Investigation areas
Attack and defence against threats
Identity management
Interaction with the user: usability
Lines of investigation
Access control based on behaviour
Biometric authentication
Facial recognition
Identity theft
Online fraud
Usability of authentication systems
Usability of security mechanisms