Janse van Rensburg, Ebenhaeser Otto; Botha, Reinhardt A.; … - In: Information & Computer Security 30 (2022) 5, pp. 672-686
Purpose Authenticating an individual through voice can prove convenient as nothing needs to be stored and cannot easily be stolen. However, if an individual is authenticating under duress, the coerced attempt must be acknowledged and appropriate warnings issued. Furthermore, as duress may entail...