Adoption of Fingerprinting as an Automated Access Control Technique in University Hostels

نویسنده

  • Abdulsalam Sulaiman Olaniyi
چکیده

Biometrics is defined as a distinguishable physiological or behavioural attribute that can be used to verify or authenticate an individual’s identity. Fingerprint is a type of biometric trait. Authentication/verification and/or access control can be managed with the use of biometric-based systems. The problems encountered with these systems include among others user perception of the systems which is the aim of this research work. The users’ perception in this study is examined using a quantitative approach by designing a questionnaire as the data collection instrument based on the Technology Acceptance Model (TAM). The survey involved 400 students based on stratified random sampling technique. The results however show that Perceived Usefulness (PU), Perceived Ease-of-Use (PEOU) and Attitude (ATT) all influence Behavioural Intention (BI) of university of Ilorin students in using biometric fingerprint as the authentication technique in getting access to their various hostels. It therefore implies that attention should be paid to making the technology almost effort-free for its full acceptance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

An automated approach to analysis and classification of Crypto-ransomwares’ family

There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...

متن کامل

The Influence of Socio-Economic Factors on Adoption of Fish Production Technologies among Community-Based Farmers in Cross River State, Nigeria

The poor performance of fishery subsector is most clearly evidenced by low adoption of fishery production technologies by farmers. The purpose of this research was analyzing influence of socio-economic factors on the adoption of fish production technologies by community-based farmers in Cross River State, Nigeria. A Multistage random sampling technique was used in selecting 60 community-based f...

متن کامل

Formulation of a Traditionally Used Polyherbal Product for Burn Healing and HPTLC Fingerprinting of Its Phenolic Contents

Nowadays, plants have been considered as powerful agents for treatment of disorders regarding to their traditional use. In Iranian Traditional Medicine (ITM), plants have a special role in the treatment of various diseases. Burns with their devastating outcomes have been discussed in ITM as well. In the present study, a polyherbal ointment (PHO), retrieved from ITM, was formulated for burn heal...

متن کامل

بررسی عوامل اقتصادی موثر بر پذیرش مبارزه تلفیقی در کنترل کرم ساقه ‌خوار برنج استان اصفهان

This study utilized a descriptive-correlational surveying approach to examine some economic factors involved in the adoption of an integrated campaign to control rice stem borer (Chilo suppressalis) in Isfahan Province. The population consisted of farmers living in the vilages where Biological Control Plan was conducted (N=6000). The population frame was obtained from Isfahan Agricultural Organ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011