Modeling the Impact of Biometric Security on Millennials’ Protection Motivation

Modeling the Impact of Biometric Security on Millennials’ Protection Motivation

Benjamin Ngugi, Arnold Kamis
Copyright: © 2013 |Volume: 25 |Issue: 4 |Pages: 23
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781466634701|DOI: 10.4018/joeuc.2013100102
Cite Article Cite Article

MLA

Ngugi, Benjamin, and Arnold Kamis. "Modeling the Impact of Biometric Security on Millennials’ Protection Motivation." JOEUC vol.25, no.4 2013: pp.27-49. http://doi.org/10.4018/joeuc.2013100102

APA

Ngugi, B. & Kamis, A. (2013). Modeling the Impact of Biometric Security on Millennials’ Protection Motivation. Journal of Organizational and End User Computing (JOEUC), 25(4), 27-49. http://doi.org/10.4018/joeuc.2013100102

Chicago

Ngugi, Benjamin, and Arnold Kamis. "Modeling the Impact of Biometric Security on Millennials’ Protection Motivation," Journal of Organizational and End User Computing (JOEUC) 25, no.4: 27-49. http://doi.org/10.4018/joeuc.2013100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Security researchers and managers would like to know the best ways of introducing new innovations and motivating their use. This study applies Protection Motivation Theory to model the coping and threat appraisals that motivate Millennials, who are early technology adopters, to adopt or resist biometric security for system access. One hundred fifty-nine Millennials were given a hypothetical scenario in which system access would be enhanced by biometric security to strengthen user authentication. The authors model the results with PLS and find that Protection Motivation Theory provides a good explanation of the user’s perceptions of biometric security. The model suggests that the users’ protection motivation is influenced directly by the Perceived System Response Efficacy of the biometric system and indirectly by Perceived Effort Expectancy, Perceived Computer Self-Efficacy, Perceived Privacy Invasion and Perceived System Vulnerability. Implications and limitations of the model are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.