceptability.
• Provide high performance.
• Provide Uniqueness and more se-
curity.
DNA • Could be the most reliable biomet- • Sensitivity makes it easy to steal
rics. from an individual.
• Unique for each person. • Complex and not used in real-time
• High performance. applications [20].
• Low Acceptability.
Retina • High accuracy [18]. • Retinal scanning would dam-
• Not easy to change or replicate. age vision with extended use over
• High performance. time [29].
• High cost [18].
Hand and Palm • A hand is easy to use and inexpen- • Palm is a high cost [20].
sive. • The hand provides low perfor-
• Palm is unique. mance.
• Palm is more reliable than • People’s hands change over time
hand[20]. with growth, or when someone gets
• A highly accurate combination of injured[1].
hand and palm features.
• Palm provides high performance.
22
Signature • Widely used. • Low accuracy.
• High Acceptability. • Low performance.
23
Biometrics Systems Challenges
24
4 Results
The survey results showed the significance of user acceptance and satisfaction during
the development of biometric systems. A survey was conducted in both English and
Arabic languages, consisting of 18 questions (see Appendix A), which revealed that a
considerable percentage of users (up to 85 %) embraced biometric authentication systems.
The survey participants expressed contentment with biometric systems as authentication
methods, as illustrated in “Fig 19, 20”.
Furthermore, the survey results indicated that a majority of users perceive biometric
systems as more secure compared to traditional passwords. This perception likely con-
tributed to the high acceptance and adoption rates observed among the surveyed users.
Additionally, I observed that users with an educational degree and those between the
ages of 26–35 showed a greater interest in biometric systems compared to older users aged
55 years and above. This finding suggests that younger and more educated individuals
may be more receptive to adopting biometric authentication methods.
According to the survey, 47.9 % of participants strongly agreed with both English &
Arabic versions, while 37.7 % simply agreed. As a result, the total percentage of users
who agreed or strongly agreed was 85.6 % biometrics secure & convenient.
(Users’ perceptions that biometrics are more secure and convenient than traditional
passwords)
4.1.1 Age
The first research question aimed to understand if there’s variation in the acceptance of
biometric systems based on age. The survey results revealed that age is indeed a factor
influencing the acceptance of biometric systems for user authentication. Participants were
divided into different age groups, and their preferences and usage patterns of biometric
systems were analyzed.
25
According to my survey result, it appears
that there is a variation in the acceptance of
biometric systems based on age.
I conducted the survey in English with 67 participants out of 99 users and found that
age is a factor in the acceptance of biometric systems for user authentication.
The results revealed that the age group between 26-35 years had the highest percent-
age (32.8 %) of participants who prefer or use biometric systems. This age group demon-
strates a greater acceptance and reliance on biometric technologies.
The second highest percentage (26.9 %) was found in the age group between 36-45.
This suggests that individuals in their late 30s and early 40s also demonstrate significant
interest in and acceptance of biometric systems. The age group between 18-25 years
constitutes 22.4 % of participants who prefer or use biometric systems. This younger
age group demonstrates a considerable level of acceptance and adoption of biometric
technologies.
In contrast, participants above the age of 55 years comprised the smallest percentage
(7.5 %) in terms of preference or usage of biometric systems. This indicates a lower level
of acceptance among older individuals.
These findings align with previous literature reviews, which suggest that younger in-
dividuals tend to be more accepting and comfortable with new technologies, including
biometric systems. As individuals age, their level of familiarity and acceptance of new
technologies may decrease.
Based on the survey conducted in Arabic, 32 participants shared their perspectives and
experiences out of 99 users. Among the participants, the highest percentage (43.8 %) of
those who prefer or utilize biometric systems were in the age group of 26-35, as the same
result in the English survey. Then the 36-45 age group had the second-highest preference
for biometric systems, followed by the 18-25 age group.
26
The survey had a total of 99 participants, with 36 taking part in both the English and
Arabic versions. These participants were between the ages of 26 and 35 and were the
most commonly used group for biometric systems. The overall number of participants
who are 55 years or above is relatively small in both surveys. Older users may be less
familiar with or accustomed to modern authentication systems, which is a common trend
observed in technology adoption.
The findings align with the general understanding that younger users tend to be more
inclined towards and comfortable with adopting new technologies compared to older in-
dividuals.
4.1.2 Education
The second aspect of Research Question 1 focused on the relationship between education
and acceptance of biometric systems. Educated users exhibited higher levels of interest
and reliance on biometric systems.
Based on the survey results, there is a positive correlation between higher levels of
education and the acceptance of biometric systems. Users with advanced education tend
to demonstrate a better understanding of biometric technology, including its advantages
and disadvantages. The survey results show that educated users are more likely to rely on
and adopt biometric systems for authentication, rather than traditional passwords.
• The second majority of users (21 %) with a master’s degree or higher demonstrated
an understanding of biometric systems and the associated risks.
The findings indicate a positive correlation between higher levels of education and
acceptance of biometric systems.
27
• Approximately 84 % of users expressed satisfaction and considered biometric sys-
tems more secure than traditional passwords.
The study finds that educated and young users, in particular, view biometric authen-
tication as the future. They believe that passwords will soon become obsolete, with bio-
metric systems replacing them in various applications such as hospitals, banks, airports,
companies, police departments, borders, websites, smartphones, and computers. Even
users who don’t have educational backgrounds consider biometric systems to be secure
and provide them with quick access to data and secure methods.
• The results from the English language survey of 67 respondents indicate that 32.8
% strongly agreed, 34.3 % agreed, and 23.9 % expressed a neutral stance toward
fingerprint authentication.
These findings confirm that fingerprint authentication is widely recognized as the most
preferred and accepted biometric method across different languages and cultural back-
grounds.
28
Survey questions and results in both version English and Arabic
2- You use a biometric sys- • Strongly agree 35.8 % • Strongly agree 46.9 %
tem for authentication and • Agree 50.7 % • Agree 46.9 %
identification. • Neutral 9 % • Neutral 6.3 %
• Disagree 3 % • Disagree 0 %
• Strongly Disagree 1.5 % • Strongly Disagree 0 %
29
7- Biometrics systems are • Strongly agree 21.2 % • Strongly agree 28.1 %
100 % accurate. • Agree 42.4 % • Agree 59.4 %
• Neutral 21.2 % • Neutral 6.3 %
• Disagree 12.1 % • Disagree 3.1 %
• Strongly Disagree 3 % • Strongly Disagree 3.1 %
11- I am: • 18-25 years old 22.4 % • 18-25 years old 12.5 %
• 26-35 years old 32.8 % • 26-35 years old 43.8 %
• 36-45 years old 26.9 % • 36-45 years old 28.1 %
• 46–55 years old 10.4 % • 46–55 years old 12.5 %
• 55+ years old 7.5 % • 55+ years old 3.1 %
12- You always rely on a • Strongly agree 32.3 % • Strongly agree 56.3 %
biometric system for au- • Agree 27.7 % • Agree 31.3 %
thentication and identifica- •Neutral 27.7 % • Neutral 9.4 %
tion. • Disagree 12.3 % • Disagree 3.1 %
• Strongly Disagree 0 % • Strongly Disagree 0 %
30
13- You always rely on • Strongly agree 14.9 % • Strongly agree 18.8 %
passwords or pin codes for • Agree 32.8 % • Agree 34.3 %
authentication and identifi- • Neutral 40.3 % • Neutral 28.1 %
cation. • Disagree 10.4 % • Disagree 18.8 %
• Strongly Disagree 1.5 % • Strongly Disagree 0 %
14- You always rely on • Strongly agree 17.9 % • Strongly agree 46.9 %
passwords or pin codes for • Agree 25.4 % • Agree 37.5 %
authentication and identifi- • Neutral 25.4 % • Neutral 9.4 %
cation. • Disagree 25.4 % • Disagree 6.3 %
• Strongly Disagree 6 % • Strongly Disagree 0 %
16- Reusing the same • Strongly agree 43.3 % • Strongly agree 48.4 %
password or PIN for mul- • Agree 41.8 % • Agree 41.9 %
tiple accounts makes the • Neutral 6 % • Neutral 6.5 %
data easy to get hacked. • Disagree 6 % • Disagree 3.2 %
• Strongly Disagree 3 % • Strongly Disagree 0 %
18- I feel comfortable and • Strongly agree 41.8 % • Strongly agree 65.6 %
secure when using biomet- • Agree 28.4 % • Agree 31.3 %
ric system methods such as •Neutral 20.9 % • Neutral 3.1 %
(Fingerprint, Face recog- • Disagree 7.5 % • Disagree 0 %
nition, etc.) in public com- • Strongly Disagree 1.5 % • Strongly Disagree 0 %
pared to traditional pass-
words.
Table 3: Survey questions and answers in both English and Arabic languages.
31
4.4 Evaluation of Common Biometrics Based on Users’ Experi-
ments
To further substantiate the findings, a comparative evaluation of common biometric meth-
ods was conducted based on users’ beliefs and experiences. This evaluation considered
factors such as uniqueness, satisfaction, acceptability, performance, and universality.
According to Table 4, fingerprint and face recognition were evaluated as the most
common and accepted biometric authentication methods based on users’ beliefs and ex-
periences.
Table 5: Acceptance & most used Biometric Systems based on users’ perceptions.
Based on the data in Table 5, it appears that only two biometric systems were cited:
fingerprints and face recognition. These are the most commonly used methods. The find-
ings show that the highest percentage of participants (40.1 %) strongly agreed, and 36.1
% agreed that fingerprints are the most secure and widely used technique for biometric
authentication. Face recognition came in second place.
32
“Fig 19, 20” shows the percentage of people who feel comfortable and secure when
they use biometric systems such as fingerprint and face recognition.
Overall, the results of my survey make it clear that demographic factors, such as
age and education, play a significant role in determining the level of acceptance towards
biometric systems for user authentication. Educated and younger individuals show greater
interest and reliance on biometric systems compared to traditional passwords, while older
and less educated users exhibit less interest.
Furthermore, my findings indicate that participants consider fingerprint technology as
the best and preferred method for user authentication, aligning with previous studies. Fa-
cial recognition is the second most accurate and high-performing method after fingerprint
technology. These findings suggest a high level of acceptance and satisfaction among
users regarding biometric authentication systems, indicating their trust and preference for
such methods over traditional passwords.
This section provides a comprehensive overview of the survey results, including an-
swers to the research questions, the evaluation of common biometrics, and the acceptance
of various biometric systems.
33
5 Analysis
The study provides a comparative analysis of the survey data with a previously conducted
literature review on biometric systems’ user acceptance. The analysis of the survey data
reveals several notable findings that align with the literature reviews:
1. User Acceptance: The survey findings indicate a high level of user acceptance for
biometric systems, which is consistent with previous studies in the literature [7] [9].
Users perceive biometric authentication as a reliable and secure method compared
to traditional passwords.
2. Demographic Factors: Both the survey data and literature reviews emphasize the
influence of demographic factors, such as age and education, on user acceptance of
biometric systems [8] [9] [6]. Educated and younger individuals show a higher in-
terest and reliance on biometric systems, while older and less educated users exhibit
lower interest. The analysis also revealed that many users, especially those between
26-35 years, tend to use biometric authentication systems more frequently, followed
by 36-45 years and years. This finding aligns with existing literature reviews that
propose demographic factors may influence the level of acceptance towards bio-
metric authentication.
3. Preferred Biometric Systems: The survey data aligns with previous studies in iden-
tifying fingerprint technology as the preferred method for user authentication. Many
people prefer fingerprint recognition due to its high accuracy and performance
[5] [8] [9] [10].
Based on the data in Table 4 shows that fingerprint recognition outperforms other biomet-
ric systems in terms of its performance, acceptability, uniqueness, and user satisfaction.
Facial recognition features displayed high accuracy and performance. This aligns with
the findings of the literature review.
By comparing the survey data results and existing literature reviews, it becomes evi-
dent that the findings from the survey support and align with the existing body of knowl-
edge. This strengthens the overall validity and reliability of the research findings and
provides a comprehensive understanding of user acceptance and preferences in the con-
text of biometric authentication.
The analysis reveals a strong convergence between the survey data and the literature
review findings. The survey results validate and reinforce the existing knowledge regard-
ing user acceptance of biometric systems for authentication, demographic influences, and
preferred biometric systems.
Additionally, based on my analysis of the participants’ perceptions, there appears to be
a notable difference between the Arabic and English language surveys in terms of the per-
centage of respondents who believe and perceive biometric systems (such as fingerprint
34
and face recognition) as more secure and more convenient than traditional passwords. In
the Arabic language survey, a higher percentage of respondents (approximately 68.8 %)
strongly agree that biometric systems are more secure than traditional passwords, while
28.1 % agree. On the other hand, in the English-language survey, 37.3 % strongly agreed,
and 41.8 % agreed that biometric systems are more secure than traditional passwords.
The notable difference in responses between the Arabic and English versions of the
survey may be due to cultural factors. Here’s an analysis of some cultural differences that
could contribute to the more positive responses in the Arabic version:
• Trust in Technology: People’s level of trust and confidence in technology and its
security can vary based on cultural attitudes. Some cultures may have more trust in
technological advancements like biometric systems, leading to a stronger belief in
their security benefits.
• Familiarity with Biometrics: Cultures may differ in their familiarity with biometric
technologies. Those who frequently use biometric systems for identification or
security purposes may perceive them as more secure due to their extensive exposure
and familiarity.
• Privacy Concerns: Some cultures place a greater emphasis on data security, leading
to varying levels of privacy concerns. Individuals in these cultures may be more
skeptical about the safety of their biometric data, resulting in lower agreement with
certain statements.
35
6 Discussion
The authentication system may affect users either in terms of emotion or aesthetics (in
terms of the beauty of the design and shape of the system) or speed and performance
(efficiency, speed in accessing data, effectiveness, and protection). The user experience
or perceptions may also change over time and are not constant, depending on what the
authentication system offers regarding speed, protection, etc. Each person according to
his preference or choice.
A goal of my survey about the Acceptance of Biometric Systems for User Authenti-
cation and Identification is to find out and understand users’ experiences, and perceptions
and which Biometric System they prefer to use and consider secure and to understand this
by using open-ended study methods (such as surveys).
The data that I gathered from previous studies and users’ experiments are used to
understand the different users’ perceptions/experiments based on different users’ back-
grounds such as education, age, etc. There could be a problem with some lack of knowl-
edge for some non-education users and non-technical or older users to identify the ad-
vantages and disadvantages of the biometric system they use or lack of how they could
protect their data.
In the end, and after obtaining the results of the survey about the perceptions and
experiences of the participants, we see that most of the participants prefer to use the
fingerprint for authentication followed by the facial recognition feature, also previous
studies have shown that fingerprint has the highest accuracy percentage 99.9 % [4] [6] [8].
We also see that a large percentage of educated and young people prefer to use biometric
authentication systems more than the elderly or the uneducated. To solve problems for
those who still use traditional passwords to access data, they should use complex and
hard-to-guess passwords.
It is also preferable to use an appropriate and safe method to access data safely such as
fingerprints or facial recognition rather than voice recognition, gait recognition, traditional
passwords, or some less reliable and secure security systems. It is recommended to use
biometric systems methods because they provide us with faster access to data and more
security. The user will not have to repeat or write similar passwords for more than one
account if he/she is using a fingerprint or face recognition feature. The user will not be
afraid when he/she accesses his/her phone or laptop in public places or in front of other
people because biometric systems are more secure and most used these days.
Also, the use of devices that are compatible or supportive of biometric systems, such
as new smartphones, and laptops equipped with cameras, or a fingerprint feature, can
bring more security. One of the best methods of authentication is the use of two-factor
authentication, for example, the fingerprint and the password. In this case, we resort to
using the password when the fingerprint encounters a problem or fails to recognize it for
any reason, such as a wound on the finger or the finger is wet. Almost all smartphones
36
have a security feature that requires a password when restarting the phone.
37
The data from the Arabic version of the survey, shown in “Fig 16”, aligns with the
results of the English version. It reveals that the age group between 26-35 years
has the highest percentage (43.8 %) of participants who prefer or use biometric
systems for authentication. However, this percentage is higher than that of the
English version. The second most likely age groups to use biometric systems were
those between 36-45 and 18-25.
Therefore, the total number of participants in the survey, both in the English and
Arabic versions, is 36 participants of the total 99 participants, whose ages range
between 25-35 years, and it is the most participated group and the most used for
biometric systems.
Overall, it was observed that the number of participants aged 55 years or above was
comparatively less. The reason for this could be that older users may not be as fa-
miliar with modern authentication systems, which is a common trend in technology
adoption.
The findings show that many previous literature reviews have found that younger
people tend to be more comfortable and accepting of new technologies, including
biometric systems. As people get older, they may become less familiar with new
technologies [5] [6] [8] [9] [10] etc. A survey conducted revealed that most people
who accepted biometric systems were between the ages of 18-40 [8]. Additionally,
83 % of the participants were under the age of 45. This age group is typically
more familiar with emerging technologies, which may explain their higher level of
acceptance and awareness of biometric methods [9].
A study revealed that participants in the 18–22 age group had a higher level of famil-
iarity and adoption with biometric techniques compared to other age groups [10].
Many of the participants expressed their willingness to use fingerprints as a replace-
ment for passwords.
Next, we will discuss the acceptance of biometric systems for user authentication,
based on educated users’ experiments. Education undoubtedly plays a significant
role in the acceptance of these systems.
Through my research, I have discovered that education is strongly correlated with
the acceptance of biometric systems. The survey results indicate that individuals
with higher levels of education tend to possess a greater comprehension of biomet-
ric technology, including its benefits and drawbacks.
According to the survey, participants with higher levels of education tend to use bio-
metric systems more than traditional passwords and know the technology. Specifi-
cally, around 60 % of participants held a bachelor’s degree. Out of the participants,
the second largest group, comprising 21 %, possess a master’s degree or knowledge
38
about biometric systems and the potential risks they may encounter. This sets them
apart from untrained users.
Furthermore, in the literature review, it was found that 67 % of the participants
held a bachelor’s degree [9]. This suggests that there may be a connection be-
tween the level of education and willingness to accept biometric systems. Those
with higher education may have a greater understanding of the technology and its
advantages, which could lead to increased acceptance. In the study, there were 414
participants, with 86 % of them having completed 2-4 years of university education.
Additionally, 74 % of participants had accepted or adopted biometric systems for
identification and authentication [8].
The second research question just comes to determine if users feel secure and sat-
isfied by using a biometric system for authentication, the question is as follows:
3. Based on the survey, which type of authentication provides the best user experience
and perspective?
According to the survey, the majority of participants, regardless of language (Ara-
bic or English), believe that fingerprint authentication is the most effective authen-
tication method. In the Arabic language survey, about 56.3 % of the respondents
strongly agreed, while 40.6 % agreed that fingerprint authentication is currently the
most established and widely used method.
In the survey conducted in English, 32.8 % of the participants strongly agreed with
fingerprint authentication, while 34.3 % agreed with it. On the other hand, 23.9
% of the respondents remained neutral about this method. Although the level of
39
agreement is slightly lower than the Arabic survey, it still shows a considerable per-
centage of people who prefer fingerprint authentication. The research has revealed
that the participants favored and were most satisfied with the authentication method
based on fingerprints. This technology was also found to be widely used due to its
security and quick data access.
Furthermore, several literature reviews have shown that the most popular and fa-
vored biometric technique is fingerprint recognition. This preference can be at-
tributed to the widespread availability and familiarity of fingerprint technology on
smartphones and computers [4] [5] [6] [7] [8] [9] [10].
According to a study [10], participants in the 18-22 age group were found to be
more familiar with and accepting of fingerprint technology, with 52 % of partic-
ipants adopting it. Additionally, many participants expressed a willingness to re-
place passwords with fingerprint authentication. The second widely recommended
and used technique was face recognition which provided accuracy, efficiency, and
performance across a wide range of applications, including mobile phones and com-
puters.
I believe that future research should prioritize enhancing the security and privacy
of biometric authentication. It is highly recommended to implement two-factor au-
thentication and three-factor authentication in the future, as they provide a higher
level of security and accuracy in terms of information security in many different
devices. By incorporating multiple authentication factors, we can increase the level
of protection and reduce the risk of unauthorized access to devices and systems.
Additionally, future research should continue to explore user acceptance and prefer-
ences of biometric authentication systems for a large group of people from different
backgrounds to ensure obtaining more accurate results. For more information, the
survey questions and the results for each question will be provided in the Appendix
A chapter below (page 44).
Lastly, to gain a deeper understanding of the cultural factors that influence the adop-
tion of biometric systems over traditional passwords, it is crucial to conduct thor-
ough qualitative research or interviews. Considering these cultural nuances can also
enhance the survey design and data analysis, leading to more precise and relevant
insights.
40
References
[1] S. Shanmugapriya and B. S. Sathishkumar, “Review of biometric recognition meth-
ods,” International Journal of Advanced Research in Technology Engineering &
Science (IJARTET), vol. 2, no. 4, April 2015.
[2] F. Belhadj, “Biometric system for identification and authentication,” Ph.D. disserta-
tion, Ecole nationale Supérieure en Informatique Alger, 2017.
[5] A. K. Jain, D. Deb, and J. J. Engelsma, “Biometrics: Trust, but verify,” IEEE
Transactions on Biometrics, Behavior, and Identity Science, vol. 4, pp. 303–323,
2021. [Online]. Available: https://api.semanticscholar.org/CorpusID:234680292
[6] S. Li, X. Han, M. Zubair, and S. Ma, “Stereo image quality assessment based on
sparse binocular fusion convolution neural network,” in 2019 IEEE Visual Commu-
nications and Image Processing (VCIP). IEEE, 2019, pp. 1–4.
[8] J. Fletcher, P. Howard, D. Mody, A. Vyas, and H. Eng, “A study of biometric security
technology acceptance and primary authentication,” Proceedings of student-faculty
research day, 2017.
[9] O. Buckley and J. R. Nurse, “The language of biometrics: Analysing public per-
ceptions,” Journal of Information Security and Applications, vol. 47, pp. 112–119,
2019.
[10] A. Kitsiou, C. Despotidi, C. Kalloniatis, and S. Gritzalis, “The role of users’ demo-
graphic and social attributes for accepting biometric systems: A greek case study,”
Future Internet, vol. 14, no. 11, p. 328, 2022.
41
[13] M. El-Abed, R. Giot, B. Hemery, and C. Rosenberger, “Evaluation of biometric
systems: A study of users’ acceptance and satisfaction,” International Journal of
Biometrics, vol. 4, no. 3, pp. 265–290, 2012.
[15] C. G. Allen and S. Komandur, “The relationship between usability and biometric
authentication in mobile phones,” in HCI International 2019-Posters: 21st Interna-
tional Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings,
Part I 21. Springer, 2019, pp. 183–189.
[21] J. Unar, W. C. Seng, and A. Abbasi, “A review of biometric technology along with
trends and prospects,” Pattern recognition, vol. 47, no. 8, pp. 2673–2688, 2014.
[23] A. H. K. MK and P. Aithal, “Voice biometric systems for user identification and
authentication–a literature review,” International Journal of Applied Engineering
and Management Letters (IJAEML), vol. 6, no. 1, pp. 198–209, 2022.
42
[25] M. Rogowski, K. Saeed, M. Rybnik, M. Tabedzki, and M. Adamski, “User authen-
tication for mobile devices,” in Computer Information Systems and Industrial Man-
agement: 12th IFIP TC8 International Conference, CISIM 2013, Krakow, Poland,
September 25-27, 2013. Proceedings. Springer, 2013, pp. 47–58.
[26] V. Matyáš and Z. Říha, “Security of biometric authentication systems,” in 2010 In-
ternational Conference on Computer Information Systems and Industrial Manage-
ment Applications (CISIM). IEEE, 2010, pp. 19–28.
43
A Appendix: Survey Questions and Results
1. Biometric systems are more secure and convenient than traditional passwords.
Strongly agree Agree Neutral Disagree Strongly disagree
44
3. If your answer was agree or strongly agree with the second question above, what
biometric system do you use?
Strongly agree Agree Neutral Disagree Strongly disagree
45
6. The process of setting up the biometric system is easy.
Strongly agree Agree Neutral Disagree Strongly disagree
46
9. Face recognition is a well-established biometric technology, and the best biometric
technology nowadays.
Strongly agree Agree Neutral Disagree Strongly disagree
11. I am:
Strongly agree Agree Neutral Disagree Strongly disagree
47
12. You always rely on a biometric system for authentication and identification.
Strongly agree Agree Neutral Disagree Strongly disagree
13. You always rely on passwords or pin codes for authentication and identification.
Strongly agree Agree Neutral Disagree Strongly disagree
48
15. Passwords and PINs are secure.
Strongly agree Agree Neutral Disagree Strongly disagree
16. Reusing the same password or PIN for multiple accounts makes the data easy to get
hacked.
Strongly agree Agree Neutral Disagree Strongly disagree
(English version)
(Arabic version)
49
18. I feel comfortable and secure when using biometric system methods such as (Fin-
gerprint, Face recognition, etc.) in public compared to traditional passwords.
Strongly agree Agree Neutral Disagree Strongly disagree
article hyperref
Here is the link to the survey questions in the English version: English Survey Link
Here is the link to the survey questions in the Arabic version: Arabic Survey Link
50