Skip to main content

Users’ Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model

  • Conference paper
Book cover Networked Digital Technologies (NDT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 87))

Included in the following conference series:

Abstract

This paper presents current findings from cross-cultural studies investigating the adoption of new secure technology, based on fingerprint authentication systems to be applied to an e-commerce websites, within the perspective of Saudi culture. The aim of the study was to explore factors affecting users’ acceptance of biometric authentication systems. A large scale laboratory experiment of 306 Saudis was performed using a login fingerprint system to observe whether Saudis are practically and culturally enthusiastic to accept this technology. The findings were then examined to measure the reliability and validity along with applying a proposed conceptual framework based on the Unified Theory of Acceptance and Use of Technology (UTAUT) with three moderating variables: age, gender and education level. The study model was adapted to meet the objectives of this study while adding other intrinsic factors such as self-efficiency and biometric system characteristics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wayman, J., Alyea, L.: Picking the best biometric for your applications. National biometric test center collected works, pp. 269–275. National Biometric Test Center, San Jose (2000)

    Google Scholar 

  2. Furnell, S., Evangelatos, K.: Public awareness and perceptions of biometrics. In: Computer Fraud and Security 2007, vol. 1, pp. 8–13 (2007)

    Google Scholar 

  3. AL-Harby, F., Qahwaji, R., Kamala, M.: The feasibility of biometrics authentication in e-commerce: User acceptance. In: IADIS International Conference WWW/Internet, Freiburg, Germany (2008)

    Google Scholar 

  4. Al-Harby, F., Qahwaji, R., Kamala, M.: Towards an Understanding of the Intention to Use Biometrics Authentication Systems in E-Commerce: Using an Extension of the Technology Acceptance Model. Accepted for publication in the International Journal of E-Business Research, IJEBR (2009)

    Google Scholar 

  5. Liu, S., Silverman, M.: A practical guide to biometric security technology. IT Professional Archive 3(1), 27–32 (2001)

    Article  Google Scholar 

  6. James, T., et al.: Determining the itention to use biometric devices: An application and extension of the Technology Acceptance Model. Journal of Organizational and End-User Computing 18(3), 1–24 (2006)

    Google Scholar 

  7. Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM 43(2), 91–98 (2000)

    Article  Google Scholar 

  8. Herman, A.: Major bank signs up for digital signature verification technology. In: Biometric Technology Today (2002)

    Google Scholar 

  9. Uzoka, F.-M.E., Ndzinge, T.: Empirical analysis of biometric technology adoption and acceptance in Botswana. Journal of Systems and Software 82(9), 1550–1564 (2009)

    Article  Google Scholar 

  10. Venkatesh, V., et al.: User acceptance of information technology: Toward a unified view. MIS Quarterly 27(3), 425–478 (2003)

    Google Scholar 

  11. Oshlyansky, L., Cairns, P., Thimbleby, H.: Validating the Unified Theory of Acceptance and Use of Technology (UTAUT) tool cross-culturally. In: HCI 2007 The 21st British HCI Group Annual Conference, University of Lancaster, UK (2007)

    Google Scholar 

  12. AlAwadhi, S., Morris, A.: The use of the UTAUT model in the adoption of e-government services in Kuwait. In: 41st Hawaii International Conference on System Sciences, Hawaii (2008)

    Google Scholar 

  13. Al-Gahtani, S., Hubona, G., Wang, J.: Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT. Information & Management 44, 681–691 (2007)

    Article  Google Scholar 

  14. Anderson, J., Gerbing, D.: Structural equation modeling in practice: areview and recommended two-step approach. Psychological Bulletin 103, 423–441 (1988)

    Article  Google Scholar 

  15. Fronell, C.: A second generation of multivariate analysis: classification of methods and implications for marketing research. In: Houston, M.J.E. (ed.) Review of Marketing. American Marketing Association, Chicago (1987)

    Google Scholar 

  16. Nunnally, J.: Psychometric theory, 2nd edn. McGraw-Hill, New York (1978)

    Google Scholar 

  17. Fornell, C., Larcker, D.: Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18, 39–50 (1981)

    Article  Google Scholar 

  18. Hair, J., et al.: Multi-variate Data Analysis with Readings. Macmillan, New York (1992)

    Google Scholar 

  19. Al-Harby, F., Qahwaji, R., Kamala, M.: The Effects of Gender Differences in the Acceptance of Biometrics Authentication Systems within Online Transaction. In: IEEE 2009 International Conference on CyberWorlds, pp. 203–210. IEEE Computer Society, Bradford (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

AL-Harby, F., Qahwaji, R., Kamala, M. (2010). Users’ Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds) Networked Digital Technologies. NDT 2010. Communications in Computer and Information Science, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14292-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14292-5_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14291-8

  • Online ISBN: 978-3-642-14292-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics