http://iet.metastore.ingenta.com
1887

BioTAM: a technology acceptance model for biometric authentication systems

BioTAM: a technology acceptance model for biometric authentication systems

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The increasing demand on biometric authentication systems (BASs) has brought the need of secure and privacy-preserving solutions accepted by a wider community of users. The decision makers pay a great attention to how people react to BASs and their opinions about the features and procedures of the system. In this work, a generic Biometric Technology Acceptance Model (BioTAM) is proposed. BioTAM encounters trust as an objective measure of privacy-security tradeoff, public willingness and user confidence. BioTAM takes into account social and human factors which prominently affect the wider dissemination and easy penetration of BASs. To scrutinise people's behavioural intention to use a BAS, BioTAM melds traditional Technology Acceptance Model constructs and the trust model offered as a new construct. In order to inspire stakeholders on how BioTAM can be used to assess a BAS, a sample case study is investigated.

References

    1. 1)
      • 1. Unisys Security Index: Global Summary, Lieberman Research Group, 1 December 2008 (Wave 3).
        .
    2. 2)
      • 2. Unisys Security Index: Supplemental Question, Lieberman Research Group, 1 December 2008 (Wave 3) – Revised 4/9/2009.
        .
    3. 3)
      • A. Kanak , I. Sogukpinar .
        3. Kanak, A., Sogukpinar, I.: ‘BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication’, Secur. Commun. Netw., 2014, 7, (1), pp. 123138.
        . Secur. Commun. Netw. , 1 , 123 - 138
    4. 4)
      • N.Z. Hosein .
        4. Hosein, N.Z.: ‘Internet banking: an empirical study of adoption rates among Midwest Community banks’, J. Bus. Econ. Res., 2009, 7, (11), pp. 5172.
        . J. Bus. Econ. Res. , 11 , 51 - 72
    5. 5)
      • T. Ignatenko , F. Willems .
        5. Ignatenko, T., Willems, F.: ‘Secret rate-privacy leakage in biometric systems’. IEEE Int. Symp. Information Theory, 2009, pp. 22512255.
        . IEEE Int. Symp. Information Theory , 2251 - 2255
    6. 6)
      • A. Salehi-Abari , T. White .
        6. Salehi-Abari, A., White, T.: ‘The relationship of trust, demand, and utility: be more trustworthy, then I will buy more’. Eighth Int. Conf. Privacy, Security & Trust, 2010, pp. 7279.
        . Eighth Int. Conf. Privacy, Security & Trust , 72 - 79
    7. 7)
      • A.K. Jain , K. Nandakumar , A. Nagar .
        7. Jain, A.K., Nandakumar, K., Nagar, A.: ‘Biometric template security’. EURASIP Journal on Advances in Signal Processing, Adv. Sig. Proc. & Pat. Rec. Met. for Special Issue on Biometrics, January 2008, vol. 2008, pp. 117.
        . EURASIP Journal on Advances in Signal Processing, Adv. Sig. Proc. & Pat. Rec. Met. for Special Issue on Biometrics , 1 - 17
    8. 8)
      • D. Maio , D. Maltoni , A.K. Jain . (2003)
        8. Maio, D., Maltoni, D., Jain, A.K., et al: ‘Handbook of fingerprint recognition’ (Springer Verlag, 2003).
        .
    9. 9)
      • Q. Tang , J. Bringer , H. Chabanne .
        9. Tang, Q., Bringer, J., Chabanne, H., et al: ‘A formal study of the privacy concerns in biometric-based remote authentication schemes’. ISPEC 2008, Sydney, Australia, April 2008, (LNCS4991), pp. 5670.
        . ISPEC 2008 , 56 - 70
    10. 10)
      • J.D. Golic , M. Baltatu .
        10. Golic, J.D., Baltatu, M.: ‘Entropy analysis and new constructions of biometric key generation system’, IEEE Trans. Inf. Theory, 2008, 54, (5), pp. 20262040.
        . IEEE Trans. Inf. Theory , 5 , 2026 - 2040
    11. 11)
      • N.K. Ratha , J.H. Connel , R.M. Bolle .
        11. Ratha, N.K., Connel, J.H., Bolle, R.M.: ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM Sys. J., 2001, 40, (3), pp. 614634.
        . IBM Sys. J. , 3 , 614 - 634
    12. 12)
      • P. Tuyls , B. Skoric , T. Kevenaar . (2007)
        12. Tuyls, P., Skoric, B., Kevenaar, T.: ‘Security with noisy data: private biometrics, secure key storage and anti-counterfeiting’ (Springer Verlag, London, 2007).
        .
    13. 13)
      • L. Lai , S.W. Ho , H.V. Poor .
        13. Lai, L., Ho, S.W., Poor, H.V.: ‘Privacy-security tradeoffs in biometric security systems’. 46th Allerton Conf. Communication, Control, and Computing, Monticello, September 2008.
        . 46th Allerton Conf. Communication, Control, and Computing
    14. 14)
      • Y. Dodis , L. Reyzin , A. Smith .
        14. Dodis, Y., Reyzin, L., Smith, A.: ‘Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data’. EUROCRYPT'04, Berlin, Germany; Springer Verlag, 2004 (LNCS3027), pp. 523540.
        . EUROCRYPT'04 , 523 - 540
    15. 15)
      • Y. Sutcu , S. Rane , J. Yedidia .
        15. Sutcu, Y., Rane, S., Yedidia, J., et al: ‘Feature transformation of biometric templates for secure biometric systems based on error correcting codes’. IEEE Computer Vision and Pattern Recognition Workshops, CVPRW 2008, 2008, pp. 16.
        . IEEE Computer Vision and Pattern Recognition Workshops, CVPRW 2008 , 1 - 6
    16. 16)
      • A.T.B. Jin , D.N.C. Ling , A. Goh .
        16. Jin, A.T.B., Ling, D.N.C., Goh, A.: ‘Biohashing: two factor authentication featuring fingerprint data and tokenised random number’, Pattern Recognit., 2004, 37, (11), pp. 22452255.
        . Pattern Recognit. , 11 , 2245 - 2255
    17. 17)
      • I. Ajzen , M. Fishbein . (1980)
        17. Ajzen, I., Fishbein, M.: ‘Understanding attitudes and predicting social behaviour’ (Prentice-Hall, Englewood Cliffs, NJ, 1980).
        .
    18. 18)
      • V. Venkatesh , M.G. Morris , G.B. Davis .
        18. Venkatesh, V., Morris, M.G., Davis, G.B., et al: ‘User acceptance of information technology: toward a unified view’, MIS Q., 2003, 27, (3), pp. 425478.
        . MIS Q. , 3 , 425 - 478
    19. 19)
      • C.H. Lin , H.Y. Shih , P.J. Sher .
        19. Lin, C.H., Shih, H.Y., Sher, P.J.: ‘Integrating technology readiness into technology acceptance: the TRAM model’, Psychol. Market., 2007, 24, (7), pp. 641657.
        . Psychol. Market. , 7 , 641 - 657
    20. 20)
      • E.M. Rogers . (2003)
        20. Rogers, E.M.: ‘Diffusion of innovations’ (Free Press, New York, 2003, 5th edn.).
        .
    21. 21)
      • F.D. Davis .
        21. Davis, F.D.: ‘A technology acceptance model for empirically testing new end-user information systems: Theory and results’. PhD Thesis Sloan School of Management, MIT, 1986.
        .
    22. 22)
      • Z. Al-adawi , S. Yousafzai , J. Pallister .
        22. Al-adawi, Z., Yousafzai, S., Pallister, J.: ‘Conceptual model of citizen adoption of e-government’. The 2nd Int. Conf. Innovations in Information Technology (IIT'05), 2005.
        . The 2nd Int. Conf. Innovations in Information Technology (IIT'05)
    23. 23)
      • V. Kumar , B. Mukerji , I. Butt .
        23. Kumar, V., Mukerji, B., Butt, I., et al: ‘Factors for successful e-government adoption: a conceptual framework’, Elect. J. e-Government, 2007, 5, (1), pp. 6376.
        . Elect. J. e-Government , 1 , 63 - 76
    24. 24)
      • C.L. Miltgen , A. Popovic , T. Oliveira .
        24. Miltgen, C.L., Popovic, A., Oliveira, T.: ‘Determinants of end-user acceptance of biometrics: integrating the ‘Big 3’’ of technology acceptance with privacy context’, Decis. Support Syst., 2013, 56, pp. 103114.
        . Decis. Support Syst. , 103 - 114
    25. 25)
      • G. Ho , G. Stephens , R. Jamieson .
        25. Ho, G., Stephens, G., Jamieson, R.: ‘Biometric authentication adoption issues’. Australasian Conf. Information Systems, 2003, pp. 112.
        . Australasian Conf. Information Systems , 1 - 12
    26. 26)
      • A. Chau , G. Stephens , R. Jamieson .
        26. Chau, A., Stephens, G., Jamieson, R.: ‘Biometrics acceptance – perceptions of use of biometrics’. Australasian Conf. Information Systems, 2004.
        . Australasian Conf. Information Systems
    27. 27)
      • T. James , T. Pirim , K. Boswell .
        27. James, T., Pirim, T., Boswell, K., et al: ‘Determining the intention to use biometric devices: an application and extension of the technology acceptance model’, J. Org. End User Comput., 2006, 18, (3), pp. 124.
        . J. Org. End User Comput. , 3 , 1 - 24
    28. 28)
      • B. Michael , H. Milena , H. Khaled .
        28. Michael, B., Milena, H., Khaled, H.: ‘Consumer Acceptance of Biometrics for Identity Verification in Financial Transactions’. Proc. European Conf. Information Systems, 2009.
        . Proc. European Conf. Information Systems
    29. 29)
      • F. Al-Harby , R. Qahwaji , M. Kamala .
        29. Al-Harby, F., Qahwaji, R., Kamala, M.: ‘Towards an understanding of user acceptance to use biometrics authentication systems in E-Commerce: using an extension of the technology acceptance model’, Int. J. E-Business Res., 2010, 6, (3), pp. 3455.
        . Int. J. E-Business Res. , 3 , 34 - 55
    30. 30)
      • E. Kaasinen .
        30. Kaasinen, E.: ‘User acceptance of mobile services – value, ease of use, trust and ease of adoption’. PhD thesis, VTT publications 566, Espoo: VTT Information Technology, 2005.
        .
    31. 31)
      • F.D. Davis .
        31. Davis, F.D.: ‘Perceived usefulness, perceived ease of use and user acceptance of information technology’, MIS Q., 1989, 13, pp. 319339.
        . MIS Q. , 319 - 339
    32. 32)
      • O. Ileri , D. Samardzija , N.B. Mandayam .
        32. Ileri, O., Samardzija, D., Mandayam, N.B.: ‘Demand responsive pricing and competitive spectrum allocation via a spectrum server’. IEEE DySpan, Baltimore, MD, 8–11 November 2005, pp. 194202.
        . IEEE DySpan , 194 - 202
    33. 33)
      • N. Luhmann . (2000)
        33. Luhmann, N.: ‘Familiarity, confidence, trust: problems and alternatives’, in Gambetta, D. (Eds.): ‘Trust: making and breaking cooperative relations, electronic edition’ (Department of Sociology, University of Oxford, 2000), Ch. 6, pp. 94107.
        .
    34. 34)
      • M. Turner , B. Kitchenham , B. Prereton .
        34. Turner, M., Kitchenham, B., Prereton, B., et al: ‘Does the technology acceptance model predict actual use? A systematic literature review’, Inf. Softw. Technol., 2010, 52, (5), pp. 463479.
        . Inf. Softw. Technol. , 5 , 463 - 479
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2016.0148
Loading

Related content

content/journals/10.1049/iet-bmt.2016.0148
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address