Figure 2From: Understanding user perceptions of transparent authentication on a mobile device Participant choices for task security level. Back to article page