Keystroke Dynamics: Prospects for Comprehensive Law Regulation

Keywords: keystroke dynamics, digitalization of law, digital forensics, personal rights, biometric personal data, behavioral biometrics, state registration, computer forensics

Abstract

The rapid digitalization of all spheres of society leads to the appearance of large volumes of typed texts, as well as the formation of the task of determining the performers of such texts. In this regard, it is necessary to develop applied research on keystroke dynamics, including through the prism of jurisprudence. Author of the article identifies sector of public relations related to ensuring the rights of citizens to personal and family secrets, the secrecy of correspondence; protection and processing of biometric personal data; state registration of persons based on their keystroke dynamics; disclosure and investigation of crimes in which typed texts are the subject of encroachment or the means of committing an illegal act; procedural proof of the involvement or non-involvement of a particular person with the creation of a typed text; as well as with the control of labor discipline and ensuring safety of production processes. In all these areas the beneficial fruits of processing keystroke dynamics is potentially high, that, however, is accompanied by significant risks of protecting information that is harmful to human persons. In this regard, author proposes models of regulatory regulation of all these areas in order to maintain a balance of public and private interests. The author's goal was to justify that the prompt resolution of the problematic issues raised would improve the effectiveness of law enforcement, protect the rights of citizens, and ensure the national security of the state. For this purpose, methods of logical definition of concepts, modeling, questioning, analysis and analogy, as well as systemic legal method were used. Conclusions were formulated about the prospects of both voluntary and mandatory state registration of users of computer devices and the Internet on the basis of their keystroke dynamics at the expense of the resources of the Center for Biometric Technologies. With the help of information from this database, as well as through investigative actions and operational search measures, it is possible to introduce keystroke dynamics into the field of forensic identification of the typist. To do this, it will be necessary to conduct a computer-technical examination, the results of that may be used as the basis for procedural evidence. Automated processing of information about keystroke dynamic can be used to monitor compliance with the work and rest regime by employees, independently fulfill their employer's orders, and prevent accidents at the workplace. Based on the totality of all the considered aspects, it is concluded there is a need for a deep understanding of keystroke dynamics in various fields of jurisprudence. It permits to form a regulatory system for the integrated regulation of public relations related to the processing of this phenomenon.

Author Biography

Anna Tsvetkova, Ural State Law University

Researcher

References

Averin A.I., Sidorov D.P. (2015) User authentication by keyboard dynamics. Ogaryov-Online, no. 20, pp. 1-5 (in Russ.)

Alsultan A., Warwick K. (2013) Keystroke dynamics authentication: a survey of free-text. International Journal of Computer Science Issues, vol. 10, no. 1, pp. 1-10.

Banerjee S.P., Woodard D.L. (2012) Biometric authentication and identification using keystroke dynamics: a survey. Journal of Pattern Recognition Research, vol. 7, pp. 116-139.

Branovitsky K.L., Renz I.G. (2019) May an expert be trusted? On forensic expertise quality (comparative analysis). Zakon=Law, no. 10, pp. 43-54 (in Russ.)

Bryukhomitsky Yu.A., Kazarin M.N. (2006) Covert keyboard monitoring system. Vestnik Taganrogskogo radiotechnicheskogo universiteta=Taganrog Radiotechnical University Bulletin, no. 9, pp. 154 (in Russ.)

Clarke R. (1994) Human identification in information systems: management challenges and public policy issues. Information Technology & People, vol. 7, pp. 6-37.

Forsen G., Nelson M., Staron R.Jr. (1977) Personal attributes authentication techniques. Technical Report. Rome: Air Development Center, 333 p.

Foygel E.I. (2023) Modern trends and prospects of development of the forensic doctrine of the personality of participants of criminal proceedings. Akademicheskiy juridicheskiy zhurnal=Academic Juridical Journal, no. 1, pp. 101-108 (in Russ.)

Fyodorov I.Z. (2019) Searching persons typed electronic text by keyboard dynamics in the detection and investigation of crimes. Vestnik Barnaulskogo intituta MVD=Bulletin of Barnaul Law Institute of Internal Ministry, no. 2, pp. 113-116 (in Russ.)

González N., Calot E. (2023) Dataset of human-written and synthesized samples of keystroke dynamics features for free-text inputs. Data in Brief, vol.

Guo J., Mu H. et al. (2024) Federated learning for biometric recognition: a survey. Artificial Intelligence Review, vol. 57, pp. 208-247.

Guryanov K.V. (2020) Project ‘Strelok': the first key logger. Bazis=Basics, no. 2, pp. 79-91 (in Russ.)

Ivanov A.I. (2000) Biometric identification of personality by dynamics of subconscious movements. Penza: University, 188 pp. (in Russ.)

Ivanov V.V., Zuyev D.I. (2022) Digital twin and digital identity: concept, correlation, meaning in the process of committing cybercrime and in law in general. Pravo i gosudarstvo=Law and State: Theory and Practice, no. 4, pp. 138-144 (in Russ.)

Isaeva V.V., Sakharova Y.V. (2020) International and national aspects of legal regulation of private life and the right to private life. Vestnik Bryanskogo universiteta=Bulletin of Bryansk University, no. 2, pp. 136-142 (in Russ.)

Karimov A.M. (2023) Crimes in the sphere of computer information and crimes with using information and communication technologies: comparative aspect. Vestnik Kazanskogo intituta MVD=Bulletin of Kazan Institute of Internal Ministry, no. 1, pp. 75-82 (in Russ.)

Lozhnikov P.S., Sulavko A.E. (2015) Technology of identification of computer system users by dynamics of subconscious movements. Avtomatizatcia. Sovremennye technologii=Automation. Modern Technologies, no. 5, pp. 31-36 (in Russ.)

Lira Í., Schiavon L., Freguglia R. (2024) Electronic monitoring of working time and labour market outcomes: evidence from Brazil. Industrial Relations Journal, vol. 55, pp. 205-222.

Matsubara Y., Samura T., Nishimura H. (2015) Keyboard dependency of personal identification performance by keystroke dynamics in free text typing. Journal of Information Security, vol. 6, pp. 229-240.

Mashtanov P.N., Martynyuk M.V. (2021) Review of current issues of biometric identification based on the features of keyboard dynamics. Information systems and technologies-2021: proceedings of a conference. Nizhny Novgorod: Technical University Press, pp. 527-531 (in Russ.)

Md A., Mohiuddin S. et al. (2019) Key logger detection using memory forensic and network monitoring. International Journal of Computer Applications, no. 11, pp. 17-21.

Nikulicheva E.O. (2019) Analysis of keyboard dynamics as a method of personal identification. Issues of forensic psychological examination and complex examination with participation of a psychologist. In: Prospects of fundamental and applied research of handwriting: papers of international conference. Kaluga: University Press, pp. 56-60 (in Russ.)

Ofman E.M. (2021) Transformation of the employer's right to control the employee's behaviour in the digital economy. Yearbook of Labour Law, no. 11, pp. 130-145 (in Russ.)

Paschenko D.V., Balzannikova E.A. (2020) Continuous user identification by keyboard dynamics using state-context based representation. XXI vek: itogi proshlogo i problemy nastoyaschego=XXI Age: Past Results and Present Issues, no. 3, pp. 74-79 (in Russ.)

Rossinskaya Е.Р. (2019) Special knowledge in the judicial examination of computer crimes in the digital age. Vestnik Kutafin University=Bulletin of Kutafin University, no. 5, pp. 31-44 (in Russ.)

Salikov M.S., Nesmeyanova S.E. et al. (2022) State regulation of the Internet and human rights. Ekaterinburg: University Press, 220 pp. (in Russ.)

Samsoni D.Z., Basir B.P. et al. (2023) Key logger threats in computer security aspects. International Journal of Integrative Sciences, vol. 2, no. 6, pp. 867-872.

Shadman R., Wahab A. et al. (2023) Keystroke dynamics: concepts, techniques, and applications. Preprint.

Shangina I.Y. (2020) Biometric identification technologies: global and the Russian practices. Innovatcii. Nauka. Obrazovanie=Innovations. Science. Education, no. 18, pp. 151-156 (in Russ.)

Siegel R., König C., Lazar V. (2022) The impact of electronic monitoring on employees' job satisfaction, stress, performance, and counterproductive work behaviour: a meta-analysis. Computers in Human Behaviour Reports, vol. 8. Article 100227.

Smushkin A.B. (2019) The issue of “digital alibi” in forensic science. Problemy ugolovmogo protcessa=Issues of Criminal Procedure, no. 2, pp. 28-33 (in Russ.)

Smushkin A.B. (2024) Concept of remote criminalistics. Moscow: Yurlitin-form, 256 pp. (in Russ.)

Solomatina E.A., Cherkashina A.V., Dreval B.V. (2021) Fingerprint registration in administrative law of Russia. Vestnik Moskovskogo universiteta MVD=Bulletin of Moscow University of Internal Ministry, no. 4, pp. 234-240 (in Russ.)

Spillane R. (1975) Keyboard apparatus for personal identification. IBM Technical Disclosure Bulletin, vol. 17. Article 3346.

Suman R.R., Mall R. et al. (2010) Extracting state models for black-box software components. Journal of Object Technology, no. 3, pp. 25-29.

Syed Idrus S.Z. (2014) Soft biometrics for keystroke dynamics. Computer vision and pattern recognition. Caen: Universite de Caen, 134 p.

Turutina E.E. (2021) Analysis of electronic and biometric authentication methods in access control systems. Vestnik akademii nauk tatarstana=Bulletin of Tatarstan Academy of Sciences, no. 2, pp. 168-175 (in Russ.)

Uimin A.G., Morozov I.M. (2022) Comparative analysis of continuous online authentication tools and anomaly detection systems for continuous confirmation of user identity. Telekommunikatcii i transport=Telecommunications and Transport, no. 5, pp. 48-55 (in Russ.)

Vacca J.R. (2007) Biometric technologies and verification systems. Burlington: Elsevier, 625 p.

Varlamova S.A., Vavilina E.A. (2023) User identification on the basis of keyboard dynamics. Innovatcionnoe priborostroene=Innovations in Instrumentation Engineering, vol. 2, no. 3, pp. 67-71 (in Russ.)

Vasilyev V.I., Kalyamov M.F., Kalyamova L.F. (2018) User identification by keyboard dynamics using frequent bigram registration algorithm. Modelirovanie, optimizatcia i indormatcionnye technologii=Modeling, Optimization and Information Technologies, vol. 6, no. 1, pp. 399-407 (in Russ.)

Vasilyev V.I., Sulavko A.E., Borisov R.V. et al. (2017) Recognition of psychophysiological states of users by hidden monitoring in computer systems. Iskussvennyi intellect i prinyatie resheniy=AI and Decisions, no. 3, pp. 21-37 (in Russ.)

Villani M., Tappert C. et al. (2006) Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions. Proceedings of international workshop computing and computational statistics.

Zaytsev O.A., Pastukhov P.S. (2022) Digital profile of a person as an element of information-technological strategy of crime investigation. Vestnik Permskogo universiteta. Pravo=Bulletin of Perm University. Legal Sciences, no. 56, pp. 281308 (in Russ.)

Zeid S., El Kamar R., Hassan S. (2022) Fixed-Text vs. Free-Text keystroke dynamics for user authentication. Engineering Research Journal, vol. 51, pp. 95104.

Zhukov M.N. (2021) Validity of biometric data using in forensic science: historical background and legal protection of personal data. Mezhdunarodnyi nauchno-issledovatelskyi zhurnal=International Scholar Research Journal, no. 12, pp. 164-167 (in Russ.)

Zuyev S.V. et al. (2019) Basics of theory of electronic evidence. Moscow: Yurlitinform, 653 pp. (in Russ.)

Published
2024-12-09
How to Cite
TsvetkovaA. (2024). Keystroke Dynamics: Prospects for Comprehensive Law Regulation. Legal Issues in the Digital Age, 5(4), 46-72. Retrieved from https://lida.hse.ru/article/view/24192
Section
IT. Law. Human Rights