Information Technology Reference
In-Depth Information
For example, fingerprint scanners may be asso-
ciated with the criminal bookings. Similarly, due
to the inherent self-protection of the eyes, most
people are likely to feel uncomfortable with the
idea of having a laser directed at their eye retina
every time they want to make a financial trans-
action. In contrast, hand recognition where the
palm is placed on the plate, appears not to bother
people so much (probably because hand-shaking
is common behavior). Also, dynamic signature
verification would be acceptable to people of all
ages and social groups who are literate, since
signature is already widely used as a means of
personal identification. (Kim, 1995)
The perceived invasiveness of the biomet-
rics should also directly negatively impact an
individual's intention to use. When they perceive
the devices to be highly physically invasive, they
should be more reluctant to submit to their use
and more likely to avoid or object to their adop-
tion or use.
Hypothesis 5: The perceived invasiveness of the
security technology will have a negative impact
an individual's intention to use the technology.
security
Security in a broad sense encompasses the pro-
tection of assets, both physical and digital. These
assets may be physical, a person or a building,
or informational, a company's financial records
or a person's medical records. Perceived need for
security is therefore defined as one's perceived
need for the safekeeping of physical or informa-
tional assets.
Physical asset security has long been protected
by the use of traditional methods such as restricted
entry to areas by the use of locks. Digital security
has become increasingly important as the con-
nectedness of society grows with the use of the
Internet. Various security measures have been
implemented in the attempt to thwart an ever-
increasing number of threats from viruses or
malicious invasions of digital information.
Traditionally, devices to assure that only au-
thorized individuals can access restricted areas
fall into two categories: something an individual
has, such as a key or a smart card, or something
the user knows, such as a pin or password (Jain et
al., 2000). The major downfalls to these practices
are the possibility of theft of the entry token or
intentional (unintentional) compromise of the
knowledge necessary to gain access. Physical as-
set security is often one measure used to protect
digital information. Restricted access to areas that
house the equipment used to store data has long
been of primary concern for information security
practitioners (Loch, Carr, & Warkentin, 1992).
The perception of physical invasiveness of
biometric devices may affect the usage behavior
for the technology as well as impact the percep-
tion of ease of use of the device. Invasiveness can
be perceived as an intrusion or encroachment to
one physically and/or from a privacy standpoint.
As can be seen from the proceeding quote, bio-
metric devices can have negative connotations as
to their use as well as a level of physicality that
may provide levels of discomfort (both physically
and mentally) than traditional security devices.
In this study, we are concerned with the physical
invasiveness of the devices. That is, the perception
of discomfort or fear from the physicality of the
device use. The perceived physical invasiveness
construct is defined for the current study as one's
perception of the invasiveness of the technology
to their person.
We expect the perceived invasiveness of the
devices should negatively impact their perceived
ease of use. If an individual perceives these tech-
nologies to be highly invasive, then they may
think they are more difficult to use.
Hypothesis 4: The perceived physical invasive-
ness of the security technology will have a nega-
tive impact on the perceived ease of use of the
technology.
Search WWH ::




Custom Search