@article{7a7f8c8bbccb454ea9e04797396cb634,
title = "Criteria to evaluate Automated Personal Identification Mechanisms",
abstract = "The consequences of digital identity compromises suggest that selected Automated Personal Identification Mechanisms, which enable computer systems to identify individuals, may be unsuitable in some contexts. Currently, there are no commonly agreed set of factors upon which to base an evaluation, regardless of purpose or requirements. We establish over 200 evaluation criteria to aid decision on the selection of the most appropriate mechanism for a given context. We consider that the suitability of these mechanisms should be based upon a broad approach. Our criteria are designed to expose strategic issues and risk management aspects that influence organisations' objectives and policies for introducing these mechanisms. Additionally, criteria are developed to acquire functional and performance requirements for the intended user community. Our criteria are also formulated to help describe the characteristics of contesting solutions. These qualities range from technological efficiencies to usability effectiveness. Each mechanism may then be assessed for its suitability against the context's risks, issues and operational requirements within an evaluation framework capable of accommodating diverse perspectives and multiple objectives.",
keywords = "Accessibility, Automated Personal Identification Mechanism, Biometric Identification, Biometric Verification, Privacy, Reliability, Risk, Usability, User Authentication, Vulnerabilities",
author = "Anthony Palmer",
year = "2008",
month = dec,
day = "1",
doi = "10.1016/j.cose.2008.07.007",
language = "English",
volume = "27",
pages = "260--284",
journal = "Computers and Security",
issn = "0167-4048",
publisher = "Elsevier Limited",
number = "7-8",
}