596
Views
16
CrossRef citations to date
0
Altmetric
Service Quality

A study of executives' use of biometrics: an application of theory of planned behaviour

&
Pages 1242-1256 | Received 10 Dec 2010, Accepted 13 Jan 2012, Published online: 30 Mar 2012

References

  • Abdul-Wahab (2008). Modeling students' intention to adopt e-learning: a case from Egypt. Electronic Journal of Information Systems in Developing Countries (EJISDC), 34(1), 1–13.
  • Al-Gahtani, S. S., and King, M. (1999). Attitude, satisfaction and usage: factors contributing to each in the acceptance of information technology. Behavior and Information Technology, 18(4), 277–297. doi: 10.1080/014492999119020
  • Al-Harby, F., Qahwaji, R., and Kamala, M. (2010). Users' acceptance of secure biometric authentication system: reliability and validate of an extended UTAUT Model. Networked Digital Technologies Communications in Computer and Information Science, 87(2), 254–258. doi: 10.1007/978-3-642-14292-5_27
  • Ajzen, I., and Fishbein, M. (1980). Understanding attitudes and predicting social behavior, Englewood Cliffs, NJ: Prentice Hall.
  • Ajzen, I. (1985). From intentions to action: a theory of planned action. In Kuhl, J., and Beckman, J. (Ed.), Action control fromcognition to behavior, New York, NY: Springer.
  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–210. doi: 10.1016/0749-5978(91)90020-T
  • Ajzen, I., Czasch, C., and Flood, M. G. (2009). From intention to behavior: implementation, intention, commitment and conscientiousness. Journal of Applied Social Psychology, 39(6), 1356–1372. doi: 10.1111/j.1559-1816.2009.00485.x
  • Anandarayan, M., Igbaria, M., and Anakwe, U. P. (2002). IT acceptance in a less-developed country: a motivational factor perspective. International Journal of Information Management, 22, 47–65. doi: 10.1016/S0268-4012(01)00040-8
  • Armitage, C. J., and Conner, M. (2001). Efficacy of the theory of planned behavior: a meta analytic review. British Journal of Social Psychology, 40(4), 471–495. doi: 10.1348/014466601164939
  • Bajaj, A., and Nidumolu, S. (1998). A feedback model to understand information system usage. Information and Management, 33, 213–224. doi: 10.1016/S0378-7206(98)00026-3
  • Banduara, A. (1982). Self-efficacy mechanism in human agency. American Psychology, 37, 122–147. doi: 10.1037/0003-066X.37.2.122
  • Barnett, J. H., and Karson, M. J. (1987). Personal values and business decisions: an exploratory investigation. Journal of Business Ethics, 6, 371–382. doi: 10.1007/BF00382894
  • Biometric Market Report (2001). Avanti biometric reference [online], Available from: http://homepage.ntlworld.com/avanti/home.htm [Accessed 8 February 2012]
  • Cameron, D. (2002). Skin chips [online], MIT enterprise technology review. Available from: www.technologyreview.com/articles/print_version/wo_cameron080802.html [Accessed 20 February 2010]
  • Carmack, C. C. (2005). Examining the theory of planned behavior applied to condom use: a comparison of the effect-indicator vs. causal-indicator models. Unpublished PhD dissertation, Wichita State University.
  • Chau, P. Y.K. (2001). Influence of computer attitude and self-efficacy on IT usage behaviour. Journal of End User Computing, 13(1), 26–33. doi: 10.4018/joeuc.2001010103
  • Chau, P. Y.K., and Hu, P. J. (2002). Examining a model of information technology acceptance by individual professionals: an exploratory study. Journal of Management Information Systems, 18(4), 191–229.
  • Chin, W. W., and Newsted, P. R. (1999). Structural equation modelling analysis with small sample using partial least square. In Hoyle, R. H. (Ed.), Statistical strategies for small sample research, Thousand Oaks, CA: Sage Publications.
  • Churchill, G. A.J. (1979). A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 15, 64–73. doi: 10.2307/3150876
  • Conger, S. A., Loch, K. D., and Helft, B. L. (1995). Ethics and IT use: a factor analysis of attitudes to computer use. Information Systems Journal, 5, 161–184. doi: 10.1111/j.1365-2575.1995.tb00106.x
  • Cronbach, L. J. (1951). Coefficient alpha and the internal structure of test. Psychometrika, 16, 297–334. doi: 10.1007/BF02310555
  • Davis, F., Bagozzi, R. P., and Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of twotheoretical models. Management Science, 35(18), 982–1003. doi: 10.1287/mnsc.35.8.982
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–339. doi: 10.2307/249008
  • Espinoza, M. M. (1999). Assessing the cross-cultural applicability of a service quality measure: a comparative studybetween Quebec and Peru. International Journal of Service Industry Management, 10(5), 449–468. doi: 10.1108/09564239910288987
  • Fishbein, M., and Ajzen, I. (1975). Beliefs, attitudes, intention and behavior: an introduction to theory and research, Reading, MA: Addison-Wesley.
  • Fishbein, M. (1967). Attitude and the prediction of behavior. In Fishbein, M. (Ed.), Readings in attitude theory and measurement, New York: John-Wiley.
  • Fornell, C. R., and Larcker, D. F. (1981). Structural equation model with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50. doi: 10.2307/3151312
  • Flick, U. (2002). Introduction to qualitative research, NewYork, NY: Sage Publication.
  • Gorsuch, R. L., and Ortberg, J. (1983). Moral obligation and attitudes: their relation to behavioral intentions. Journal of Personality and Social Psychology, 44, 1025–1028. doi: 10.1037/0022-3514.44.5.1025
  • Hagger, M. S., Chatzisarantis, N. L.D., and Biddle, S. J.H. (2002). A meta-analytic review of the theories of reasoned action and planned behavior in physical activity: predictive validity and the contribution of additional variables. Journal of Sport and Exercise Psychology, 24(1), 3–33.
  • Hair, J. F., et al. (1998). Multivariate data analysis, Englewood Cliff, NJ: Prentice-Hall.
  • Harrison, A., and Rainer, K. (1992). The influence of the individual difference on skill in end-user computing. Journal of Management Information Systems, 9, 93–111. doi: 10.1080/10580539208906858
  • Hess, R. (2005). Biometrics: it's not in the cards. For the Record, 17(11), 30
  • Hofstede, G. (1984). Culture's consequences: international differences in work-related value, Beverly Hill, CA: Sage Publications.
  • Hornung, G. (2004). Biometric identity cards: technical, legal, and policy issues. Securing electronic business processes, (pp. 47–57). Vieweg. Available from: www.uni.kassel.dde/fb7/oeff_recht/…/Horung_Buch_ISE_2004.pdf [Accessed 8 August 2010]
  • Hornung, G. (2007). The European regulation on biometric passport: legislative procedures, political interactions, legal framework and technical safeguard. SCRIPT-Ed, 4(3), 246–253. doi: 10.2966/scrip.040307.246
  • Hubona, G. S., and Geitz, S. (1997). External variables, belief, attitudes and information technology usage behavior. IEEE, , 21–28.
  • Hsu, M-H., et al. (2006). A longitudinal investigation of continued online shopping behavior: an extension of the theory of planned behavior. International Journal of Human–Computer Studies, 64, 889–904. doi: 10.1016/j.ijhcs.2006.04.004
  • Jackson, C. M., Chow, S., and Leitch, R. A. (1997). Toward an understanding of the behavioral intention to use an information system. Decision Sciences, 28(2), 357–389. doi: 10.1111/j.1540-5915.1997.tb01315.x
  • Jeroskog, K. G., and Sorbom, D. (1983). LISREL8: structural equation modeling with simplis command language, Hillsdale, NJ: Lawrence Erlbaum Associates.
  • Karahanna, E., Straub, D. W., and Chervany, N. L. (1999). Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption belief. MIS Quarterly, 23(2), 183–213. doi: 10.2307/249751
  • King, G. W. (1975). An analysis of attitudinal and normative variables as predictors of intention and behavior. Speech Monographs, 42, 237–244. doi: 10.1080/03637757509375899
  • Lease, D. R. (2005). Factors influencing the adoption of biometric security technologies by decision making information technology and security managers. Unpublished PhD dissertation. Capella University
  • Lee, J. E., and Ho, P. S., 2003. A retail investor's perspective on the acceptance of internet stock trading. Proceedings of the 36th Hawaiian international conference on systems studies (HICSS), January, Big island, 1–11. IEEE Computer Society
  • Leonard, L. N.K., Cronan, T. P., and Krere, J. (2004). What influences IT ethical behavior intentions – planned behavior, reasoned action, perceived importance or individual characteristics?. Information and Management, 42(1), 143–159. doi: 10.1016/j.im.2003.12.008
  • Lohmoller, J. B. (1981). LVPLS1.6 program manual: latent variables path analysis with partial least-square estimation, MunichGermany: University of the Federal Armed Forces.
  • Lohmoller, J. B. (1989). Latent variable path modeling with partial least squares. Cognitive Science, 4, 333–369.
  • Logic CMG Research (2006). White paper on e-identity, European attitudes towards biometrics [online], Available from: www.logicacmg.com [Accessed 8 February 2004]
  • Lin, J.C.-C., and Lu, H. (2000). Towards an understanding ofthe behavioral intention to use a website. International Journal of Information Management, 20, 197–208. doi: 10.1016/S0268-4012(00)00005-0
  • Luarn, P., and Lin, H. (2005). Toward an understanding of the behavioral intention to use mobile banking. Computers in Human Behavior, 21, 873–891. doi: 10.1016/j.chb.2004.03.003
  • Ma, Q., and Liu, L. (2005). The technology acceptance model: a meta analysis of empirical findings. Advance Topics in End-User Computing, 4, 112–128. doi: 10.4018/978-1-59140-474-3.ch006
  • Mathieson, K. (1991). Predicting user intention: comparing the TAM with TPB. Information Systems Research, 2(3), 173–191. doi: 10.1287/isre.2.3.173
  • Norman, P. and Conner, M., 1996. Predicting health-check attendence among prior attenders and non-attenders: the role of prior behaviour in the theory of planned behaviour. Journal of Applied Social Psychology, 26, 1010–1026
  • Nunnally, J. C. (1978). Psychometric theory, New York: McGraw-Hill.
  • Orc International (2003). Public attitudes toward the use of biometric technologies, ???. Available from: www.orcinternational.com.uk [Accessed 18 October 2010]
  • Rainer, R. K.Jr., and Miller, M. D. (1996). An assessment of psychometric properties of the computer attitude scale. Computer in Human Behavior, 12(1), 93–105. doi: 10.1016/0747-5632(95)00021-6
  • Ramayah, T., and Aafaqi, B., 2005. Intention to shop onlineamong MBA students: applicability of the theory of reasoned action. International conference on E-Commerce 2005 (ICOEC, 2005). 11 January 2005, Selangor, Darul-Ehsan, Malaysia
  • Ramayah, T., Jantan, M., and Aafaqi, B., 2003. Internet usage among students of institution of higher learning: role of motivational variable, Proceedings of the 1st international conference on Asian academy of applied business, Sabah, Malaysia, July10–12.
  • Ramayah, T., May, O. S., and Omar, A. (2008). Behavioral determinants of online banking adoption: some guidelines from a multicultural society. i-Manager's Journal on Management, 2(3), 29–37.
  • Randall, D. M. (1989). Taking stock: can the theory of reasoned action explain unethical conduct?. Journal of Business Ethics, , 873–882. doi: 10.1007/BF00384531
  • Ringle, C., Wende, S., and Will, A. (2005). Smart-PLS version 2.0 M2 [online], Available from: http://www.smartpls.de [Accessed 9 February 2012]
  • Rogers, E. M. (1983). Diffusion of innovations, 3rd ed. NewYork, NY: The Free Press.
  • Sallimah, M. S. (2007). Perceived personal, social and control factors influencing Bruneian secondary teachers' use of ICT in teaching. MONOGRAPH Sultan Hassanul Bolkiah Institute of Education, Universiti Brunei Darussalam, 15, 1–68.
  • Seyal, A. H., and Rahim, M. M., 2004. Softlifting intention of computing students: an application of theory of reasoned action, Proceedings of 5th Global Information Technology Management World Conference (GITM), 13–15 June, San Diego, USA
  • Seyal, A. H. (2011). Determinants of e-banking among Bruneian corporate customers: an application of theory of planned behavior. International Journal of E-Adoption, 3(4), 13–28. doi: 10.4018/jea.2011100102
  • Shih, Y. Y., and Fang, K. (2004). The use of decomposed theory of planned behavior to study internet banking in Taiwan. Internet Research, 14(3), 213–223. doi: 10.1108/10662240410542643
  • Shim, S.E., et al., 2001. An online prepurchase intentions models: the role of intention to search. Journal of Retailing, 77, 397–416
  • Sheeran, P., et al. (2002). Evidence that type of person affects the strength of the perceived behavioral control-intention relationship. British Journal of Social Psychology, 41, 253–270. doi: 10.1348/014466602760060129
  • Shepperd, B. H., Hartwick, J., and Warshaw, P. R. (1988). The theory of reasoned action: a meta-analysis of past research with recommendations for modifications andfuture research. Journal of Consumer Research, 15, 325–343. doi: 10.1086/209170
  • Smetana, J. G., and Adler, N. E. (1980). Fishbein's Value X expectancy model: an examination of some assumptions. Personality and Social Psychology Bulletin, 6, 89–96. doi: 10.1177/014616728061013
  • Statistical Year Book of Brunei (2007). JPKE Department, Brunei Darussalam:
  • Tan, M., and Teo, T. S.H. (2000). Factors influencing the adoption of internet banking. Journal of Association for Information Systems, 1(5), 1–42.
  • Taylor, S., and Todd, P. A. (1995). Understanding information technology usage: a test of competing model. Information Systems Research, 6(2), 144–176. doi: 10.1287/isre.6.2.144
  • Thamer, A., and Drew, S. (2010). Employee's perceptions ofbiometric technology adoption in e-government: an exploratory study in the kingdom of Saudi Arabia. International Journal of E-Adoption, 2(1), 1–13. doi: 10.4018/jea.2010010101
  • Triandis, H. C. (1979). Values, attitudes and interpersonal behavior. Nebraska symposium on motivation, beliefs, attitudes and values, Lincoln, NE: University of Nebraska Press.
  • Uzoka, P.-M.E., Shemi, A. P., and Seleka, G. G. (2007). Behavioral influences on e-commerce adoption in a developing country context. Electronic Journal of Information Systems in Developing Countries (EJISDC), 31(4), 1–15.
  • Uzoka, F.-M.E., and Ndzinge, T. (2009a). An investigation of factors affecting biometric technology adoption in a developing country context. International Journal of Biometrics, 1(3), 307–328. doi: 10.1504/IJBM.2009.024276
  • Uzoka, F.-M.E., and Ndzinge, T. (2009b). Empirical analysis of biometric technology adoption and acceptance in Botswana. The Journal of Systems and Software, 82, 1550–1564. doi: 10.1016/j.jss.2009.04.041
  • Venkatesh, et al., 2000. A longitudinal field investigation of gender difference in individual technology adoption decision making processes. Organizational Behaviour and Human Decision Processes, 83 (1), 33–60
  • Venkatesh, et al. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425–478.
  • Warkentin, M., Davis, K., and Bekkering, E. (2005). A TAM analysis of an alternative high-security user authentication procedures. Advance Topics in End-User Computing, 4, 280–300. doi: 10.4018/978-1-59140-474-3.ch014
  • WG 11.6 Identity Management (2006). TC-11 security and protection in information processing systems, International Federation for Information Processing Report. Available from: www.ifip.org/bulletin/bulltcs/tc11-aim.htm [Accessed on 22 October 2010]
  • Yeow, P. H.P., et al. (2004). Online purchasing behavior of Malaysian tertiary education students (MTES). Multimedia Cyberspace Journal, 2(1), 24–34.
  • Yulihasri, E., (2004). Retailing on the internet: a study of the factors that influence that influence the customers' buying intention among students in a public institution of higher learning, Unpublished MBA Thesis. University Sains Malaysia.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.