Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free BioTAM: a technology acceptance model for biometric authentication systems

The increasing demand on biometric authentication systems (BASs) has brought the need of secure and privacy-preserving solutions accepted by a wider community of users. The decision makers pay a great attention to how people react to BASs and their opinions about the features and procedures of the system. In this work, a generic Biometric Technology Acceptance Model (BioTAM) is proposed. BioTAM encounters trust as an objective measure of privacy-security tradeoff, public willingness and user confidence. BioTAM takes into account social and human factors which prominently affect the wider dissemination and easy penetration of BASs. To scrutinise people's behavioural intention to use a BAS, BioTAM melds traditional Technology Acceptance Model constructs and the trust model offered as a new construct. In order to inspire stakeholders on how BioTAM can be used to assess a BAS, a sample case study is investigated.

References

    1. 1)
      • 14. Dodis, Y., Reyzin, L., Smith, A.: ‘Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data’. EUROCRYPT'04, Berlin, Germany; Springer Verlag, 2004 (LNCS3027), pp. 523540.
    2. 2)
      • 27. James, T., Pirim, T., Boswell, K., et al: ‘Determining the intention to use biometric devices: an application and extension of the technology acceptance model’, J. Org. End User Comput., 2006, 18, (3), pp. 124.
    3. 3)
      • 18. Venkatesh, V., Morris, M.G., Davis, G.B., et al: ‘User acceptance of information technology: toward a unified view’, MIS Q., 2003, 27, (3), pp. 425478.
    4. 4)
      • 4. Hosein, N.Z.: ‘Internet banking: an empirical study of adoption rates among Midwest Community banks’, J. Bus. Econ. Res., 2009, 7, (11), pp. 5172.
    5. 5)
      • 29. Al-Harby, F., Qahwaji, R., Kamala, M.: ‘Towards an understanding of user acceptance to use biometrics authentication systems in E-Commerce: using an extension of the technology acceptance model’, Int. J. E-Business Res., 2010, 6, (3), pp. 3455.
    6. 6)
      • 34. Turner, M., Kitchenham, B., Prereton, B., et al: ‘Does the technology acceptance model predict actual use? A systematic literature review’, Inf. Softw. Technol., 2010, 52, (5), pp. 463479.
    7. 7)
      • 19. Lin, C.H., Shih, H.Y., Sher, P.J.: ‘Integrating technology readiness into technology acceptance: the TRAM model’, Psychol. Market., 2007, 24, (7), pp. 641657.
    8. 8)
      • 10. Golic, J.D., Baltatu, M.: ‘Entropy analysis and new constructions of biometric key generation system’, IEEE Trans. Inf. Theory, 2008, 54, (5), pp. 20262040.
    9. 9)
      • 12. Tuyls, P., Skoric, B., Kevenaar, T.: ‘Security with noisy data: private biometrics, secure key storage and anti-counterfeiting’ (Springer Verlag, London, 2007).
    10. 10)
      • 9. Tang, Q., Bringer, J., Chabanne, H., et al: ‘A formal study of the privacy concerns in biometric-based remote authentication schemes’. ISPEC 2008, Sydney, Australia, April 2008, (LNCS4991), pp. 5670.
    11. 11)
      • 31. Davis, F.D.: ‘Perceived usefulness, perceived ease of use and user acceptance of information technology’, MIS Q., 1989, 13, pp. 319339.
    12. 12)
      • 24. Miltgen, C.L., Popovic, A., Oliveira, T.: ‘Determinants of end-user acceptance of biometrics: integrating the ‘Big 3’’ of technology acceptance with privacy context’, Decis. Support Syst., 2013, 56, pp. 103114.
    13. 13)
      • 26. Chau, A., Stephens, G., Jamieson, R.: ‘Biometrics acceptance – perceptions of use of biometrics’. Australasian Conf. Information Systems, 2004.
    14. 14)
      • 6. Salehi-Abari, A., White, T.: ‘The relationship of trust, demand, and utility: be more trustworthy, then I will buy more’. Eighth Int. Conf. Privacy, Security & Trust, 2010, pp. 7279.
    15. 15)
      • 22. Al-adawi, Z., Yousafzai, S., Pallister, J.: ‘Conceptual model of citizen adoption of e-government’. The 2nd Int. Conf. Innovations in Information Technology (IIT'05), 2005.
    16. 16)
      • 21. Davis, F.D.: ‘A technology acceptance model for empirically testing new end-user information systems: Theory and results’. PhD Thesis Sloan School of Management, MIT, 1986.
    17. 17)
      • 13. Lai, L., Ho, S.W., Poor, H.V.: ‘Privacy-security tradeoffs in biometric security systems’. 46th Allerton Conf. Communication, Control, and Computing, Monticello, September 2008.
    18. 18)
      • 17. Ajzen, I., Fishbein, M.: ‘Understanding attitudes and predicting social behaviour’ (Prentice-Hall, Englewood Cliffs, NJ, 1980).
    19. 19)
      • 20. Rogers, E.M.: ‘Diffusion of innovations’ (Free Press, New York, 2003, 5th edn.).
    20. 20)
      • 2. Unisys Security Index: Supplemental Question, Lieberman Research Group, 1 December 2008 (Wave 3) – Revised 4/9/2009.
    21. 21)
      • 28. Michael, B., Milena, H., Khaled, H.: ‘Consumer Acceptance of Biometrics for Identity Verification in Financial Transactions’. Proc. European Conf. Information Systems, 2009.
    22. 22)
      • 32. Ileri, O., Samardzija, D., Mandayam, N.B.: ‘Demand responsive pricing and competitive spectrum allocation via a spectrum server’. IEEE DySpan, Baltimore, MD, 8–11 November 2005, pp. 194202.
    23. 23)
      • 15. Sutcu, Y., Rane, S., Yedidia, J., et al: ‘Feature transformation of biometric templates for secure biometric systems based on error correcting codes’. IEEE Computer Vision and Pattern Recognition Workshops, CVPRW 2008, 2008, pp. 16.
    24. 24)
      • 3. Kanak, A., Sogukpinar, I.: ‘BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication’, Secur. Commun. Netw., 2014, 7, (1), pp. 123138.
    25. 25)
      • 33. Luhmann, N.: ‘Familiarity, confidence, trust: problems and alternatives’, in Gambetta, D. (Eds.): ‘Trust: making and breaking cooperative relations, electronic edition’ (Department of Sociology, University of Oxford, 2000), Ch. 6, pp. 94107.
    26. 26)
      • 25. Ho, G., Stephens, G., Jamieson, R.: ‘Biometric authentication adoption issues’. Australasian Conf. Information Systems, 2003, pp. 112.
    27. 27)
      • 8. Maio, D., Maltoni, D., Jain, A.K., et al: ‘Handbook of fingerprint recognition’ (Springer Verlag, 2003).
    28. 28)
      • 23. Kumar, V., Mukerji, B., Butt, I., et al: ‘Factors for successful e-government adoption: a conceptual framework’, Elect. J. e-Government, 2007, 5, (1), pp. 6376.
    29. 29)
      • 16. Jin, A.T.B., Ling, D.N.C., Goh, A.: ‘Biohashing: two factor authentication featuring fingerprint data and tokenised random number’, Pattern Recognit., 2004, 37, (11), pp. 22452255.
    30. 30)
      • 5. Ignatenko, T., Willems, F.: ‘Secret rate-privacy leakage in biometric systems’. IEEE Int. Symp. Information Theory, 2009, pp. 22512255.
    31. 31)
      • 11. Ratha, N.K., Connel, J.H., Bolle, R.M.: ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM Sys. J., 2001, 40, (3), pp. 614634.
    32. 32)
      • 1. Unisys Security Index: Global Summary, Lieberman Research Group, 1 December 2008 (Wave 3).
    33. 33)
      • 7. Jain, A.K., Nandakumar, K., Nagar, A.: ‘Biometric template security’. EURASIP Journal on Advances in Signal Processing, Adv. Sig. Proc. & Pat. Rec. Met. for Special Issue on Biometrics, January 2008, vol. 2008, pp. 117.
    34. 34)
      • 30. Kaasinen, E.: ‘User acceptance of mobile services – value, ease of use, trust and ease of adoption’. PhD thesis, VTT publications 566, Espoo: VTT Information Technology, 2005.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2016.0148
Loading

Related content

content/journals/10.1049/iet-bmt.2016.0148
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address