Managerial implications for adopting advanced biometric authentication: A case study on optimizing keystroke dynamics using ISKKC
List of Authors
  • Mohd Noorulfakhri Yaacob , Syed Zulkarnaian Syed Idrus

Keyword
  • Biometric Authentication, Keystroke Dynamics, Machine Learning, Technology Management

Abstract
  • This paper offers a technology management lens for deploying and optimising advanced biometric authentication systems, utilising the Integrated SVM-KNN Keystroke Classifier (ISKKC) model as a case study. The ISKKC system employs an innovative machine learning stack, including regression classifiers, k Nearest Neighbors (KNN), and Support Vector Machines (SVM), to amplify the accuracy of keystroke dynamics, especially in multi-lingual settings. Utilising a comprehensive research design, we gathered and analysed data from 60 participants who are native speakers of either Malay or Chinese. The study's findings substantiate that ISKKC surpasses standalone authentication models in various performance metrics such as accuracy, precision, recall, and specificity. For technology managers, these results translate into strategic advantages, including enhanced system reliability, lower risk of security breaches, and higher overall Return On Investment (ROI). The study also explores managerial considerations such as the ease of ISKKC's integration into existing technology infrastructures, the costs associated with its implementation, and the strategic alignment with organisational objectives. Furthermore, we discuss how the ISKKC model can contribute to a sustainable competitive advantage by offering superior authentication security, facilitating compliance with regulatory standards and customer trust in an increasingly digital ecosystem. This research aims to guide technology managers to make informed decisions on adopting and optimising biometric authentication systems, emphasising the operational and strategic advantages conferred by machine learning algorithms like those incorporated in ISKKC.

Reference
  • 1. Ali Abd El-rhman, W. (2022). The linguistic synonymy phenomenon of Coptic words and their Greek equivalent through the published Coptic documents. College of Archeology Journal Cairo University, 12(2022), 137-149. https://doi.org/10.21608/jarch.2022.212059

    2. Alsuhibany, S. A., & Almuqbil, A. S. (2022). Impact of using different-sized touch keyboards on free-text keystroke dynamics authentication in the Arabic language. Sci Rep, 12(1), 15866. https://doi.org/10.1038/s41598-022-20099-6

    3. Anusas-Amornkul, T. (2019). Strengthening password authentication using keystroke dynamics and smartphone sensors. Proceedings of the 9th International Conference on Information Communication and Management,

    4. Borgaonkar, A., Salunke, A., Gupta, N., & Sharma, V. (2017). User Authentication Through Keystroke Dynamics Using KNN. Journal of Multidisciplinary Engineering Sci-ence and Technology (JMEST), 5(4), 367-397.

    5. Chintalapudi, S. R., Garapati, S. S. V., Kumar, A. D. P., & Ram, K. S. S. (2020). A Machine Learning Approach for User Identification using Keystroke Dynamics. Journal of emerging technologies and innovative research.

    6. DeLong, K. A., Trott, S., & Kutas, M. (2023). Offline dominance and zeugmatic similarity normings of variably ambiguous words assessed against a neural language model (BERT). Behavior Research Methods, 55(4), 1537-1557. https://doi.org/10.3758/s13428-022-01869-6

    7. Dwivedi, C., Kalra, D., Naidu, D., & Aggarwal, S. (2018). Keystroke dynamics based biometric authentication: A hybrid classifier approach. 2018 IEEE symposium series on computational intelligence (SSCI),

    8. Gabralla, L. A. (2020). Dense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone. Adv. Sci. Technol. Eng. Syst. J, 5(6), 307-314.

    9. Gu, Y., Wang, Y., Wang, M., Pan, Z., Hu, Z., Liu, Z., Shi, F., & Dong, M. (2021). Secure user authentication leveraging keystroke dynamics via wi-fi sensing. IEEE Transactions on Industrial Informatics, 18(4), 2784-2795.

    10. Hussein, B. (2023). Interference of Linguistic Research Approaches. Islamic Sciences Journal, 11(8), 1-14. https://doi.org/10.25130/jis.20.11.8.1

    11. Kochegurova, E., & Zateev, R. (2022). Hidden Monitoring Based on Keystroke Dynamics in Online Examination System. Programming and Computer Software, 48(6), 385-398.

    12. Li, J., Chang, H.-C., & Stamp, M. (2022). Free-text keystroke dynamics for user authentication. In Artificial Intelligence for Cybersecurity (pp. 357-380). Springer.

    13. Negi, A., Rathore, S. S., & Sadhya, D. (2021). USB Keypress Injection Attack Detection via Free-Text Keystroke Dynamics. 2021 8th International Conference on Signal Processing and Integrated Networks (SPIN),

    14. Nisa Anggraini, B., & Dwi, W. (2022). Language Kinship of English, German, and Dutch: A Comparative Historical Linguistic Study. International Journal Of Humanities Education and Social Sciences (IJHESS), 1(6). https://doi.org/10.55227/ijhess.v1i6.189

    15. Praise Chukwunalu, Y., Nwankwere, A. U. N., Orji, D. A., & Shah, M. (2022). A Study of Language Use Impact in Radio Broadcasting: A Linguistic and Big Data Integration Approach. Journal of Sensors, 2022, 1440935. https://doi.org/10.1155/2022/1440935

    16. Rathi, M., & Kumar, A. V. S. (2019). Euler Movement Firefly Algorithm and Fuzzy Kernel Support Vector Machine Classifier for Keystroke Authentication. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(11). https://doi.org/10.35940/ijitee.K2063.0981119

    17. S Zeid, S., A ElKamar, R., & I Hassan, S. (2022). Fixed-Text vs. Free-Text Keystroke Dynamics for User Authentication. Engineering Research Journal-Faculty of Engineering (Shoubra), 51(1), 95-104.

    18. Saini, B. S., Kaur, N., & Bhatia, K. S. (2019). Position independent mobile user authentication using keystroke dynamics. In Hidden Link Prediction in Stochastic Social Networks (pp. 64-78). IGI Global.

    19. Saini, B. S., Singh, P., Nayyar, A., Kaur, N., Bhatia, K. S., El-Sappagh, S., & Hu, J.-W. (2020). A three-step authentication model for mobile phone user using keystroke dynamics. IEEE Access, 8, 125909-125922.

    20. Setiawan, I. (2022). Language Kinship as Regional Conflict Resolution in West Nusa Tenggara: Comparative Historical Linguistic Study. REiLA : Journal of Research and Innovation in Language, 4(1), 82-100. https://doi.org/10.31849/reila.v4i1.9579

    21. Wang, X., Shi, Y., Zheng, K., Zhang, Y., Hong, W., & Cao, S. (2022). User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes. Sensors, 22(17), 6627. https://www.mdpi.com/1424-8220/22/17/6627

    22. Wu, T., Zheng, K., Xu, G., Wu, C., & Wang, X. (2019). User identification by keystroke dynamics using improved binary particle swarm optimisation. International Journal of Bio-Inspired Computation, 14(3), 171-180.