References
- Adewale, A. A., Ibidunni, A. S., Badejo, J. A., Odu, T., & Adoghe, A. U. (2014). Biometric enabled E-banking in Nigeria: Management and customers’ perspectives. In Information and knowledge management (Vol. 4, pp. 23–28).
- Al Eidan, R. M. (2013). Hand biometrics: Overview and user perception survey. 2013 2nd International Conference on Informatics and Applications, ICIA 2013, 252–257. Lodz, Poland. https://doi.org/10.1109/ICoIA.2013.6650265
- Bustard, J. (2015). The impact of EU privacy legislation on biometric system deployment: Protecting citizens but constraining applications. IEEE Signal Processing Magazine, 32(5), 101–108. https://doi.org/10.1109/MSP.2015.2426682
- Byun, S., & Byun, S.-E. (2013). Exploring perceptions toward biometric technology in service encounters: A comparison of current users and potential adopters. Behaviour & Information Technology, 32(3), 217–230. https://doi.org/10.1080/0144929X.2011.553741
- Chandra, A., & Calderon, T. (2005a). Challenges and constraints to the diffusion of biometrics in information systems. Communications of the ACM, 48(12), 101–106. https://doi.org/10.1145/1101779.1101784
- Chandra, B. A., & Calderon, T. (2005). Challenges and constraints to the diffusion of biometrics in information systems. Communications of the ACM, 48(12), 101–106.
- El-Abed, M., Giot, R., Hemery, B., & Rosenberger, C. (2010). A study of users’ acceptance and satisfaction of biometric systems. Proceedings - International Carnahan Conference on Security Technology, 170–178. San Jose, CA, USA. https://doi.org/10.1109/CCST.2010.5678678
- El-Abed, M., Giot, R., Hemery, B., & Rosenberger, C. (2012a). Evaluation of biometric systems: A study of users’ acceptance and satisfaction. Inderscience International Journal of Biometrics (IJBM), 4(3), 265–290. https://www.inderscienceonline.com/doi/abs/10.1504/IJBM.2012.047644
- El-Abed, M., Giot, R., Hemery, B., & Rosenberger, C. (2012b). Evaluation of biometric systems: A study of users’ acceptance and satisfaction. International Journal of Biometrics, 4(3), 265–290. https://doi.org/10.1504/IJBM.2012.047644
- Elliott, S. J., Massie, S. A., & Sutton, M. J. (2007). The perception of biometric technology: A survey. In 2007 IEEE Workshop on Automatic Identification Advanced Technologies (pp. 259–264). Alghero, Italy: IEEE.
- Furnell, S., & Evangelatos, K. (2007). Public awareness and perceptions of biometrics. Computer Fraud & Security, 2007(1), 8–13. https://doi.org/10.1016/S1361-3723(07)70006-4
- Habibu, T., Luhanga, E. T., & Sam, A. E. (2019a). Developing an algorithm for securing the biometric data template in the database. International Journal of Advanced Computer Science and Applications, 10(10), 361–371. https://doi.org/10.14569/IJACSA.2019.0101051
- Habibu, T., Luhanga, E. T., & Sam, A. E. (2019b). Evaluation of users’ knowledge and concerns of biometric passport systems. Data, 4(April), 1–17. https://doi.org/org/doi:10.3390/data4020058
- Habibu, T., & Sam, A. E. (2018). Assessment of vulnerabilities of the biometric template protection mechanism. International Journal of Advanced Technology and Engineering Exploration, 5(45), 243–254. https://doi.org/10.19101/IJATEE.2018.544003
- Hosseini, S. S., & Mohammadi, S. (2012). Acceptance of banking on biometric in Iran’s banking system case study of Saman Bank. Journal of Basic and Applied Scientific Research, 2(12), 12744–12751. http://www.textroad.com/JBASR-December,%202012(4).html
- Jain, A. K., Ross, A., & Prabhakar, S. (2004). Introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 1–29. https://ieeexplore.ieee.org/abstract/document/1262027
- Kalunga, J., & Tembo, S. (2016). Development of fingerprint biometrics verification and vetting management system. American Journal of Bioinformatics Research, 6(3), 99–112. https://doi.org/10.5923/j.bioinformatics.20160603.01
- Malallah, F. L., Ahmad, S. M. S., Yussof, S., Adnan, W. A. W., Iranmanesh, V., & Arigbabu, O. (2013). A review of biometric template protection techniques for online handwritten signature application. International Review on Computers and Software (I. RE. CO. S.), 8(12), 1–9. http://103.227.140.9/handle/123456789/9056?mode=full
- Penny, W. (2002). Biometrics: A double edged sword-security and privacy. SANS Institute.
- Pooe, A., & Labuschagne, L. (2011). Factors impacting on the adoption of biometric technology by South African banks: An empirical investigation. Southern African Business Review, 15(1), 119–138. https://www.ajol.info/index.php/sabr/article/view/76395
- Revett, K. (2011). Biometrics – A vision for the future. HCL Technologies, India, White Paper, (January). www.hcl.com
- Sabharwal, M. (2016). The assessment of concerns, opinions and perceptions of bank customers to find the significant metrics for deployment of biometrics in E-banking. International Journal of Computer Applications, 140(5), 28–41. https://doi.org/10.5120/ijca2016909301
- Toth, B. (2005). Biometric liveness detection. Information Security Bulletin, 10(8), 291–297.
- Yang, W., Wang, S., Hu, J., & Zheng, G. (2019). SS symmetry security and accuracy of fingerprint-based biometrics: A review. Symmetry, 11(2), 141. https://doi.org/10.3390/sym11020141
- Zirjawi, N. (2015). A survey about user requirements for biometric authentication on smartphones. IEEE, 1–6.