User perspectives on the security of access data, operator handover procedures and ‘insult rate’ for speaker verification in automated telephone services
Keyword(s):