{"id":"https://openalex.org/W2124271231","doi":"https://doi.org/10.1109/icarcv.2008.4795720","title":"Empowering the end-user in biometrics","display_name":"Empowering the end-user in biometrics","publication_year":2008,"publication_date":"2008-12-01","ids":{"openalex":"https://openalex.org/W2124271231","doi":"https://doi.org/10.1109/icarcv.2008.4795720","mag":"2124271231"},"language":"en","primary_location":{"id":"doi:10.1109/icarcv.2008.4795720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icarcv.2008.4795720","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 10th International Conference on Control, Automation, Robotics and Vision","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082210114","display_name":"Ben Schouten","orcid":"https://orcid.org/0000-0002-6176-7171"},"institutions":[{"id":"https://openalex.org/I21516984","display_name":"Fontys University of Applied Sciences","ror":"https://ror.org/01jwcme05","country_code":"NL","type":"education","lineage":["https://openalex.org/I21516984"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Ben Schouten","raw_affiliation_strings":["FONTYS University of Applied Science, Eindhoven, Netherlands","Fontys University of Applied Science, Eindhoven"],"affiliations":[{"raw_affiliation_string":"FONTYS University of Applied Science, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I21516984"]},{"raw_affiliation_string":"Fontys University of Applied Science, Eindhoven","institution_ids":["https://openalex.org/I21516984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105769246","display_name":"Albert Ali Salah","orcid":"https://orcid.org/0000-0001-6342-428X"},"institutions":[{"id":"https://openalex.org/I1341640284","display_name":"Centrum Wiskunde & Informatica","ror":"https://ror.org/00x7ekv49","country_code":"NL","type":"facility","lineage":["https://openalex.org/I1341640284","https://openalex.org/I2800991832"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Albert Ali Salah","raw_affiliation_strings":["Centrum Wiskunde and Informatica, Amsterdam, Netherlands","Centrum Wiskunde & Inf., Amsterdam"],"affiliations":[{"raw_affiliation_string":"Centrum Wiskunde and Informatica, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I1341640284"]},{"raw_affiliation_string":"Centrum Wiskunde & Inf., Amsterdam","institution_ids":["https://openalex.org/I1341640284"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5082210114"],"corresponding_institution_ids":["https://openalex.org/I21516984"],"apc_list":null,"apc_paid":null,"fwci":0.3733,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63268156,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3683","issue":null,"first_page":"1357","last_page":"1360"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9542999863624573,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6611105799674988},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6473996639251709},{"id":"https://openalex.org/keywords/modalities","display_name":"Modalities","score":0.6331017017364502},{"id":"https://openalex.org/keywords/empowerment","display_name":"Empowerment","score":0.49973130226135254},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4968700706958771},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4632747173309326},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4613409638404846},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.46066728234291077},{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.4558469355106354},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4485071897506714},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4202340841293335},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3347380757331848},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26291242241859436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24925678968429565}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6611105799674988},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6473996639251709},{"id":"https://openalex.org/C2779903281","wikidata":"https://www.wikidata.org/wiki/Q6888026","display_name":"Modalities","level":2,"score":0.6331017017364502},{"id":"https://openalex.org/C20555606","wikidata":"https://www.wikidata.org/wiki/Q868575","display_name":"Empowerment","level":2,"score":0.49973130226135254},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4968700706958771},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4632747173309326},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4613409638404846},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.46066728234291077},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.4558469355106354},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4485071897506714},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4202340841293335},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3347380757331848},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26291242241859436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24925678968429565},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icarcv.2008.4795720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icarcv.2008.4795720","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 10th International Conference on Control, Automation, Robotics and Vision","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W274668303","https://openalex.org/W1511852885","https://openalex.org/W1603219129","https://openalex.org/W1606443045","https://openalex.org/W1787971840","https://openalex.org/W1960555637","https://openalex.org/W1967310867","https://openalex.org/W1969193295","https://openalex.org/W2000980776","https://openalex.org/W2001236803","https://openalex.org/W2014146821","https://openalex.org/W2024880014","https://openalex.org/W2032551902","https://openalex.org/W2041942569","https://openalex.org/W2063355793","https://openalex.org/W2074219260","https://openalex.org/W2087724748","https://openalex.org/W2120630643","https://openalex.org/W2130352044","https://openalex.org/W2134049139","https://openalex.org/W2223374654","https://openalex.org/W2557228715","https://openalex.org/W3121242664","https://openalex.org/W3160027900","https://openalex.org/W4239145390","https://openalex.org/W4285719527","https://openalex.org/W4292808503","https://openalex.org/W6635981913","https://openalex.org/W6636071521","https://openalex.org/W6669096900","https://openalex.org/W6679286775"],"related_works":["https://openalex.org/W2076845124","https://openalex.org/W2183964146","https://openalex.org/W2379932303","https://openalex.org/W2185469136","https://openalex.org/W2095239294","https://openalex.org/W3147744369","https://openalex.org/W2811048914","https://openalex.org/W1982479144","https://openalex.org/W1995633573","https://openalex.org/W2767198796"],"abstract_inverted_index":{"User":[0],"empowerment":[1,34],"in":[2,37,60,92],"the":[3,13,40,74,89,93],"context":[4],"of":[5,45,58,68,82,102],"information":[6],"and":[7,42,49,62,66,72,80,99,104],"communication":[8],"technologies":[9],"(ICT)":[10],"means":[11],"enabling":[12],"end-users":[14],"to":[15,23],"set":[16],"up":[17],"and/or":[18],"tailor":[19],"ICT":[20],"solutions":[21],"according":[22],"their":[24],"own":[25],"requirements.":[26],"In":[27],"this":[28],"paper":[29,94],"we":[30],"argue":[31],"that":[32],"user":[33],"is":[35,54],"essential":[36],"biometrics":[38],"for":[39],"acceptance":[41],"widespread":[43],"use":[44,103],"biometrical":[46],"applications,":[47],"concepts,":[48],"technology.":[50],"A":[51],"key":[52],"issue":[53],"a":[55],"user's":[56],"experience":[57],"being":[59],"control,":[61],"how":[63],"interfaces,":[64],"modes":[65],"modalities":[67],"interaction":[69,79],"can":[70],"support":[71],"empower":[73],"user,":[75],"whether":[76],"by":[77],"direct":[78],"control":[81],"devices,":[83],"or":[84],"via":[85],"delegation.":[86],"More":[87],"importantly,":[88],"practices":[90],"suggested":[91],"are":[95],"steps":[96],"towards":[97],"practical":[98],"legal":[100],"regularization":[101],"circulation":[105],"o.f":[106],"biometric":[107],"information.":[108]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
