Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context
نویسندگان
چکیده
The information systems (IS) literature has long emphasized the importance of user acceptance of computer-based IS. Evaluating the determinants of acceptance of information technology (IT) is vital to address the problem of underutilization and leverage the benefits of IT investments, especially for more radical technologies. This study examines individual acceptance of biometric identification techniques in a voluntary environment, measuring the intention to accept and further recommend the technology resulting from a carefully selected set of variables. Drawing on elements of technology acceptance model (TAM), diffusion of innovations (DOI) and unified theory of acceptance and use of technology (UTAUT) along with the trust-privacy research field, we propose an integrated approach that is both theoretically and empirically grounded. By testing some of the most relevant and welltested elements from previous models along with new antecedents to biometric system adoption, this study produces results which are both sturdy and innovative. We first confirm the influence of renowned technology acceptance variables such as compatibility, perceived usefulness, facilitating conditions on biometrics systems acceptance and further recommendation. Second, prior factors such as concern for privacy, trust in the technology, and innovativeness also prove to have an influence. Third, unless innovativeness, the most important drivers to explain biometrics acceptance and recommendation are not from the traditional adoption models (TAM, DOI, and UTAUT) but from the trust and privacy literature (trust in technology and perceived risk).
منابع مشابه
An Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملنقش ظرفیت یادگیری سازمانی در پذیرش فن آوری اطلاعات(مورد مطالعه: پرستاران بیمارستان های آموزشی)
Introduction: Successful adoption and use of information technology increase the quality of healthcare delivery. This study aimed to investigate the role of organizational learning capability on acceptance of information technology by nurses of teaching hospitals. Methods: A cross-sectional study was conducted in 2016, employing a research model based on technology acceptance theories. The stu...
متن کاملAn Empirical Investigation of the Determinants of Users Acceptance of E-banking in Singapore: Based on Technology Acceptance Model
Singapore is depicted to be the fastest growing telecommunications nation in Asia. Presently, all the members of the Singapore banking industry have engaged in the use of Information and Communication Technology as a platform for effective and efficient means of conducting financial transactions. This paper focuses on determining the level of users’ acceptance of the electronic banking services...
متن کاملConsumer acceptance of biometrics for identity verification in financial transactions
Biometrics can unequivocally verify a person’s identity and, thus, have significant potential to curb the crime of identity theft, which costs individuals, organizations, and society billions of dollars annually. While financial institutions may be highly motivated to examine the feasibility of adopting biometrics for identity verification, research regarding consumer acceptance of this technol...
متن کاملDetermining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model
Protection of physical assets and digital information is of growing importance to society. As with any new technology, user acceptance of new software and hardware devices is often hard to gauge, and policies to introduce and ensure adequate and correct usage of such technologies are often lacking. Security technologies have widespread applicability to different organizational contexts that may...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Decision Support Systems
دوره 56 شماره
صفحات -
تاریخ انتشار 2013