Thursday, October 3, 2019

Analysis Of LOreal Garnier Maybelline Products

Analysis Of LOreal Garnier Maybelline Products 1. Introduction The rising style of industrialization and developing expertise in interaction and shipment allow the clients to retrieve and interpret a large diversity of goods and facilities from other nations. The fact that clients frequently assess the overseas goods differently in contrast to local goods has been discovered by prior investigations (Wang et al., 2004). It has been stated that clients of progressed nations prefer locally manufactured goods as against foreign made ones (Bilkey Nes, 2002) while users from progressing nations favour foreign products over locally made ones (Wang et al., 2004). The idea behind this being that they consider foreign goods to be of superior quality in contrast to local goods and also individuals equate using overseas products as being a status symbol or as being fashionable. The number of users in developed nations for example India or China are more in number and have access to goods that are manufactured in western or developed countries. In such a competitive environment, vendors essentially need to understand the reasons behind users of developing nations selecting goods of other countries imported or domestic. Client choices related to specific creations must be considered not to be a string of unlinked and independent options, these choices involve equations between personal, items or creations state Hogg and Michell (2006). It is accepted that one needs to comprehend client conduct in context to both domestic and foreign goods as overseas marketing is fast becoming an essential part of the global financial systems (Netemeyer et al., 2001). Several investigations related to this subject are centered on what are the name and the location of belonging influence; investigate the way how clients scrutinize goods introduced from specific countries. Older studies which have investigated the location of belonging influence have scrutinized item kinds such as different cars, footwear, video players and groceries for clients located in Australia, Canada, China, France, Germany, Holland, Ireland, Japan, Mexico, New Zealand, and the USA and several others (Ahmed and dAstous, 2006 and Elliott and Cameron, 2004). Several researchers in Europe have examined the influence of the place of origin on selection viewpoints (Ettenson, 2003; Liefeld et al., 2006), good representation (Peris et al., 2003), client outlooks, and the produced in Europe notion (Schweiger et al., 2005), client viewpoint and the created in Europe concept. The development and sustenance of the local manufacturing segment in noninterventionist economy depends on how clients like the goods manufactured in that particular country. Local manufacturers face tough competition from many foreign products which have made their mark globally. This is especially relevant in emerging countries whose manufacturing is restricted to primary products. It is in such nations that the development of manufacturing sectors faces hurdles as clients prefer using foreign goods from developed nations as against domestic ones or ones from lesser developed countries (Ettenson 2003). The twenty first century is witnessing the usage of extravagant products (Kapferer and Bastien, 2009) though the number of firms marketing extravagant goods is very low (Uche Okwonko, 2007). All individuals desire lavish goods especially as far as fashionable goods are concerned. Despite the era of industrial revolution, the first or second world wars or liberalization the past centuries have observed that several opulent brands have made their mark globally. The era of internationalization has resulted in the availability of several sources of opulence. This is the result of the role played by growth of businesses, financial systems, new businesses, rise in spending by people and even interactions. This is evident by the fact there are reputed Japanese luxury brands in European countries which employ Chinese silk as raw substance for manufacturing goods (Kapferer and Bastien, 2009). This has resulted in people globally being aware of the international fashion brands. The current days have seen the diminishing of societal division. However individuals are yet likely to differentiate class in community by the leader and individuals who are wealthy like to display their wealth and opulent lifestyle. Thus luxury has begun to indicate superior choice and money which every individual desires. One of the emerging nations from which several products of different nations are imported is UAE. 2006 saw the import value touch 125,975 million US dollars which is expected to touch 137,943 million US dollars by 2007 (World Bank 2007, as quoted in Chaisitthiroj, 2007). Studies undertaken previously deduced that the approach towards international products as against local brands was more affirmative as they considered global brands to be of superior quality (Masayavanij, 2007. This was in line with the investigation undertaken by Cengiz Kirkbir (2007) which concluded that people in emerging nations consider overseas goods to be of superior quality and more dependable as against locally manufactured goods. Simultaneously another investigation related to UAE client approach and outlook related to international as against local clothes deduced that UAE individuals prefer foreign clothes on account of their better resiliency, quality, good looks, fashionable appearance, and brand name and style because they are made in nations that have advanced expertise. As a result, UAE clients prefer to buy foreign clothes (Sae-Jiu, 2007). Another study also deduced that UAE clients considered overseas brands to be much better in terms of quality and worth for money as against local clothes (Suvachart, 2002) and the nature of UAE clients is such that they emphasize on quality and prefer to pay more for foreign brands. Thus, foreign brands significantly influence the outlook and conduct of UAE clients. Ukpebor and Ipogah (2008) opine that a strong brand is likely to improve a clients approach power related to the product linkage of a brand. As Vranesevic and Stancec (2003), have asserted the significance of a brand is evident by how it influences the clients options and their allegiance by recognizing and distinguishing not only quality and source but by developing augmented worth. One of the advance policies is that a strong brand can seize the attention of a client. In emerging countries, clients have specific anticipations from the brands are inclined to depend on the brand as a mark to buy goods (Reardon et al., 2005). Despite, the luxury segment being tiny in contrast to other firms globally, the luxury fashion segment has been a multi-billion dollar segment globally. It is important in driving the economy and impacting the contemporary society. Chadha and Husband (2006) further stated that the democratization of luxury brands in the nineties allowed common man to access fashionable goods. Also one can find luxury present at every place in the current times (Kapferer and Bastien, 2009). 2. Problem Statement Overseas goods are frequently evaluated in a different manner as compared to parallel domestic products by users (Herche, 2002). The location of belonging influence research undertaken in majority of developed countries has pointed out that if information related to a product is insufficient then users choose domestic branded articles in lieu of global goods (Bilkey and Nes, 2002). Clients often form opinions related to the standard of the apparel based on the mannequin wearing clothes (Dickerson, 2002). To be specific, the outlook of criteria associated with imported clothes was not regarded to be as important. However, there appears to be a direct relation amongst evaluations of evaluation of domestic products and the norm of monetary development of the location of belonging (Gaedeke, 2003). On the other hand, a contrasting style of location of belonging investigations can often be viewed in lesser developed nations where clients really select imported goods in contrast to locally manufactured ones (Agbonifoh and Elimimian, 2009). This is more likely to be seen in situations when imported products are related to evident buys (Marcoux et al., 2007; Piron, 2000). Clients often buy and use luxurious foreign goods to keep up with the joneses or baffle others instead of the monetary aspect or real application of the products (Mason, 2001). This has not been limited to the affluent section of the society but can be witnessed across the entire society and income divisions including the poor and the rich (Mason, 2001; Basmann et al., 2008).This is evident by fashionable apparel are ones which are noticeable and also a mark of standing in society (Schiffman and Kanuk, 2004). As has been put forth by Chaisitthiroj (2007), the beauty segment is one sector in the market that clients have several options of imported goods and they are regarded to be well-known for beauty clients. This is evident in UAE as their lifestyles are transforming and becoming more contemporary thanks to the growth and this is visible more so as far as UAE women who reside in the urban regions are concerned (Chaisitthiroj, 2007). Presently, they pay attention to how they look as they consider buying cosmetic goods an extension of their personality. In the words of Cash et al. (2009 as quoted in Guthrie et al., 2008), ladies using beauty products are more contented with how they look including their general appearanceand deem themselves to be more beautiful compared to their friends when they have their makeup on. When this investigation was undertaken, UAE was grappling with an economic recession (Bangkok Bank, 2009). Despite the recession, the cosmetic segment has withnessed continous uptrend (growth) (US. commercial service 2008). A tiny role of the cause lies in the fact that beauty brand asset are crucial drivers. It was asserted by Drucker (2005), that during economic recession, people spend money cautiously, so beauty firms depend on promotion and brand name identification to gain revenues.Additionally, the usage of marketing mediums in several novel mediums including internet improves the brand exposure to an extended set of likely clients (Kumar et al., 2006). On the other hand, it has been asserted by Suvachart (2001) that UAE clients have the attribute of being innovators who are likely to shift to new brands or goods thus indicating they are not really brand committed. Additionally, when Speece (2008) studied brand commitment of clients located in Bangkok, it was discovered that only 80-85 percent were committed to brand to goods which required low participation and did not depicted solitary brand commitment. The investigators discovered that there was a lack of research related to UAE clients outllok and conduct related to imported makeup goods which is one of the significantly developing market industries in UAE (Wiwutwanichkul, 2007). The subsequent segment will discuss details related to the UAE cosmetic market to offer a general view of the exisitng market scenario and the reason behind undertaking the research will be discussed. 3. Research Purpose The main purpose of this research is to investigate the effect of brand on consumer purchasing decision of foreign makeup product. The outcome of the research would be beneficial to marketing professionals especially in UAE cosmetics-makeup industry to understand the target consumer-whether brand equity affect their purchasing decision. To what extent the brand equity lie in their purchasing will be investigated as it will help foreign brand marketer to see their strengths and weaknesses in their use of brand equity and can improve their performance accordingly. At the same time, the research can assist domestic marketers to adapt the knowledge to their marketing plan and activities to satisfy customers and provide the offerings based on the factual consumers needs. 4. Research Questions To fulfill the aim and purpose of this study, the authors have formulated the research questions by relying on the background and problem statement as the following: If and how the personal value, social recognition, and demographic impacts UAE customers for their luxury fashion brand purchases and which marketing strategies should be used to suit their purchasing intention? 5. Research Aims The aim of this research is to identify the influences of brands and its assets on consumers purchase decision. According to the above discussion, quantitative method was chosen as it best fits the nature and purpose of this study that attempts to understand UAE consumers behaviour in making decision to buy makeup products. Hence, a questionnaire-based survey is selected as the major tool in data collection of the study. 6. Literature Review The prior research international brands in the up-and-coming market economies were favoured by the several consumers, along with having a superior class their status is contrast with the local goods as explained by Graham (2004) and Sterngold (2002). India is included among these several consumers in the markets, international brand goods were buying and possess by the rising upper class as mentioned by Cui Li during 2001. According to Arnold Quelch, (2008) and Batra (2007), the product worth among the local brands was identified by the investigators as well as they also pointed out that the consumers in up-and-coming market economies will end up stylishly. In these nations the increasing patriotism and domestic industries will be created by the host governments as explained by Klein (2002), Prahalad Lieberthal (2008). In the up-and-coming markets the international brands hostile response will be ultimately result by the altering utilization styles as given in these forecasts. Thi s matter is validated by McKinsey published report despite identification acknowledge the international brands, local brands were favoured by Chinese consumers and instead of imported brands they have faith on local brands as stated by Dyer (2007). In these markets for transnational firms functioning there is an important inference of fake alarm or unavoidable inclination is there. The globes financial systems constant globalization is considered and up-and-coming market consumers significance is with domestic organizations and transnational firms, closer investigation were needed for the selection between international and local brands in these financial systems by consumers. In the up-and-coming markets information related to the option of consumers for international and domestic brands stays insufficient. If India is illustrated for international brands penchant were identified by many investigators as on non-probability samples and perceptual measures they depend. for international brands asserted penchant, on domestic brands real buying the latest investigations depends like exaggeration of penchants and domestic brands were majorly buyed by the Chinese consumers as mentioned by Cui Liu (2001); Kwok (2006). Between Chinese consumers preference of international as against domestic brands were influenced by other aspects as proposed by the difference betwe en real conducts and asserted penchants. International and local brands real buying pattern have been contrasted by a small number of investigations in this huge up-and-coming market for deliberating the condition of brand competition. When domestic market situations and good divisions impacts were discovered, among the city consumers in India the preference of international and local brands investigated in this studies and in the up-and-coming market extreme competition between local and international brands. On brand insights and preferences the existing literature is reassess by us and consumers options in up-and-coming markets and several investigative queries were suggested. Secondly, in four main Indian cities that depends on extensive consumer investigation, across several durable and nondurable goods types the buying patterns of local and international brands were analysed by this research. Across good types and geographic markets the international brands differ greatly in buying and possessions as proposed by outcomes. Specific good types were controlled by international brands, in consumables and durable goods the base is acquired by local brands as in the city markets it goes ahead, for consumers share the current war were emphasized. In brand management and marketing policies for both international and local organizations the propositions has been discovered by us. Brand Kotler (2002) states in the product line were one of more items were associated as it is used for identifying the character source of the items is termed as brand. According to Doyle (2002) brand is a specific name, design or symbol or its combination a product is differentiated by this. For every product an ordinary feature is the brand which nowadays is available on the market. Each brand specialty is the different value in the potential buyers mind. According to Gordon (2003), McEnally and de Chernatony (2009) differentiation is enhanced by the image and reputation of a strong brand on buying behavior it has a positive influence. Powerful brands significance is seen by the marketers and for building up a strong brand as shown in all efforts. Familiarity and credibility is the meaning of brand for customers as in their everyday life some contacts were experienced by them; so as an indicator brand is used for making a decision while buying new product as stated by Ger (2003). The determinants of product quality is the causal signs that is regarded by brands as it depends if quality is truly determined by intrinsic attributes and processes as mentioned by Stijn (2000). According to Aaker (2002), in the mind of consumers the familiarity and credibility creates value towards firm, by brand equity use it can be enforced: perceived quality, brand loyalty, brand awareness and brand associations. Consumer behavior Consumers studies the consumer behavior as for a product or service they exchange value as it satisfies their needs as stated by Well Prensky (2006, p.5). Schiffman Kanuk (2000, p.5) mentions that how for spending their available resources that is time, money, effort an individual makes its decision is focused by the consumer behavior study on items related to consumption. With buying consumer behavior consists people experience of feelings, thoughts and their performed action. Environment influences like product appearances, comments taken from other customers, packages, consumers physical actions and advertising were involved. Consumer decision making The decision making behavior of consumer consists five basic steps. As per most of the researchers these steps are within the same field (Cross 2009). These steps are inclusive of model; problem recognition, process of information search, alternatives evaluation, process of purchase along with post-purchase. However, it is not necessary that all purchased need every step (Cross 2009). It is up to the consumer to skip the alternatives evaluation while considering low involvement products. As per Hawkins et al. (2001) there are diversified sides than the process of decision making that are subject to affect consumer behavior that are relevantly external and are internal with influences. All the external influences are kind of social class added by reference group. The internal factors can be noted as exposure, motivation, perception, attention and attitude. Purchase decision All kinds of purchase decisions are integral to the process of consumer decision making structure. There are specific two prior stages; information search and aspect of evaluation of alternatives considered by the consumer consecutive act to reach stage of purchase decision added by the effects of brands in those stages. After the phase of problem recognition, consumer shifts to the stage of information search and seek information about the quality, price, brand, country of origin and similar issues as per their motivation. Information search can get conducted as a kind of internal search by the consumers past through indirect or direct experience for the product added by external search by marketing materials or different social groups or reference groups. For Hoyer and MacInnis (2007, p.200), the image of brands are actually affected in terms of internal as well as external search for information. For internal search, the respective consumers can recall brands, whereas for external search, they tend to look into availability over shelf while purchasing or suggestion collected from salesperson affecting their purchase. This follows evaluation of alternatives that the customers usually have to single out. Brand equity too gets consideration. Alternatives of products are taken into consideration in th e customers set of desire. As for instance, brand awareness, where the customer remembers exact brands for specific quality product, he picks the brand immediately. After selection made at evaluation among alternative stage, purchase decision comes in, where concerns are related to the selection of specific product in specific retail outlet added by the amount of purchase. 7. Research Methodology In this research, both qualitative as well as quantitative methodologies are considered. Individual answers will be included through questionnaire added by survey questionnaire. These are believed to be effective means to fulfill dissertation objectives. Process of qualitative investigation mode enables the subject to get analyzed and offer vivid as well as dependent replies that are enquired by researcher in the way of providing constructive as well as comprehensive information that other techniques can overlook. This approach offers significant data by answers to research queries in balancing research techniques that are quantitative in structure. Through quantitative process the research data is collected on the basis of different factors that can get measured for patrons activities. Quantitative method relies over statistical analysis. As some parts of the theory are analysed and calculated, there is the end resultant that is numeric and objectivity results derived of them are th e resource led out of corrective recommendations. For Kuhn (2001) numbers record exodus from different presumptions and is the skill that never gets replicated through qualitative method added this exodus gets sufficient to start the investigation. Aim of this research is based on identifying the influences of brands added by the assets led over consumers purchase decision. Thus quantitative method is selected as it best fits specific nature as well as purpose of the study, which attempts to understand particular behavior of UAE consumers in making purchase decision for makeup products. Thus a questionnaire-based survey is conducted as a major tool in the process of data collection for this study. Both the standards are based on numeric studies. Questionnaires as well as intensive interactions are used as they are all impactful in their approach and manner for completing the aims of this study. There were four interactions performed in India added by 150 questionnaire further will be distributed among different individuals. Questionnaires will be distributed at shopping malls as well as luxury outlets. Participants who have got past over the elimination aspects or are proven as luxury customers will be quizzed. Their responses will be used in the research. Collected information will be analysed through statistical tests under the assistance of SPSS. In order to comprehend the declarations of the respondents, all the questionnaires will be translated specifically into Arabic added by English version. Determination of attributes is inclusive of conjoint analysis, as pretest will be managed among separate sample that is of 30 respondents in order to assure validity towards the questionnaire. Respondents will be asked to answer the selected questionnaires, and that follows the discussion about the questions that were obscured, like the one on whether they can comprehend the meaning of the questions or if there is ambiguity. Finally, questionnaire gets distributed. Questionnaire design Questionnaire design will be structured to collect demographic information related to respondents as per their age. Information related to social class is inclusive of occupation, education and income, (as in questions like 1, 2, 3, and 4) by multiple choice questions. As per Fisher (2007) this kind of questions offer the respondents with choices among 3-5 options and interrogate them to choose any one. These questions also do not allow unambiguous options and are mutually exclusive. Application of multiple choice questions for the study respondents behavior for purchasing in questions like 5 to attain frequency for purchasing makeup products. The question 6 looks into the amount of money that get spent on buying makeup and lastly, question 7 is about respondents type of makeup products bought mostly. Lastly, as per the Likert scales gets applied to ask respondents for their opinions added by attitudes to choose a position in the five-point scale that represents between strongly agre e to strongly disagree (Fisher, 2007, pp.200-200). Likert scale gets applied to the questions from 8-26 for studying respondents attitude for brands and purchase decisions.

Wednesday, October 2, 2019

Star Wars :: essays research papers

You're sitting in a dark movie theater. X-Wing fighters whiz across the screen, and light sabers flash. You've seen it all before, but now it's better than ever. Star Wars, the Special Edition, is a classic that has been updated for the 1990s. The new Star Wars has additional special effects, a more realistic home planet, and improved sound.   Ã‚  Ã‚  Ã‚  Ã‚   The original Star Wars movie had great special effects, but they weren't as good as today's computer-generated special effects. In the new Star Wars, the spacecrafts are more realistic-looking, because they are images created by a computer rather than actual models. So, they have been given more details than the original spacecrafts, and they can fly and maneuver more easily. An example of this improvement can be seen near the end of the movie when the Rebel Fleet attacks the Death Star. For example, there are more rebel ships, and the ships can twist and swoop with ease when they're fighting the Imperial ships.   Ã‚  Ã‚  Ã‚  Ã‚  Thanks to today's technology, Luke Skywalker's home planet, called Tatooine, is also more lifelike. It has new creatures, more people, and additional flying machines. For instance, the scenes in the city of Mos Eisley seem genuine. In the original Star Wars, it looked as if not much went on in the city. Now, added people, creatures, and robots walking on the streets make it look busy. Also, there are many more spacecraft taking off, landing, and flying overhead. The effect is that the city is more believable.   Ã‚  Ã‚  Ã‚  Ã‚  Finally, the sound of the new Star Wars has been digitized --it has improved in several ways. Explosions sound bigger. The exhaust sounds from the flying spacecraft are louder and actually sound as if they're swooshing. Also, voices and noises in the movie seem to come from your right or left side, which is a more realistic effect. For example, when several of the main characters are stuck in a garbage room with steel walls, Han Solo shoots his light saber to try to escape. The laser beam bounces off the walls, and you hear it hitting the right wall as if it were on your right side, and you hear it hitting the left wall as if it were on your left side.

EMF Radiation: Serious Health Hazard for People Essay -- Technology, E

Technology changes everything in this world. Our life has become more convenient and more efficiency which benefits by these new technology. But during this time, some people have considered about some risks of these technologies. EMF radiation is one of them. People have argued for a long time that whether EMF radiation really poses health hazard or not. I insist that EMF radiation is harmful for people’s health and particularly to young children. This opinion can be well proved by all the information I have searched and more people should know about this. First, it’s important to know what EMF radiation is. The full name of EMF is Electromagnetic fields. It’s a kind of area that we may be involved into every time we watching TV, using cell phone, turning on a light switch or using an electric appliance. EMF is a generic term of force generated by magnetic fields or electrical charges. Sometimes, EMF can be considered as a kind of radiation when release energy. When we use some electric appliances, the electromagnetic waves of these appliances will change periodically and produce enough energy to cause ionization. As we all known, ionization can dislodge orbiting electrons from atoms or break bonds which hold molecules together and then producing ions or charged particles. During this process, the production of ions or ionization in our tissues may cause direct damage to cells and cause other health risks. So EMF radiation is also called ionizing radiation. (DCMNR, 2005) This conception maybe a little bit confusing, but i t’s easy to find out that EMF really produces some extra electrons or magnetic field which we have never seen before. So scientists began to do some experiments to figure out that whether EMF has health hazar... ... kind of radiation does mobile phone product. The World Health Organization (WHO) definite the EMF radiation standard as a kind of limitation from electronic devices or of human exposure time from all kind of devices. (WHO, 2006) The exposure standard is basic standard of personal protection in maximum levels. So the EMF can be variety and uncertain. No matter the opponents aware or not, just provide for a rainy day. Technology is a double-edged sword. It can provide us convenient while it may affect our health at the same time. Fortunately, some kind of technology such like EMF radiation has been proved to be harmful and people can prevent it from now on. From my study I am sure that EMF radiation can poses a health hazard for people especially for children and teenagers. All people who really care about their health and their children should know this fact.

Tuesday, October 1, 2019

The Social Penetration Theory & the Uncertain Reduction Theory

Uncertainty reduction theory This theory comes to explain the uncertainty among people who communicate with each other and how different types of communication will help to reduce the uncertainty. As a starting point, the developers of this theory (Charles Berger and Richard Calabrese) stated that uncertainty is an unpleasant feeling, which people prefer to avoid as much as they can. Every person has been confronted with the feeling of uncertainty, rather if it was when arriving to new a destination or more commonly when meeting a new person.In order to reduce the unpleasant feeling, people tend to seek information about the uncertain and by that creating more comfortable feelings, and more predictable relationships in case of communication with other people. â€Å"Coping with uncertainty is a central issue in any face-to-face encounter, whether interactants are conscious of this fact or not† (Uncertainty Reduction Theory Then and Now. Charles R. Berger), but when the uncertai nty is reducing automatically the feeling of attraction (not only physically) start to emerge.In the heart of this theory, Berger and Calabrese connected uncertainty with seven concepts that are in the base of communication: verbal output, nonverbal warmth, information seeking, self-disclosure, reciprocity of disclosure, similarity, and liking. On top of that, they stated that communication reduces uncertainty, and motivation to come over the unpleasant feeling of uncertainty will occur in three situations, and in those situations people will be more likely to reduce their uncertainty level: †¢There are incentives to one of the sides (What this person can do for me? . †¢Expecting future interaction (New unfamiliar roommate). †¢Unexpected / unusual behavior from the other side There is also three basic ways in which people seeking information about another person: †¢Passive strategies – observing the other person, without him knowing he being watched. †¢Active strategies – usually will be done through asking third parties for information about the person you are interested in. †¢Interactive strategies – direct contact and connection with the other person.Sales & the Uncertainty reduction theory â€Å"There are at least two ways uncertainty is relevant to interpersonal communication processes. First, in the broad sense, uncertainty reduction is a vital concern for the conduct of almost any communicative transaction. Second, uncertainty reduction’s impact on interpersonal relationships can be looked at in a more narrow sense; that is, the role-played by uncertainty reduction in the prediction of specific relationship outcomes.The broader role of uncertainty reduction concerns the interaction process itself, whereas the narrow sense concerns the outcomes of the interaction† (Charles Berger). The interpersonal communication process is crucial for any sales person in any kind of industry no matter what kind of products / services he or she trying to promote or sell. The essence of building relationship is the uncertainty reduction theory as the two sides (more important for the sales person) trying to discover the person who stands in front of him.Definitely being able to help to the other person to know more about yourself (the salesperson point of view), will help in the purpose of reducing his uncertainty and uncomfortable feelings he deals with, while developing relationship with the salesperson. Assuming I am a salesperson, first thing in the process of building relationship (before the first contact with a customer) is to use the passive and active strategies in order to gather as much information I can about my customer.Form the moment the first meeting was conducted, I will use the interactive strategy as I wish my customer will know everything he want to know about me (or about the product / service I wish to promote),and by that making him feel more comfortable and not vulnerable. The purpose of using this theory expressed best in the course book â€Å"SELL†, It was mentioned that â€Å"The more the sales person knows, the easier it is to build trust and gain the confidence of the buyer. Buyers have certain expectations of the salesperson and the knowledge that he or she brings to the table†.This quote reflects best why a salesperson must use the uncertainty reduction theory in order to achieve his goals. As a salesperson, I should adjust my content and tactic toward my customer habits; this is another reason why it is important to use the three ways for gathering information according to the uncertainty reduction theory (Active, Passive and Interpersonal). The Social Penetration Theory This theory takes the theory of Berger and Calabrese one step deeper, as it xamines more deeply the interpersonal relationship / communication between two or more parties. The theory developed by Irwin Altman and Dalmas Taylor (1973), in which they st ated that as relationship develop, it become deeper and deeper, from non-intimate levels through to more personal levels. This method also called ‘Onion analogy’, as the intimacy grows and time pass by, more layers of the personality revealed to the other side, that is also the way social penetration is being made, through self disclosure.According to this theory, the disclosure goes through few stages: Orientation stage, exploratory affective stage, affective stage, stable stage and de-penetration stage. Each stage reflects the level of intimacy / level of familiarity with another person. Number of studies examined this theory, all agreed that development of relationship between people come together with development from knowing peripherals aspects of personality into deeper aspects. The theory of social penetration provides a framework for describing the development of interpersonal relationship. These behaviors include exchange of information, exchange of expressions of positive and negative affect, and mutual activities† (The development of interpersonal relationship: social penetration processes). The salesperson should be aware both to his personality, together with the customer personality, and to understand to which level of intimacy the customer is willing to reach / or to which level he want to get with the customer. Sales & The Social Penetration TheorySalespersons should understand the implications of the social penetration theory on the best side in order to create long term relationship between them (or the company they are represent) and their consumers. These days any business, no matter how big it is, wishes to create base of loyal customers who had good experience with the business directly or through the business sales force. From that reason, the business sales force has to be skilled in the aspect of interpersonal relationship. For example, a salesperson who skips the levels / stages of disclosure (according to theory) w ill fail in his purpose of ‘capturing the customer’.On top of that, his self-disclosure should be done precisely as well and he should not give to much information about himself or the product / service in the early stages of the relationship. â€Å"Most service marketers today recognize the importance of keeping customers and making them into better customers (Berry 1983). In marketing whole life insurance (and, perhaps, similar services), the sales-person's ability to affect the customer's commitment and dependency on the provider may be determined largely by the interpersonal relationship he or she establishes with the customer.Likewise, in service contexts characterized by continuous exchange activity and considerable purchase uncertainty, the long-term interests of the customer may be best served by initiating and maintaining enduring relationships with salespeople† (Relationship Quality in Services Selling: An Interpersonal Influence Perspective). As mentio ned in the quote above, establishing good interpersonal relationship between the salesperson and the customer is crucial for any business these days.Moreover, in order to create good brand name for the business, the salesperson must have the ability to answer all the expectations of the customer, and to be trustworthy while doing so. The key issue for salesperson when he implicate the social penetration theory is not to hurry thing too much, for instance he can’t be intimate with the customer at the early stages of the relationship. He should be peaceful, and should have the ability to give the customer the opportunity to disclose himself and not to push him into the corner and by that scare him away.

Monday, September 30, 2019

Steven Holl – Ideas on Architecture

Steven Hold: Thoughts and Ideas on Architecture As I sit and listen to the rainfall, I can't help but wonder about the changing of seasons. Winter to spring, Spring to summer, summer to fall, fall back to winter. While each droplet of rain must have Journeyed long and far before it descended upon me, now it's Just a pool of droplets. The best part about spring is the rain showers. Without the spring rain we would have no summer flowers, no gardens, not leaves or grass. Spring marks the direction of a new change. One with more life, a new beginning of sorts.A precedent for the following months; a metamorphosis from en season to the next. Ancient Greek philosopher Heraclites found fascination with change in its most simple form. He believed that all is flux, and nothing stays still. But what if he was wrong†¦? If flux could be stopped what would happen? I could walk out into this storm and not be wet, for the droplets of rain are still and the clouds stationary. In the moment, I f ind tranquility in the storm. Peacefulness rests among the stillness of earth. Not a splash of water made, not a scour in the trees, not even a whistle to the wind.I think to myself, ‘The serenity of nature is unlike anything else in this world. All of a sudden, CLASH!! Lightning strikes followed by a violent boom of thunder. A nearby tree creaks like an old door opening as it falls to the ground; unexpectedly I became drenched by the rainfall. I sought shelter under a roof, but it seemed as if the world was at ease. Almost as if earth made a treaty with itself to remain motionless for the rest of time. Nevertheless, it wasn't because if nothing changed then storms wouldn't occur, seasons couldn't transpire, and life would be lifeless.This earth we live on is one of a kind and distinct from anything else. Earth speaks for itself and Heraclites states this excellently, â€Å"Not l, but the world says it all: All is one. And yet everything comes in season. † In comparison to the precedent of spring to the rest of the seasons, a person's early life can shape the following years in their life. Steven Holly's career was foreshadowed by his earliest years when he and his brother built a 3-story tree house and also an underground clubhouse. This was not only outlined in his childhood, but also in his years of education.While growing up in Beaverton, Washington, he developed the desire to make things, sculpt, draw, and build. After high school, Hold went to study architecture at the University of Washington. His Junior year he left the states and engulfed himself in the great city of Rome, moving from Beaverton, a shipyard city with little architectural density, to Rome, the pinnacle of architectural history. 5 While in Rome, the Vietnam War was taking place so, Hold, instead of developing his thoughts and ideas on architecture, wrote a conscientious objection on philosophical rather religious grounds.After receiving a reply, he was dismissed due to †Å"physical deformity' and never had an actual physical examination. Hold obsessed over his objection because he didn't want them to falsify his opposition, and consequently left Rome with no projects. Upon returning to Washington, he had difficulties finding a firm to hire him. After a year at a small firm outside of Seattle, Hold left to go to San Francisco, where he formed a union with William Stout and Bill Zimmerman; they called themselves â€Å"Opus 411 . † Together they entered competitions and wrote declarations of architecture, but all ended too soon, for Hold was broke and needed a job.In search of a Job and possible graduate school, Hold was accepted at Harvard, Princeton, and Yale, and on top of that hired at Louis Khan's office in Philadelphia. He made the decision to take the Job and decline the schools. Confusion descended once Hold received word of Khan's death. He declined acceptance to graduate schools for a Job that was no longer possible. Fortunately in 197 6, Hold was offered to study, tuition free, at the Architectural Association in London by a man named Alvin Boyar. 5 For that reason, Hold made another life-changing decision and packed his bags to go to London.During that time he traveled to every possible building to experience them first hand and to sketch hem. Living as a vagabond in the streets of London, by some meaner, Hold managed to find a client from Paris. His new client was upset with his noisy and crowded vacation home so Hold made large pencil drawings of a new retreat house offset from the shore. In one of the drawings he sketched a man on a boat headed to his refuge home, his back to the home and face to the shore. Hold comments, â€Å"The character in the rowboat illustrates the way that all of us must work. He cannot see where he is going, only where he has been.Progress is tempered by a sense of mystery, of doubt. â€Å"5 A couple years later, Hold made more elaborate pencil drawings of a project for the South B ronx called Gymnasium-Bridge. This project won a Progressive Architecture Award in 1978. Upset by the way his work was presented in Progressive Architecture, he called his colleague Bill Stout, who had opened a bookstore back in San Francisco to make a publication of manifestos and single projects. This was the inception of what would be known as â€Å"Pamphlet Architecture. † Hold set specific guidelines for him and his colleagues to follow for this publication.This was an avian-garden idea at the mime and gave new and unusual ways of looking at architecture. These anthologies feature groundbreaking works by forward thinkers of today's most well-known architects, including Steven Hold, Living Timidity, Lubbers Woods, and Gaza Had. 6/7 Holly's excerpts from Pamphlet Architecture are very much concerned with typology and morphology, that is, a study based on classification and also a study on building forms. â€Å"Pamphlet Architecture #5 The Alphabetical City' speaks on the nature of urban buildings during the first half of the 20th century.Hold inscribes, â€Å"†¦ The notorious portions of cities that evolved on gridiron plans – certain letter-like buildings recurred. The â€Å"L†, or the â€Å"l† type depend on their adjoining structures for meaning. They become â€Å"dead letters† when left stranded as free- standing buildings. â€Å"6 You can see here Hold had been analyzing buildings and then classifying certain buildings by the letter in the alphabet they resembled. The forms of these buildings from the generation before him caused him to questions the idea of architecture from that time.Holly's current language of architecture wasn't uncovered until he came across the arks of French philosopher Maurice Merle-Pointy in 1984. 1 This was a time when Hold radically changed his methods for making and understanding architecture. Subsequent to the discovery of Merle-Pointy, Hold brought light to the idea of deriving p rojects from concepts outside of architecture. Over the years, he harnessed this method and played with it as a departure for his work. From there on out, Hold became preoccupied with the idea of experience.Merle-Pointy expresses, â€Å"We know not through our intellect but through our experience. â€Å"3 The phenomenology that Merle-Pointy writes about is what Hold achieves in his architecture. While most architects work outside-in, Hold takes an opposite stance and works inside-out because he affirms that, â€Å"space is the incredible media of architecture. â€Å"8 It is an extraordinary responsibility to be an architect because the buildings we make are for people to use. Hold understands this and attempts to make people perceive space differently, to make something visible that they normally wouldn't.A work of his that exemplifies this is the Chapel of SST. Igniting in Seattle, Washington. In this project, Hold starts with the concept, ‘Seven Bottles of Light in a Sto ne Box. ‘ Each of the openings for light allow the sunlight to reflect off colored walls in a way that causes a conversion to colored-light. You can imagine being in the space that funnels colors at you making light ever more noticeable. This making of architecture relates building, site, and situation with body, space, time, light, and movement. 4 Holly's buildings really execute the interaction between architecture and phenomenology.It doesn't come as a surprise that Holly's major preoccupation is the phenomena of light. We live in a world that we know through vision, which can only be possible with the help of light. The dynamic of light defines several of Holly's works including: Writing With Light House, Porosity House, Sun Slice House, Kinsman Museum of Contemporary Art, Nelson-Atkins Museum of Art Addition, Chapel of SST. Igniting, Museum of the City, and NYU School of Philosophy. 2 However, these projects epitomize his thoughts on light, all of his works constitute and deal with light.Specifically in Writing with Light House, Hold inscribes light in such a way that celebrates light and, its counterpart, shadow. Strips of white light coat the interior in accord with the time of day and season. Shadows then become the strokes on the reface causing an ornament of pattern. This strategy shapes light that really gives it meaning and insight. It's not only the approach on light that makes his architecture original, but also his ability to take familiar ideas and transform them into something new. It wasn't until the ass's when Hold started consistently getting things built.Part of the struggle in his career was becoming famous. This can be challenging because of cruel criticisms or lack of attention towards your work. For Hold, it wasn't until after his Pace Collection Showroom in New York, that he received a world-known status. He was given a huge amount of critical attention in New York, Europe, and Asia for his new and fresh take on modernism. It to ok a couple decades but he now has work in Italy, Germany, France, Japan, Finland, Switzerland, Norway, The Netherlands, Denmark, and China.Holly's originality that is known throughout the world is, in part, due to his way of thinking and developing ideas. It is not necessarily theories of architecture that shaped this, but phenomenology and science that have shaped his beliefs and ideas. Ideas are very important to Hold and this is where he derives his inspiration. He is fearless when it comes to addressing the world at large for inspiration in his projects. Many shy away because of the criticisms one will face for fear of comparison to larger ideas, nevertheless Hold is audacious.Audacity is exactly what Hold advocates. He encourages students to question everything and this is one reason he, himself, has become such a success. 8 One part of being an architect is that you must be able to fluently articulate your personal thoughts and ideas, rather than simply following the ideas of someone else. It then becomes a push for what you think should happen. Holly's character is tested when working with clients because he must be uncompromising and demanding if he wants to pursue the realization of his concepts. His self-assurance comes from the knowledge of himself.He has never had any doubts on who he is and what he wants to accomplish, and this has lead to his triumph. Even though he must be adamant and resolute, he has sought criticism from respected colleagues and peers of his designs over the years. 2 Hold discusses their commentary and evaluation with them after overcoming his incredulity. This is a testament of his respect for other people's opinions and ideas. It also reveals his wisdom in seeking out honest and tough critiques. This may be the reason he is able to keep his knife so sharp.Without the help of others, he would become dull, thereby making his architecture banal. This essay ends with a glimpse of the way Steven Hold sees architecture for the 21 st Century. Hold was born in 1947. He lived in latter half of the 20th Century; he saw and helped change the way architecture is defined today. He truly sees how architecture has been grounded by the physical aspects of having limited resources in the past, to the increasing technological ways in which we can now build. The constructive ramification into modern life and new ways of seeing are vital traits he believes today's architects must have.Hold elaborates, â€Å"Any architect caught up with the current speed of globalization of today's architecture realizes that this is an unprecedented time in the history of architecture: requiring an unprecedented philosophical commitment. † He continues, â€Å"†¦ The challenge of extremely diverse lands, cultures, and climates and their urban conditions set unparalleled obligations for architecture today†¦ A theory reversing specific to universal – a black swan theory – suggests an aim for larger, more comple x building types.A twenty-first century position that strives to airframe the inherited dualism of the last century's suffixes might spark a new paradigm shift toward a new focus on architecture's potential to shape experience, interrelating body, brain and world. â€Å"3 A new generation will emerge after the passing of Steven Hold, one inspired by the books and buildings he bequeathed to humanity. For now, Hold will continue to be a leading architect in the world. It's a great field to be apart of with myriad possibilities, and it is my hope to one day be given the chance to make a richer environment and Join the field of architecture.

Sunday, September 29, 2019

User Authentication Through Mouse Dynamics

16 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 User Authentication Through Mouse Dynamics Chao Shen, Student Member, IEEE, Zhongmin Cai, Member, IEEE, Xiaohong Guan, Fellow, IEEE, Youtian Du, Member, IEEE, and Roy A. Maxion, Fellow, IEEE Abstract—Behavior-based user authentication with pointing devices, such as mice or touchpads, has been gaining attention. As an emerging behavioral biometric, mouse dynamics aims to address the authentication problem by verifying computer users on the basis of their mouse operating styles.This paper presents a simple and ef? cient user authentication approach based on a ? xed mouse-operation task. For each sample of the mouse-operation task, both traditional holistic features and newly de? ned procedural features are extracted for accurate and ? ne-grained characterization of a user’s unique mouse behavior. Distance-measurement and eigenspace-transformation techniques are applied to obtain featur e components for ef? ciently representing the original mouse feature space.Then a one-class learning algorithm is employed in the distance-based feature eigenspace for the authentication task. The approach is evaluated on a dataset of 5550 mouse-operation samples from 37 subjects. Extensive experimental results are included to demonstrate the ef? cacy of the proposed approach, which achieves a false-acceptance rate of 8. 74%, and a false-rejection rate of 7. 69% with a corresponding authentication time of 11. 8 seconds. Two additional experiments are provided to compare the current approach with other approaches in the literature.Our dataset is publicly available to facilitate future research. Index Terms—Biometric, mouse dynamics, authentication, eigenspace transformation, one-class learning. I. INTRODUCTION T HE quest for a reliable and convenient security mechanism to authenticate a computer user has existed since the inadequacy of conventional password mechanism was reali zed, ? rst by the security community, and then gradually by the Manuscript received March 28, 2012; revised July 16, 2012; accepted September 06, 2012. Date of publication October 09, 2012; date of current version December 26, 2012.This work was supported in part by the NSFC (61175039, 61103240, 60921003, 60905018), in part by the National Science Fund for Distinguished Young Scholars (60825202), in part by 863 High Tech Development Plan (2007AA01Z464), in part by the Research Fund for Doctoral Program of Higher Education of China (20090201120032), and in part by Fundamental Research Funds for Central Universities (2012jdhz08). The work of R. A. Maxion was supported by the National Science Foundation under Grant CNS-0716677. Any opinions, ? dings, conclusions, or recommendations expressed in this material are those of the authors, and do not necessarily re? ect the views of the National Science Foundation. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Sviatoslav Voloshynovskiy. C. Shen, Z. Cai, X. Guan, and Y. Du are with the MOE Key Laboratory for Intelligent Networks and Network Security, Xi’an Jiaotong University, Xi’an, Shaanxi, 710049, China (e-mail: [email  protected] xjtu. edu. cn; [email  protected] xjtu. edn. cn; [email  protected] xjtu. edu. cn; [email  protected] jtu. edu. cn). R. A. Maxion is with the Dependable Systems Laboratory, Computer Science Department, Carnegie Mellon University, Pittsburgh, PA 15213 USA (e-mail: [email  protected] cmu. edu). Color versions of one or more of the ? gures in this paper are available online at http://ieeexplore. ieee. org. Digital Object Identi? er 10. 1109/TIFS. 2012. 2223677 public [31]. As data are moved from traditional localized computing environments to the new Cloud Computing paradigm (e. g. , Box. net and Dropbox), the need for better authentication has become more pressing.Recently, several large-scale password leakages exposed users to an unprecedented risk of disclosure and abuse of their information [47], [48]. These incidents seriously shook public con? dence in the security of the current information infrastructure; the inadequacy of password-based authentication mechanisms is becoming a major concern for the entire information society. Of various potential solutions to this problem, a particularly promising technique is mouse dynamics. Mouse dynamics measures and assesses a user’s mouse-behavior characteristics for use as a biometric.Compared with other biometrics such as face, ? ngerprint and voice [20], mouse dynamics is less intrusive, and requires no specialized hardware to capture biometric information. Hence it is suitable for the current Internet environment. When a user tries to log into a computer system, mouse dynamics only requires her to provide the login name and to perform a certain sequence of mouse operations. Extracted behavioral features, based on mouse movements and clicks, are compared to a legitimate user’s pro? le. A match authenticates the user; otherwise her access is denied.Furthermore, a user’s mouse-behavior characteristics can be continually analyzed during her subsequent usage of a computer system for identity monitoring or intrusion detection. Yampolskiy et al. provide a review of the ? eld [45]. Mouse dynamics has attracted more and more research interest over the last decade [2]–[4], [8], [14]–[17], [19], [21], [22], [33], [34], [39]–[41], [45], [46]. Although previous research has shown promising results, mouse dynamics is still a newly emerging technique, and has not reached an acceptable level of performance (e. . , European standard for commercial biometric technology, which requires 0. 001% false-acceptance rate and 1% false-rejection rate [10]). Most existing approaches for mouse-dynamics-based user authentication result in a low authentication accuracy or an unreasonably long authenticatio n time. Either of these may limit applicability in real-world systems, because few users are willing to use an unreliable authentication mechanism, or to wait for several minutes to log into a system.Moreover, previous studies have favored using data from real-world environments over experimentally controlled environments, but this realism may cause unintended side-effects by introducing confounding factors (e. g. , effects due to different mouse devices) that may affect experimental results. Such confounds can make it dif? cult to attribute experimental outcomes solely to user behavior, and not to other factors along the long path of mouse behavior, from hand to computing environment [21], [41]. 1556-6013/$31. 00  © 2012 IEEE SHEN et al. : USER AUTHENTICATION THROUGH MOUSE DYNAMICS 17It should be also noted that most mouse-dynamics research used data from both the impostors and the legitimate user to train the classi? cation or detection model. However, in the scenario of mouse-d ynamics-based user authentication, usually only the data from the legitimate user are readily available, since the user would choose her speci? c sequence of mouse operations and would not share it with others. In addition, no datasets are published in previous research, which makes it dif? cult for third-party veri? cation of previous work and precludes objective comparisons between different approaches.A. Overview of Approach Faced with the above challenges, our study aims to develop a mouse-dynamics-based user authentication approach, which can perform user authentication in a short period of time while maintaining high accuracy. By using a controlled experimental environment, we have isolated inherent behavioral characteristics as the primary factors for mouse-behavior analysis. The overview of the proposed approach is shown in Fig. 1. It consists of three major modules: (1) mouse-behavior capture, (2) feature construction, and (3) training/classi? cation. The ? st module serves to create a mouse-operation task, and to capture and interpret mouse-behavior data. The second module is used to extract holistic and procedural features to characterize mouse behavior, and to map the raw features into distance-based features by using various distance metrics. The third module, in the training phase, applies kernel PCA on the distance-based feature vectors to compute the predominant feature components, and then builds the user’s pro? le using a one-class classi? er. In the classi? cation phase, it determines the user’s identity using the trained classi? r in the distance-based feature eigenspace. B. Purpose and Contributions of This Paper This paper is a signi? cant extension of an earlier and much shorter version [40]. The main purpose and major contributions of this paper are summarized as follows: †¢ We address the problem of unintended side-effects of inconsistent experimental conditions and environmental variables by restricting usersâ€℠¢ mouse operations to a tightly-controlled environment. This isolates inherent behavioral characteristics as the principal factors in mouse behavior analysis, and substantially reduces the effects of external confounding factors. Instead of the descriptive statistics of mouse behaviors usually adopted in existing work, we propose newly-de? ned procedural features, such as movement speed curves, to characterize a user’s unique mouse-behavior characteristics in an accurate and ? ne-grained manner. These features could lead to a performance boost both in authentication accuracy and authentication time. †¢ We apply distance metrics and kernel PCA to obtain a distance-based eigenspace for ef? ciently representing the original mouse feature space.These techniques partially handle behavioral variability, and make our proposed approach stable and robust to variability in behavior data. †¢ We employ one-class learning methods to perform the user authentication task, so that the detection model is Fig. 1. Overview of approach. built solely on the data from the legitimate user. One-class methods are more suitable for mouse-dynamics-based user authentication in real-world applications. †¢ We present a repeatable and objective evaluation procedure to investigate the effectiveness of our proposed approach through a series of experiments.As far as we know, no earlier work made informed comparisons between different features and results, due to the lack of a standard test protocol. Here we provide comparative experiments to further examine the validity of the proposed approach. †¢ A public mouse-behavior dataset is established (see Section III for availability), not only for this study but also to foster future research. This dataset contains high-quality mouse-behavior data from 37 subjects. To our knowledge, this study is the ? rst to publish a shared mouse-behavior dataset in this ? eld. This study develops a mouse-dynamics-based user authenticat ion approach that performs user authentication in a short time while maintaining high accuracy. It has several desirable properties: 1. it is easy to comprehend and implement; 2. it requires no specialized hardware or equipment to capture the biometric data; 3. it requires only about 12 seconds of mouse-behavior data to provide good, steady performance. The remainder of this paper is organized as follows: Section II describes related work. Section III presents a data-collection process. Section IV describes the feature-construction process.Section V discusses the classi? cation techniques for mouse dynamics. Section VI presents the evaluation methodology. Section VII presents and analyzes experimental results. Section VIII offers a discussion and possible extensions of the current work. Finally, Section IX concludes. 18 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 II. BACKGROUND AND RELATED WORK In this section, we provide background on mouse- dynamics research, and various applications for mouse dynamics (e. g. , authentication versus intrusion detection).Then we focus on applying mouse dynamics to user authentication. A. Background of Mouse Dynamics Mouse dynamics, a behavioral biometric for analyzing behavior data from pointing devices (e. g. , mouse or touchpad), provides user authentication in an accessible and convenient manner [2]–[4], [8], [14]–[17], [19], [21], [22], [33], [34], [39]–[41], [45], [46]. Since Everitt and McOwan [14] ? rst investigated in 2003 whether users could be distinguished by the use of a signature written by mouse, several different techniques and uses for mouse dynamics have been proposed.Most researchers focus on the use of mouse dynamics for intrusion detection (sometimes called identity monitoring or reauthentication), which analyzes mouse-behavior characteristics throughout the course of interaction. Pusara and Brodley [33] proposed a reauthentication scheme using m ouse dynamics for user veri? cation. This study presented positive ? ndings, but cautioned that their results were only preliminary. Gamboa and Fred [15], [16] were some of the earliest researchers to study identity monitoring based on mouse movements.Later on, Ahmed and Traore [3] proposed an approach combining keystroke dynamics with mouse dynamics for intrusion detection. Then they considered mouse dynamics as a standalone biometric for intrusion detection [2]. Recently, Zheng et al. [46] proposed angle-based metrics of mouse movements for reauthentication systems, and explored the effects of environmental factors (e. g. , different machines). Yet only recently have researchers come to the use of mouse dynamics for user authentication (sometimes called static authentication), which analyzes mouse-behavior characteristics at particular moments.In 2007, Gamboa et al. [17] extended their approaches in identity monitoring [15], [16] into web-based authentication. Later on, Kaminsky e t al. [22] presented an authentication scheme using mouse dynamics for identifying online game players. Then, Bours and Fullu [8] proposed an authentication approach by requiring users to make use of the mouse for tracing a maze-like path. Most recently, a full survey of the existing work in mouse dynamics pointed out that mouse-dynamics research should focus on reducing authentication time and taking the effect of environmental variables into account [21]. B.User Authentication Based on Mouse Dynamics The primary focus of previous research has been on the use of mouse dynamics for intrusion detection or identity monitoring. It is dif? cult to transfer previous work directly from intrusion detection to authentication, however, because a rather long authentication period is typically required to collect suf? cient mouse-behavior data to enable reasonably accurate veri? cation. To our knowledge, few papers have targeted the use of mouse dynamics for user authentication, which will be the central concern of this paper. Hashia et al. [19] and Bours et al. 8] presented some preliminary results on mouse dynamics for user authentication. They both asked participants to perform ? xed sequences of mouse operations, and they analyzed behavioral characteristics of mouse movements to authenticate a user during the login stage. Distance-based classi? ers were established to compare the veri? cation data with the enrollment data. Hashia et al. collected data from 15 participants using the same computer, while Bours et al. collected data from 28 subjects using different computers; they achieved equal-error rates of 15% and 28% respectively.Gamboa et al. [17] presented a web-based user authentication system based on mouse dynamics. The system displayed an on-screen virtual keyboard, and required users to use the mouse to enter a paired username and pin-number. The extracted feature space was reduced to a best subspace through a greedy search process. A statistical model based on the Weibull distribution was built on training data from both legitimate and impostor users. Based on data collected from 50 subjects, the researchers reported an equal-error rate of 6. 2%, without explicitly reporting authentication time.The test data were also used for feature selection, which may lead to an overly optimistic estimate of authentication performance [18]. Recently, Revett et al. [34] proposed a user authentication system requiring users to use the mouse to operate a graphical, combination-lock-like GUI interface. A small-scale evaluation involving 6 subjects yielded an average false-acceptance rate and false-rejection rate of around 3. 5% and 4% respectively, using a distance-based classi? er. However, experimental details such as experimental apparatus and testing procedures were not explicitly reported. Aksari et al. 4] presented an authentication framework for verifying users based on a ? xed sequence of mouse movements. Features were extracted from nine move ments among seven squares displayed consecutively on the screen. They built a classi? er based on scaled Euclidean distance using data from both legitimate users and impostors. The researchers reported an equal-error rate of 5. 9% over 10 users’ data collected from the same computer, but authentication time was not reported. It should be noted that the above two studies were performed on a small number of users—only 6 users in [34], and 10 users in [4]—which may be insuf? ient to evaluate de? nitively the performance of these approaches. The results of the above studies have been mixed, possibly due to the realism of the experiments, possibly due to a lack of real differences among users, or possibly due to experimental errors or faulty data. A careful reading of the literature suggests that (1) most approaches have resulted in low performance, or have used a small number of users, but since these studies do not tend to be replicated, it is hard to pin the discr epancies on any one thing; (2) no research group provided a shared dataset.In our study, we control the experimental environment to increase the likelihood that our results will be free from experimental confounding factors, and we attempt to develop a simple and ef? cient user authentication approach based on mouse dynamics. We also make our data available publicly. III. MOUSE DATA ACQUISITION In this study, we collect mouse-behavior data in a controlled environment, so as to isolate behavioral characteristics as the principal factors in mouse behavior analysis. We offer here SHEN et al. USER AUTHENTICATION THROUGH MOUSE DYNAMICS 19 considerable detail regarding the conduct of data collection, because these particulars can best reveal potential biases and threats to experimental validity [27]. Our data set is available 1. A. Controlled Environment In this study, we set up a desktop computer and developed a Windows application as a uniform hardware and software platform for the coll ection of mouse-behavior data. The desktop was an HP workstation with a Core 2 Duo 3. 0 GHz processor and 2 GB of RAM.It was equipped with a 17 HP LCD monitor (set at 1280 1024 resolution) and a USB optical mouse, and ran the Windows XP operating system. Most importantly, all system parameters relating to the mouse, such as speed and sensitivity con? gurations, were ? xed. The Windows application, written in C#, prompted a user to conduct a mouse-operation task. During data collection, the application displayed the task in a full-screen window on the monitor, and recorded (1) the corresponding mouse operations (e. g. , mouse-single-click), (2) the positions at which the operations occurred, and (3) the timestamps of the operations.The Windows-event clock was used to timestamp mouse operations [28]; it has a resolution of 15. 625 milliseconds, corresponding to 64 updates per second. When collecting data, each subject was invited to perform a mouse-operations task on the same desktop computer free of other subjects; data collection was performed one by one on the same data-collection platform. These conditions make hardware and software factors consistent throughout the process of data collection over all subjects, thus removing unintended side-effects of unrelated hardware and software factors. B.Mouse-Operation Task Design To reduce behavioral variations due to different mouse-operation sequences, all subjects were required to perform the same sequence of mouse operations. We designed a mouse-operation task, consisting of a ? xed sequence of mouse operations, and made these operations representative of a typical and diverse combination of mouse operations. The operations were selected according to (1) two elementary operations of mouse clicks: single click and double click; and (2) two basic properties of mouse movements: movement direction and movement distance [2], [39].As shown in Fig. 2, movement directions are numbered from 1 to 8, and each of them is sel ected to represent one of eight 45-degree ranges over 360 degrees. In addition, three distance intervals are considered to represent short-, middle- and long-distance mouse movements. Table I shows the directions and distances of the mouse movements used in this study. During data collection, every two adjacent movements were separated by either a single click or a double click. As a whole, the designed task consists of 16 mouse movements, 8 single clicks, and 8 double clicks.It should be noted that our task may not be unique. However, the task was carefully chosen to induce users to perform a wide variety of mouse movements and clicks that were both typical and diverse in an individual’s repertoire of daily mouse behaviors. 1The mouse-behavior dataset is available from: http://nskeylab. xjtu. edu. cn/ projects/mousedynamics/behavior-data-set/. Fig. 2. Mouse movement directions: sector 1 covers all operations performed degrees and degrees. with angles between TABLE I MOUSE MO VEMENTS IN THE DESIGNED MOUSE-OPERATION TASK C.Subjects We recruited 37 subjects, many from within our lab, but some from the university at large. Our sample of subjects consisted of 30 males and 7 females. All of them were right-handed users, and had been using a mouse for a minimum of two years. D. Data-Collection Process All subjects were required to participate in two rounds of data collection per day, and waited at least 24 hours between collections (ensuring that some day-to-day variation existed within the data). In each round, each subject was invited, one by one, to perform the same mouse-operation task 10 times.A mouse-operation sample was obtained when a subject performed the task one time, in which she ? rst clicked a start button on the screen, then moved the mouse to click subsequent buttons prompted by the data-collection application. Additionally, subjects were instructed to use only the external mouse device, and they were advised that no keyboard would be needed. S ubjects were told that if they needed a break or needed to stretch their hands, they were to do so after they had accomplished a full round. This was intended to prevent arti? cially anomalous mouse operations in the middle of a task.Subjects were admonished to focus on the task, as if they were logging into their own accounts, and to avoid distractions, such as talking with the experimenter, while the task was in progress. Any error in the operating process (e. g. , single-clicking a button when requiring double-clicking it) caused the current task to be reset, requiring the subject to redo it. 20 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 TABLE II MOUSE DYNAMICS FEATURES Subjects took between 15 days and 60 days to complete data collection.Each subject accomplished 150 error-free repetitions of the same mouse-operation task. The task took between 6. 2 seconds and 21. 3 seconds, with an average of 11. 8 seconds over all subjects. The ? nal dataset contained 5550 samples from 37 subjects. IV. FEATURE CONSTRUCTION In this section, we ? rst extract a set of mouse-dynamics features, and then we use distance-measurement methods to obtain feature-distance vectors for reducing behavioral variability. Next, we utilize an eigenspace transformation to extract principal feature components as classi? er input. A.Feature Extraction The data collected in Section III are sequences of mouse operations, including left-single-clicks, left-double-clicks, and mouse-movements. Mouse features were extracted from these operations, and were typically organized into a vector to represent the sequence of mouse operations in one execution of the mouse-operation task. Table II summarizes the derived features in this study. We characterized mouse behavior based on two basic types of mouse operations—mouse click and mouse movement. Each mouse operation was then analyzed individually, and translated into several mouse features.Our study divi ded these features into two categories: †¢ Holistic features: features that characterize the overall properties of mouse behaviors during interactions, such as single-click and double-click statistics; †¢ Procedural features: features that depict the detailed dynamic processes of mouse behaviors, such as the movement speed and acceleration curves. Most traditional features are holistic features, which suf? ce to obtain a statistical description of mouse behavior, such as the mean value of click times. They are easy to compute and comprehend, but they only characterize general attributes of mouse behavior.In our study, the procedural features characterize in-depth procedural details of mouse behavior. This information more accurately re? ects the ef? ciency, agility and motion habits of individual mouse users, and thus may lead to a performance boost for authentication. Experimental results in Section VII demonstrate the effectiveness of these newly-de? ned features. B. Dis tance Measurement The raw mouse features cannot be used directly by a classi? er, because of high dimensionality and behavioral variability. Therefore, distance-measurement methods were applied to obtain feature-distance vectors and to mitigate the effects of these issues.In the calculation of distance measurement, we ? rst used the Dynamic Time Warping (DTW) distance [6] to compute the distance vector of procedural features. The reasons for this choice are that (1) procedural features (e. g. , movement speed curve) of two data samples are not likely to consist of the exactly same number of points, whether these samples are generated by the same or by different subjects; (2) DTW distance can be applied directly to measure the distance between the procedural features of two samples without deforming either or both of the two sequences in order to get an equal number of points.Next, we applied Manhattan distance to calculate the distance vector of holistic features. The reasons for th is choice are that (1) this distance is independent between dimensions, and can preserve physical interpretation of the features since its computation is the absolute value of cumulative difference; (2) previous research in related ? elds (e. g. , keystroke dynamics) reported that the use of Manhattan distance for statistical features could lead to a better performance [23]. ) Reference Feature Vector Generation: We established the reference feature vector for each subject from her training feature vectors. Let , be the training set of feature vectors for one subject, where is a -dimensional mouse feature vector extracted from the th training sample, and is the number of training samples. Consider how the reference feature vector is generated for each subject: Step 1: we computed the pairwise distance vector of procedural features and holistic features between all pairs of training feature vectors and .We used DTW distance to calculate the distance vector of procedural features for measuring the similarity between the procedural components of the two feature vectors, and we applied Manhattan distance to calculate the distance vector of holistic features . (1) where , and represents the procedural components of represents the holistic components. SHEN et al. : USER AUTHENTICATION THROUGH MOUSE DYNAMICS 21 Step 2: we concatenated the distance vectors of holistic features and procedural features together to obtain a distance vector for the training feature vectors and by (2) Step 3: we normalized vector: to get a scale-invariant feature nd sample covariance . Then we can obtain the mean of such a training set by (5) (6) (3) is the mean of all where pairwise distance vectors from the training set, and is the corresponding standard deviation. Step 4: for each training feature vector, we calculated the arithmetic mean distance between this vector and the remaining training vectors, and found the reference feature vector with minimum mean distance. (4) 2) Feature-Dis tance Vector Calculation: Given the reference feature vector for each subject, we then computed the feature-distance vector between a new mouse feature vector and the reference vector.Let be the reference feature vector for one subject; then for any new feature vector (either from the legitimate user or an impostor), we can compute the corresponding distance vector by (1), (2) and (3). In this paper, we used all mouse features in Table II to generate the feature-distance vector. There are 10 click-related features, 16 distance-related features, 16 time-related features, 16 speed-related features, and 16 acceleration-related features, which were taken together and then transformed to a 74-dimensional feature-distance vector that represents each mouse-operation sample. C.Eigenspace Computation: Training and Projection It is usually undesirable to use all components in the feature vector as input for the classi? er, because much of data will not provide a signi? cant degree of uniquene ss or consistency. We therefore applied an eigenspace-transformation technique to extract the principal components as classi? er input. 1) Kernel PCA Training: Kernel principal component analysis (KPCA) [37] is one approach to generalizing linear PCA to nonlinear cases using kernel methods. In this study, the purpose of KPCA is to obtain the principal components of the original feature-distance vectors.The calculation process is illustrated as follows: For each subject, the training set represents a set of feature-distance vectors drawn from her own data. Let be the th feature-distance vector in the training set, and be the number of such vectors. We ? rst mapped the measured vectors into the hyperdimensional feature space by the nonlinear mapping Here we centered the mapped point with the corresponding mean as . The principal components were then computed by solving the eigenvalue problem: (7) where and . Then, by de? ning a kernel matrix (8) we computed an eigenvalue problem for t he coef? ients is now solely dependent on the kernel function , that (9) For details, readers can refer to B. Scholkopf et al. [37]. Generally speaking, the ? rst few eigenvectors correspond to large eigenvalues and most information in the training samples. Therefore, for the sake of providing the principal components to represent mouse behavior in a low-dimensional eigenspace, and for memory ef? ciency, we ignored small eigenvalues and their corresponding eigenvectors, using a threshold value (10) is the accumulated variance of the ? st largest eigenwhere values with respect to all eigenvalues. In this study, was chosen as 0. 95 for all subjects, with a range from 0 to 1. Note that we used the same for different subjects, so may be different from one subject to another. Speci? cally, in our experiments, we observed that the number of principal components for different subjects varied from 12 to 20, and for an average level, 17 principal components are identi? ed under the threshold of 0. 95. 2) Kernel PCA Projection: For the selected subject, taking the largest eigenvalues and he associated eigenvectors, the transform matrix can be constructed to project an original feature-distance vector into a point in the -dimensional eigenspace: (11) As a result, each subject’s mouse behavior can be mapped into a manifold trajectory in such a parametric eigenspace. It is wellknown that is usually much smaller than the dimensionality of the original feature space. That is to say, eigenspace analysis can dramatically reduce the dimensionality of input samples. In this way, we used the extracted principal components of the feature-distance vectors as input for subsequent classi? ers. 22IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 V. CLASSIFIER IMPLEMENTATION This section explains the classi? er that we used, and introduces two other widely-used classi? ers. Each classi? er analyzes mouse-behavior data, and discriminates between a legitimate user and impostors. A. One-Class Classi? er Overview User authentication is still a challenging task from the pattern-classi? cation perspective. It is a two-class (legitimate user versus impostors) problem. In the scenario of mouse-dynamicsbased user authentication, a login user is required to provide the user name and to perform a speci? mouse-operation task which would be secret, like a password. Each user would choose her own mouse-operations task, and would not share that task with others. Thus, when building a model for a legitimate user, the only behavioral samples of her speci? c task are her own; other users’ (considered as impostors in our scenario) samples of this task are not readily available. In this scenario, therefore, an appropriate solution is to build a model based only on the legitimate user’s data samples, and use that model to detect impostors. This type of problem is known as one-class classi? ation [43] or novelty/anomaly detection [25], [26]. We thus focused our attention on this type of problem, especially because in a real-world situation we would not have impostor renditions of a legitimate user’s mouse operations anyway. B. Our Classi? er—One-Class Support Vector Machine Traditional one-class classi? cation methods are often unsatisfying, frequently missing some true positives and producing too many false positives. In this study, we used a one-class Support Vector Machine (SVM) classi? er, introduced by Scholkopf et al. [36], [38]. One-class SVMs have been successfully applied to a number of real-life classi? ation problems, e. g. , face authentication, signature veri? cation and keystroke authentication [1], [23]. In our context, given training samples belonging to one subject, , each sample has features (corresponding to the principal components of the feature-distance vector for that subject). The aim is to ? nd a hyperplane that separates the data points by the largest margin. To separ ate the data points from the origin, one needs to solve the following dual quadratic programming problem [36], [38]: the origin, and is the kernel function. We allow for nonlinear decision boundaries. Then the decision function 13) will be positive for the examples from the training set, where is the offset of the decision function. In essence, we viewed the user authentication problem as a one-class classi? cation problem. In the training phase, the learning task was to build a classi? er based on the legitimate subject’s feature samples. In the testing phase, the test feature sample was projected into the same high-dimensional space, and the output of the decision function was recorded. We used a radial basis function (RBF) in our evaluation, after comparative studies of linear, polynomial, and sigmoid kernels based on classi? ation accuracy. The SVM parameter and kernel parameter (using LibSVM [11]) were set to 0. 06 and 0. 004 respectively. The decision function would gen erate â€Å" † if the authorized user’s test set is input; otherwise it is a false rejection case. On the contrary, â€Å" † should be obtained if the impostors’ test set is the input; otherwise a false acceptance case occurs. C. Other Classi? ers—Nearest Neighbor and Neural Network In addition, we compared our classi? er with two other widely-used classi? ers, KNN and neural network [12]. For KNN, in the training phase, the nearest neighbor classi? r estimated the covariance matrix of the training feature samples, and saved each feature sample. In the testing phase, the nearest neighbor classi? er calculated Mahalanobis distance from the new feature sample to each of the samples in the training data. The average distance, from the new sample to the nearest feature samples from the training data, was used as the anomaly score. After multiple tests with ranging from 1 to 5, we obtained the best results with , detailed in Section VII. For the neural network, in the training phase a network was built with input nodes, one output node, and hidden nodes.The network weights were randomly initialized between 0 and 1. The classi? er was trained to produce a 1. 0 on the output node for every training feature sample. We trained for 1000 epochs using a learning rate of 0. 001. In the testing phase, the test sample was run through the network, and the output of the network was recorded. Denote to be the output of the network; intuitively, if is close to 1. 0, the test sample is similar to the training samples, and with close to 0. 0, it is dissimilar. VI. EVALUATION METHODOLOGY This section explains the evaluation methodology for mouse behavior analysis.First, we summarize the dataset collected in Section III. Next, we set up the training and testing procedure for our one-class classi? ers. Then, we show how classi? er performance was calculated. Finally, we introduce a statistical testing method to further analyze experimental results. (12) where is the vector of nonnegative Lagrangian multipliers to be determined, is a parameter that controls the trade-off between maximizing the number of data points contained by the hyperplane and the distance of the hyperplane from SHEN et al. : USER AUTHENTICATION THROUGH MOUSE DYNAMICS 23A. Dataset As discussed in Section III, samples of mouse-behavior data were collected when subjects performed the designed mouseoperation task in a tightly-controlled environment. All 37 subjects produced a total of 5550 mouse-operation samples. We then calculated feature-distance vectors, and extracted principal components from each vector as input for the classi? ers. B. Training and Testing Procedure Consider a scenario as mentioned in Section V-A. We started by designating one of our 37 subjects as the legitimate user, and the rest as impostors. We trained the classi? er and ested its ability to recognize the legitimate user and impostors as follows: Step 1: We trained the classi? er to b uild a pro? le of the legitimate user on a randomly-selected half of the samples (75 out of 150 samples) from that user. Step 2: We tested the ability of the classi? er to recognize the legitimate user by calculating anomaly scores for the remaining samples generated by the user. We designated the scores assigned to each sample as genuine scores. Step 3: We tested the ability of the classi? er to recognize impostors by calculating anomaly scores for all the samples generated by the impostors.We designated the scores assigned to each sample as impostor scores. This process was then repeated, designating each of the other subjects as the legitimate user in turn. In the training phase, 10-fold cross validation [24] was employed to choose parameters of the classi? ers. Since we used a random sampling method to divide the data into training and testing sets, and we wanted to account for the effect of this randomness, we repeated the above procedure 50 times, each time with independently selected samples drawn from the entire dataset. C. Calculating Classi? r Performance To convert these sets of classi? cation scores of the legitimate user and impostors into aggregate measures of classi? er performance, we computed the false-acceptance rate (FAR) and false-rejection rate (FRR), and used them to generate an ROC curve [42]. In our evaluation, for each user, the FAR is calculated as the ratio between the number of false acceptances and the number of test samples of impostors; the FRR is calculated as the ratio between the number of false rejections and the number of test samples of legitimate users.Then we computed the average FAR and FRR over all subjects. Whether or not a mouse-operation sample generates an alarm depends on the threshold for the anomaly scores. An anomaly score over the threshold indicates an impostor, while a score under the threshold indicates a legitimate user. In many cases, to make a user authentication scheme deployable in practice, minimizing the possibility of rejecting a true user (lower FRR) is sometimes more important than lowering the probability of accepting an impostor [46]. Thus we adjusted the threshold according to the FRR for the training data.Since calculation of the FRR requires only the legitimate user’s data, no impostor data was used for determining the threshold. Speci? cally, the threshold is set to be a variable ranging from , and will be chosen with a relatively low FRR using 10-fold cross validation on the training data. After multiple tests, we observe that setting the threshold to a value of 0. 1 yields a low FRR on average2. Thus, we show results with a threshold value of 0. 1 throughout this study. D. Statistical Analysis of the Results To evaluate the performance of our approach, we developed a statistical test using the half total error rate (HTER) and con? ence-interval (CI) evaluation [5]. The HTER test aims to statistically evaluate the performance for user authentication, which is de ? ned by combining false-acceptance rate (FAR) and falserejection rate (FRR): (14) Con? dence intervals are computed around the HTER as , and and are computed by [5]: (15) % % % (16) where NG is the total number of genuine scores, and NI is the total number of impostor scores. VII. EXPERIMENTAL RESULTS AND ANALYSIS Extensive experiments were carried out to verify the effectiveness of our approach. First, we performed the authentication task using our approach, and compared it with two widely-used classi? rs. Second, we examined our primary results concerning the effect of eigenspace transformation methods on classi? er performance. Third, we explored the effect of sample length on classi? er performance, to investigate the trade-off between security and usability. Two additional experiments are provided to compare our method with other approaches in the literature. A. Experiment 1: User Authentication In this section, we conducted a user authentication experiment, and compared our c lassi? er with two widely-used ones as mentioned in Section V-C. The data used in this experiment consisted of 5550 samples from 37 subjects.Fig. 3 and Table III show the ROC curves and average FARs and FRRs of the authentication experiment for each of three classi? ers, with standard deviations in parentheses. Table III also includes the average authentication time, which is the sum of the average time needed to collect the data and the average time needed to make the authentication decision (note that since the latter of these two times is always less than 0. 003 seconds in our classi? ers, we ignore it in this study). Our ? rst observation is that the best performance has a FAR of 8. 74% and a FRR of 7. 96%, obtained by our approach (one-class SVM).This result is promising and competitive, and the behavioral samples are captured over a much shorter period of time 2Note that for different classi? ers, there are different threshold intervals. For instance, the threshold interval fo r neural network detector is [0, 1], and for one. For uniform presentation, we mapped all of intervals class SVM, it is . to 24 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 TABLE IV HTER PERFORMANCE AND CONFIDENCE INTERVAL AT CONFIDENCE LEVELS DIFFERENT Fig. 3. ROC curves for the three different classi? rs used in this study: oneclass SVM, neural network, and nearest neighbor. TABLE III FARs AND FRRs OF USER AUTHENTICATION EXPERIMENT (WITH STANDARD DEVIATIONS IN PARENTHESES) information about mouse behavior, which could enhance performance. Finally, we conducted a statistical test, using the HTER and CI evaluation as mentioned in Section VI-D, to statistically evaluate the performance of our approach. Table IV summarizes the results of this statistical evaluation at different con? dence levels. The result shows that the proposed approach provides the lowest HTER in comparison with the other two classi? ers used in our study; the 95% con? ence interval lies at % %. B. Experiment 2: Effect of Eigenspace Transformation This experiment examined the effect of eigenspace-transformation methods on classi? er performance. The data used were the same as in Experiment 1. We applied a one-class SVM classi? er in three evaluations, with the inputs respectively set to be the original feature-distance vectors (without any transformations), the projection of feature-distance vectors by PCA, and the projection of feature-distance vectors by KPCA. Fig. 4 and Table V show the ROC curves and average FARs and FRRs for each of three feature spaces, with standard deviations in parentheses.As shown in Fig. 4 and Table V, the authentication accuracy for the feature space transformed by KPCA is the best, followed by the accuracies for feature spaces by PCA and the original one. Speci? cally, direct classi? cation in the original feature space (without transformations) produces a FAR of 15. 45% and FRR of 15. 98%. This result is not encouraging c ompared to results previously reported in the literature. However, as mentioned in Experiment 1, the samples may be subject to more behavioral variability compared with previous work, because previous work analyzed mouse behaviors over a longer period of observation.Moreover, we observe that the authentication results of % % by PCA, and % % by KPCA are much better than for direct classi? cation. This result is a demonstration of the effectiveness of the eigenspace transformation in dealing with variable behavior data. Furthermore, we ? nd that the performance of KPCA is slightly superior to that of PCA. This may be due to the nonlinear variability (or noise) existing in mouse behaviors, and KPCA can reduce this variability (or noise) by using kernel transformations [29].It is also of note that the standard deviations of FAR and FRR based on the feature space transformed by KPCA and PCA are smaller than those of the original feature space (without transformations), indicating that th e eigenspace-transformation technique enhances the stability and robustness of our approach. compared with previous work. It should be noted that our result does not yet meet the European standard for commercial biometric technology, which requires near-perfect accuracy of 0. 001% FAR and 1% FRR [10]. But it does demonstrate that mouse dynamics could provide valuable information in user authentication tasks.Moreover, with a series of incremental improvements and investigations (e. g. , outlier handling), it seems possible that mouse dynamics could be used as, at least, an auxiliary authentication technique, such as an enhancement for conventional password mechanisms. Our second observation is that our approach has substantially better performance than all other classi? ers considered in our study. This may be due to the fact that SVMs can convert the problem of classi? cation into quadratic optimization in the case of relative insuf? ciency of prior knowledge, and still maintain hig h accuracy and stability.In addition, the standard deviations of the FAR and FRR for our approach are much smaller than those for other classi? ers, indicating that our approach may be more robust to variable behavior data and different parameter selection procedures. Our third observation is that the average authentication time in our study is 11. 8 seconds, which is impressive and achieves an acceptable level of performance for a practical application. Some previous approaches may lead to low availability due to a relatively-long authentication time. However, an authentication time of 11. seconds in our study shows that we can perform mouse-dynamics analysis quickly enough to make it applicable to authentication for most login processes. We conjecture that the signi? cant decrease of authentication time is due to procedural features providing more detailed and ? ne-grained SHEN et al. : USER AUTHENTICATION THROUGH MOUSE DYNAMICS 25 TABLE VI FARs AND FRRs OF DIFFERENT SAMPLE LENGTH S Fig. 4. ROC curves for three different feature spaces: the original feature space, the projected feature space by PCA, and the projected feature space by KPCA.TABLE V FARs AND FARs FOR THREE DIFFERENT FEATURE SPACES (WITH STANDARD DEVIATIONS IN PARENTHESES) the needs of the European Standard for commercial biometric technology [10]. We ? nd that after observing 800 mouse operations, our approach can obtain a FAR of 0. 87% and a FRR of 0. 69%, which is very close to the European standard, but with a corresponding authentication time of about 10 minutes. This long authentication time may limit applicability in real systems. Thus, a trade-off must be made between security and user acceptability, and more nvestigations and improvements should be performed to secure a place for mouse dynamics in more pragmatic settings. D. Comparison User authentication through mouse dynamics has attracted growing interest in the research community. However, there is no shared dataset or baseline algor ithm for measuring and determining what factors affect performance. The unavailability of an accredited common dataset (such as the FERET database in face recognition [32]) and standard evaluation methodology has been a limitation in the development of mouse dynamics.Most researchers trained their models on different feature sets and datasets, but none of them made informed comparisons among different mouse feature sets and different results. Thus two additional experiments are offered here to compare our approach with those in the literature. 1) Comparison 1: Comparison With Traditional Features: As stated above, we constructed the feature space based on mouse clicks and mouse movements, consisting of holistic features and procedural features. To further examine the effectiveness of the features constructed in this study, we provide a comparative experiment. We chose the features used by Gamboa et al. 17], Aksari and Artuner [4], Hashia et al. [19], Bours and Fullu [8], and Ahmed a nd Traore [2], because they were among the most frequently cited, and they represented a relatively diverse set of mouse-dynamics features. We then used a one-class SVM classi? er to conduct the authentication experiment again on our same dataset with both the feature set de? ned in our study, and the feature sets used in other studies. Hence, the authentication accuracies of different feature sets can be compared. Fig. 5 and Table VII show the ROC curves and average FARs and FRRs for each of six feature sets, with standard deviations in parentheses.We can see that the average error rates for the feature set from our approach are much lower than those of the feature sets from the literature. We conjecture that this may be due to the procedural features providing ? ne-grained information about mouse behavior, but they may also be due, in part, to: (1) partial adoption of features de? ned in previous approaches C. Experiment 3: Effect of Sample Length This experiment explored the effe ct of sample length on classi? er performance, to investigate the trade-off between security (authentication accuracy) and usability (authentication time).In this study, the sample length corresponds to the number of mouse operations needed to form one data sample. Each original sample consists of 32 mouse operations. To explore the effect of sample length on the performance of our approach, we derived new datasets with different sample lengths by applying bootstrap sampling techniques [13] to the original dataset, to make derived datasets containing the same numbers of samples as the original dataset. The new data samples were generated in the form of multiple consecutive mouse samples from the original dataset. In this way, we considered classi? r performance as a function of the sample length using all bootstrap samples derived from the original dataset. We conducted the authentication experiment again (using one-class SVM) on six derived datasets, with and 800 operations. Table VI shows the FARs and FRRs at varying sample lengths, using a one-class SVM classi? er. The table also includes the authentication time in seconds. The FAR and FRR obtained using a sample length of 32 mouse operations are 8. 74% and 7. 96% respectively, with an authentication time of 11. 8 seconds. As the number of operations increases, the FAR and FRR drop to 6. 7% and 6. 68% for the a data sample comprised of 80 mouse operations, corresponding to an authentication time of 29. 88 seconds. Therefore, we may conclude that classi? er performance almost certainly gets better as the sample length increases. Note that 60 seconds may be an upper bound for authentication time, but the corresponding FAR of 4. 69% and FRR of 4. 46% are still not low enough to meet 26 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 Fig. 5. ROC curves for six different feature sets: the feature set in our study, and the features sets in other studies.RESULTS OF TABLE VII CO MPARISON WITH SOME TRADITIONAL FEATURES (WITH STANDARD DEVIATIONS IN PARENTHESES) Note that this approach [2] is initially applied to intrusion detection, and we extracted parts of features closely related to mouse operations in our dataset. The reason for this decision is that we want to examine whether the features employed in intrusion detection can be used in user authentication. because of different data-collection environments; (2) using different types of thresholds on the anomaly scores; (3) using less enrollment data than was used in previous experiments.The improved performance based on using our features also indicates that our features may allow more accurate and detailed characterization of a user’s unique mouse behavior than was possible with previously used features. Another thing to note from Table VII is that the standard deviations of error rates for features in our study are smaller than those for traditional features, suggesting that our features might be more stable and robust to variability in behavior data. One may also wonder how much of the authentication accuracy of our approach is due to the use of procedural features or holistic features.We tested our method using procedural features and holistic features separately, and the set of procedural features was the choice that proved to perform better. Specifically, we observe that the authentication accuracy of % % by using the set of procedural features is much better than for the set of holistic features, which have a FAR of 19. 58% and a FRR of 17. 96%. In combination with the result when using all features, it appears that procedural features may be more stable and discriminative than holistic features, which suggests that the procedural features contribute more to the authentication accuracy.The results here only provide preliminary comparative results and should not be used to conclude that a certain set of mouse features is always better than others. Each feature set has it s own unique advantages and disadvantages under different conditions and applications, so further evaluations and comparisons on more realistic and challenging datasets are needed. 2) Comparison 2: Comparison With Previous Work: Most previous approaches have either resulted in poor performance (in terms of authentication accuracy or time), or have used data of limited size.In this section, we show a qualitative comparison of our experimental results and settings against results of previous work (listed in Table VIII). Revett et al. [34] and Aksari and Artuner [4] considered mouse dynamics as a standalone biometric, and obtained an authentication accuracy of ERR around 4% and 5. 9% respectively, with a relatively-short authentication time or small number of mouse operations. But their results were based on a small pool of users (6 users in [34] and 10 users in [4]), which may be insuf? ient to obtain a good, steady result. Our study relies on an improved user authentication methodolo gy and far more users, leading us to achieve a good and robust authentication performance. Ahmed and Traore [2] achieved a high authentication accuracy, but as we mentioned before, it might be dif? cult to use such a method for user authentication since the authentication time or the number of mouse operations needed to verify a user’s identity is too high to be practical for real systems. Additionally, Hashia et al. 19] and Bours and Fulla [8] could perform user authentication in a relatively-short time, but they reported unacceptably high error rates (EER of 15% in [19], and EER of 26. 8% in [8]). In our approach we can make an authentication decision with a reasonably short authentication time while maintaining high accuracy. We employ a one-class classi? er, which is more appropriate for mouse-dynamics-based user authentication. As mentioned in Experiment 3, we can make an authentication decision in less than 60 seconds, with corresponding error rates are FAR of 4. 9% and FRR of 4. 46%. Although this result could be improved, we believe that, at our current performance level, mouse dynamics suf? ce to be a practical auxiliary authentication mechanism. In summary, Comparison 1 shows that our proposed features outperform some traditional features used in previous studies, and may be more stable and robust to variable behavior data. Comparison 2 indicates that our approach is competitive with existing approaches in authentication time while maintaining high accuracy.More detailed statistical studies on larger and more realistic datasets are desirable for further evaluations. VIII. DISCUSSION AND EXTENSION FOR FUTURE WORK Based on the ? ndings from this study, we take away some messages, each of which may suggest a trajectory for future work. Additionally, our work highlights the need for shared data and resources. A. Success Factors of Our Approach The presented approach achieved a short authentication time and relatively-high accuracy for mouse-dynami cs-based user SHEN et al. : USER AUTHENTICATION THROUGH MOUSE DYNAMICS 27 TABLE VIII COMPARISON WITH PREVIOUS WORKAuthentication time was not explicitly reported in [4], [8], [17]; instead, they required the user to accomplish a number of mouse operations for each authentication (15 clicks and 15 movements for [17]; 10 clicks and 9 movements for [4]; 18 short movements without pauses for [8]). Authentication time was not explicitly stated in [2]; however, it can be assumed by data-collection progress. For example, it is stated in [2] that an average of 12 hours 55 minutes of data were captured from each subject, representing an average of 45 sessions. We therefore assume that average session length is 12. 5 60/45 17. 22 minutes 1033 seconds. authentication. However, it is quite hard to point out one or two things that may have made our results better than those of previous work, because (1) past work favored realism over experimental control, (2) evaluation methodologies were incons istent among previous work, and (3) there have been no public datasets on which to perform comparative evaluations. Experimental control, however, is likely to be responsible for much of our success. Most previous work does not reveal any particulars in controlling experiments, while our work is tightly controlled.We made every effort to control experimental confounding factors to prevent them from having unintended in? uence on the subject’s recorded mouse behavior. For example, the same desktop computer was used for data collection for all subjects, and all system parameters relating to the mouse were ? xed. In addition, every subject was provided with the same instructions. These settings suggest strongly that the differences in subjects were due to individually detectable mouse-behavior differences among subjects, and not to environmental variables or experimental conditions.We strongly advocate the control of potential confounding factors in future experiments. The reaso n is that controlled experiments are necessary to reveal causal connections among experimental factors and classi? er performance, while realistic but uncontrolled experiments may introduce confounding factors that could in? uence experimental outcomes, which would make it hard to tell whether the results of those evaluations actually re? ect detectable differences in mouse behavior among test subjects, or differences among computing environments.We had more subjects (37), more repetitions of the operation task (150), and more comprehensive mouse operations (2 types of mouse clicks, 8 movement directions, and 3 movement distance ranges) than most studies did. Larger subject pools, however, sometimes make things harder; when there are more subjects there is a higher possibility that two subjects will have similar mouse behaviors, resulting in more classi? cation errors. We proposed the use of procedural features, such as the movement speed curve and acceleration curve, to provide mor e ? egrained information about mouse behavior than some traditional features. This may allow one to accurately describe a user’s unique mouse behavior, thus leading to a performance improvement for mouse-dynamics-based user authentication. We adopted methods for distance measurement and eigenspace transformation for obtaining principal feature components to ef? ciently represent the original mouse feature space. These methods not only overcome within-class variability of mouse behavior, but also preserve between-class differences of mouse behavior. The improved authentication accuracies demonstrate the ef? acy of these methods. Finally, we used a one-class learning algorithm to perform the authentication task, which is more appropriate for mousedynamics-based user authentication in real applications. In general, until there is a comparative study that stabilizes these factors, it will be hard to be de? nitive about the precise elements that made this work successful. B. Oppor tunities for Improvement While previous studies showed promising results in mouse dynamics, none of them have been able to meet the requirement of the European standard for commercial biometric technology.In this work, we determined that mouse dynamics may achieve a pragmatically useful level of accuracy, but with an impractically long authentic