975
Views
30
CrossRef citations to date
0
Altmetric
Technology Adoption

Exploring perceptions toward biometric technology in service encounters: a comparison of current users and potential adopters

&
Pages 217-230 | Received 13 Nov 2009, Accepted 29 Dec 2010, Published online: 30 Mar 2011

References

  • Agarwal , R. and Karahanna , E. 2000 . Time flies when you're having fun: cognitive absorption and beliefs about information technology usage . MIS Quarterly , 24 ( 4 ) : 665 – 694 .
  • Agarwal , R. and Prasad , J. 1998 . A conceptual and operational definition of personal innovativeness in the domain of information technology . Information Systems Research , 9 ( 2 ) : 204 – 215 .
  • Ai , A. L. 2006 . Depression, faith-based coping, and short-term postoperative global functioning in adult and older patients undergoing cardiac surgery . Journal of Psychosomatic Research , 60 ( 1 ) : 21 – 28 .
  • Alterman , A. 2003 . A piece of yourself: ethical issues in biometric identification . Ethics and Information Technology , 5 ( 3 ) : 139 – 150 .
  • Aziz , M. , Riley , C. and Johnson , G. Usability challenges in emerging markets . ICEIS 2008, Proceedings of the tenth international conference on enterprise and information systems . Edited by: Cordeiro , J. and Filipe , J. Portual : INSTICC . Vol. HCI, 160–165
  • Bollen , K. A. and Lennox , R. 1991 . Conventional wisdom in measurement: a structural equation perspective . Psychology Bulletin , 110 ( 2 ) : 305 – 314 .
  • BioPrivacy Initiative . 2007 . Best practices for privacy-sympathetic biometric deployment Available from: http://www.bioprivacy.org/ [Accessed 15 March 2008]
  • Calnan , M. , Montaner , D. and Horne , R. 2005 . How acceptable are innovative health care technologies? A national survey of public beliefs and attitudes . Social Science and Medicine , 60 : 1937 – 1948 .
  • Cavoukian , A. 1999 . Consumer biometric applications: a discussion paper Available from: http://www.ipc.on.ca/docs/cons-bio.pdf [Accessed 25 January 2008]
  • Celent . 2006 . Biometric ATMs in Japan: fighting fraud with vein pattern authentication Available from http://www.celent.com/PressReleases/20060329(2)/BiometricsJapan.htm [Accessed 15 April 2008]
  • Chandra , A. and Calderon , T. 2005 . Challenges and constraints to the diffusion of biometrics in information systems . Communications of the ACM , 48 ( 12 ) : 101 – 106 .
  • Chang , T. Z. and Wildt , A. R. 1994 . Price, product information and purchase intention: an empirical study . Journal of the Academy of Marketing Science , 22 ( 1 ) : 6 – 27 .
  • Chin , W. W. 1998 . Issues and opinion on structural equation modeling . MIS Quarterly , 22 ( 1 ) : 7 – 16 .
  • Clodfelter , R. 2010 . Biometric technology in retailing: will consumers accept fingerprint authentication? . Journal of Retailing and Consumer Services , 17 : 181 – 188 .
  • Cohen , P. 1990 . Problems in the measurement of latent variables in structural equations causal models . Applied Psychological Measurement , 14 ( 2 ) : 183 – 196 .
  • Compeau , D. R. , Higgins , C. A. and Huff , S. 1999 . Social cognitive theory and individual reactions to computing technology: a longitudinal study . MIS Quarterly , 23 ( 2 ) : 145 – 158 .
  • Coventry , L. , Angeli , A. D. and Johnson , G. Usability and biometric verification at the ATM interface . Proceedings of the SIGCHI conference on human factors in computing systems . pp. 153 – 160 . New York, NY : ACM Press .
  • Cronin , J. J. Jr. , Brady , M. K. and Hult , G. T.M. 2000 . Assessing the effects of quality, value, and customer satisfaction on consumer behavioral intentions in service environments . Journal of Retailing , 76 ( 2 ) : 193 – 218 .
  • Culnan , M. J. 1993 . “How did they get my name?”: an exploratory investigation of consumer attitudes toward secondary information use . MIS Quarterly , 17 ( 3 ) : 341 – 361 .
  • Dabholkar , P. A. 1996 . Consumer evaluation of new technology-based self-service options: an investigation of alternative models of service quality . International Journal of Research in Marketing , 13 : 29 – 51 .
  • Deci , E. L. and Ryan , R. M. 1985 . Intrinsic motivation and self-determination in human behavior , New York : Plenum .
  • Department of Treasury . 2005 . The use of technology to combat identity theft Available from: http://www.cbanet.org/files/FileDownloads/BiometricsStudy.pdf [Accessed 12 March 2008]
  • Eastlick , M. A. and Lotz , S. 1999 . Profiling potential adopters and non-adopters of an interactive electronic shopping medium . International Journal of Retail & Distribution Management , 27 ( 6 ) : 209 – 223 .
  • Furnell , S. and Evangelatos , K. 2007 . Public awareness and perceptions of biometrics . Computer Fraud & Security, January , : 8 – 13 .
  • Garner , S. J. 1986 . Perceived risk and information sources in service purchasing . The Mid-Atlantic Journal of Business, Winter , : 5 – 15 .
  • Goldsmith , R. E. and Goldsmith , E. B. 1996 . An empirical study of overlap of innovativeness . Psychological Reports , 79 : 1113 – 1114 .
  • Goldsmith , R. E. and Hofacker , C. F. 1991 . Measuring consumer innovativeness . Journal of Academy of Marketing Science , 19 ( 3 ) : 209 – 221 .
  • Hair , J. F. 2005 . Multivariate data analysis , 6th ed , Englewood Cliffs , NJ : Prentice Hall .
  • Halal , W. E. 2006 . Technology's promise: highlights from the TechCast project . The Futurist , 40 : 41 – 50 .
  • Holbrook , M. B. 1999 . Consumer value: a framework for analysis and research , London : Routledge .
  • IBG . 2009 . Biometrics Market and Industry Report 2009–2014 . International Biometrics Group. Available from: http://www.biometricgroup.com/reports/public/market.report.php [Accessed 15 October 2009] ,
  • Jackson , C. M. , Simeon , C. and Robert , A. L. 1997 . Toward an understanding of the behavioral intention to use an information system . Decision Sciences Journal , 28 ( 2 ) : 357 – 390 .
  • Kleijnen , M. , de Ruyter , K. and Wetzels , M. 2007 . An assessment of value creation in mobile service delivery and the moderating role of time consciousness . Journal of Retailing , 83 ( 1 ) : 33 – 46 .
  • Kline , R. B. 2005 . Principles and practice of structural equation modeling , 2nd ed , New York : The Guilford Press .
  • Lewis , W. , Agarwal , R. and Sambamurthy , V. 2003 . Sources of influence on beliefs about information technology use: an empirical study of knowledge workers . MIS Quarterly , 27 ( 4 ) : 657 – 678 .
  • Li , C.-T. and Hwang , M-S. 2010 . An efficient biometrics-based remote user authentication scheme using smart cards . Journal of Network and Computer Applications , 33 : 1 – 5 .
  • Lu , J. Y. , James , E. and Yu , C.-S. 2005 . Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology . Journal of Strategic Information Systems , 14 ( 3 ) : 245 – 268 .
  • Mathwick , C. , Malhotra , N. K. and Rigdon , E. 2001 . Experiential value: conceptualization, measurement and application in the catalog and Internet shopping environment . Journal of Retailing , 77 ( 1 ) : 39 – 56 .
  • McCorkle , D. E. , Alexander , J. F. and Reardon , J. 2001 . Integrating business technology and marketing education: enhancing the diffusion process through technology champions . Journal of Marketing Education , 23 : 16 – 23 .
  • Meuter , M. L. 2000 . Self-service technologies: understanding customer satisfaction with technology-based service encounters . Journal of Marketing , 64 ( 3 ) : 50 – 64 .
  • Mick , D. G. and Fournier , S. 1998 . Paradoxes of technology: consumer cognizance, emotions, and coping strategies . Journal of Consumer Research , 25 : 123 – 143 .
  • Mills , J. E. and Byun , S. 2006 . Cybercrimes against customers: could biometric technology be the solution? . IEEE Internet Computing , 10 ( 4 ) : 64 – 71 .
  • Mintie , D. 2007 . Colombian bank implements biometric ATM's Biometric Watch.Available from http://www.biometricwatch.com/BW_in_print/biometric_ATM.htm [Accessed 8 March 2007]
  • Miyazaki , A. D. and Fernandez , A. 2001 . Consumer perceptions of privacy and security risks for online shopping . The Journal of Consumer Affairs , 35 ( 1 ) : 27 – 44 .
  • Moore , G. A. 2002 . Crossing the chasm , Revised ed , New York : Harper Collins .
  • Nazirwan , M. n.d. . Biometric: new technology to secure automatic teller machine (ATMs) transactions Available from: http://adsindonesia.or.id/alumni/articleattachment/articlemohamadnazirwan01.pdf [Accessed 8 April 2008]
  • Organisation for Economic Co-operation and Development (OECD) . 1980 . Guidelines on the protection of privacy and transborder flows of personal data. Available from:www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1_1,00.html [Accessed 15 October 2009]
  • Parasuraman , A. 2000 . Technology readiness index (TRI): a multiple-item scale to measure readiness to embrace new technologies . Journal of Service Research , 2 : 307 – 320 .
  • Parasuraman , A. and Colby , C. L. 2001 . Techno-ready marketing , New York : The Free Press .
  • Parasuraman , A. and Grewal , D. 2000 . The impact of technology on the quality-value-loyalty chain: a research agenda . Journal of the Academy of Marketing Science , 28 ( 1 ) : 168 – 174 .
  • Pavlou , P. A. and Chellappa , R. K. 2001 . The role of perceived privacy and perceived security in the development of trust in electronic commerce transaction Ebizlab Working Paper, Marshall School of Business, University of Southern California, Los Angeles, CA
  • Peter , J. P. and Olson , J. C. 1990 . Consumer behavior and marketing strategy , 2nd ed , Homewood , IL : Irwin .
  • Prabhakar , S. , Pankanti , S. and Jain , A. K. 2003 . Biometric recognition: security and privacy concerns . IEEE Security & Privacy , 1 ( 2 ) : 33 – 42 .
  • Riley , C. 2009 . Culture & biometrics: regional differences in the perception of biometric authentication technologies . Artificial Intelligence & Society , 24 : 295 – 306 .
  • Rogers , E. 1995 . Diffusion of innovations , 5th ed , New York : Free Press .
  • Rohm , A. J. and Milne , G. R. Emerging marketing and policy issues in electronic commerce: attitudes and beliefs of Internet users . Proceedings of marketing and public policy . pp. 73 – 79 . Chicago , IL : American Marketing Association .
  • Schiffman , L. G. and Kanuk , L. L. 2006 . Consumer behavior , 9th ed , Upper Saddle River , NJ : Prentice Hall .
  • Siegrist , M. 1999 . A causal model explaining the perception and acceptance of gene technology . Journal of Applied Social Psychology , 29 ( 10 ) : 2093 – 2106 .
  • Stone , R. N. and Gronhaug , K. 1993 . Perceived risk: further considerations for the marketing discipline . European Journal of Marketing , 27 ( 3 ) : 39 – 50 .
  • Thong , J. Y.L. , Hong , S.-J. and Tam , K. Y. 2006 . The effects of post-adoption beliefs on the expectation-confirmation model for information technology continuance . International Journal of Human-Computer Studies , 64 ( 9 ) : 799 – 810 .
  • UKPS . 2005 . UK Passport service biometrics enrolment trial Atos Origin
  • Vallerand , R. J. 1997 . “ Toward a hierarchical model of intrinsic and extrinsic motivation ” . In Advances in experimental social psychology , Edited by: Zanna , M. P. Vol. 29 , 271 – 360 . New York : Academic Press .
  • Venkatesh , V. and Brown , S. A. 2001 . A longitudinal investigation of personal computers in homes: adoption determinants and emerging challenges . MIS Quarterly , 25 ( 1 ) : 71 – 102 .
  • Villano , M. 2006 . Why goes there? Districts turn to biometrics for protection . Technology & Learning , 26 ( 7 ) : 8 – 10 .
  • Wayman J Biometric systems: technology, design and performance evaluation Springer-Verlag London 2005
  • Wakefield , R. L. and Whitten , D. 2006 . Mobile computing and intentions to use hedonic/utilitarian mobile devices . European Journal of Information Systems , 15 ( 3 ) : 292 – 300 .
  • Wilkie , W. L. 1990 . Consumer behavior , 2nd ed , New York : John Wiley .
  • Woodruff , R. B. and Gardial , S. F. 1996 . Know your customer: new approaches to understanding customer value and satisfaction , Cambridge , MA : Blackwell .
  • Young , M. R. and Elliotte , S. J. Comparing biometrics to knowledge based authentication: an analysis of entropy and strength of function . Poster presented at the Delivering on Homeland Security Conference, Purdue Homeland Security Institute (PHSI) . West Lafayette , IN .
  • Yun , Y. W. 2003 . The 123' of biometric technology Available from: http://www.cp.su.ac.th/~rawitat/teaching/forensicit06/coursefiles/files/biometric.pdf [Accessed 8 March 2008]
  • Zeithaml , V. A. , Berry , L. L. and Parasuraman , A. 1996 . The behavioral consequences of service quality . Journal of Marketing , 60 : 31 – 46 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.