Information Technology Reference
In-Depth Information
The addition of the perceived physical inva-
siveness construct in the current model provides
an important addition to the adoption literature
as it has not been explored in terms of nonmedi-
cal technology in a rigorous way due to the lack
of its presence in most mainstream technologies.
With the development and exploration of technolo-
gies for identification that require unusual usage
requirements (e.g., that a person must submit to
a scan of a body part or to the implantation of a
chip in order for the device to be used for its in-
tended purpose), perceived physical invasiveness
determining the impact of this construct on the
adoption behaviors of end users will increase in
importance. By gauging this impact, organiza-
tions considering implementing these types of
devices for use by consumers or employees as
well as companies marketing such tools will be
able to carefully consider their device choice as
well as develop informational and training ses-
sions tailored to the concerns of the users that
may help ease fears and smooth adopting.
Perceived need for security positively impacted
the usefulness of the device, but perceived need
for privacy did not. However, perceived need for
privacy is shown to impact perceived need for
security. These results imply that an individual's
perception of their need for privacy did not directly
impact the device's perceived usefulness but is
closely tied to the individual's perceived need for
security forming an indirect relationship. These
results imply that security and privacy are strongly
linked. An individual with a strong desire for
privacy may therefore view security technologies
as a means to protect this privacy. Privacy could
thus be viewed as something an individual wishes
to protect therefore providing additional utility to
security devices. There does exist a conflicting
issue, as can be seen with the impact of perceived
need for privacy on perceived physical invasive-
ness, in that all security devices typically require
some relinquishing of personal “data” in order
to properly identify and verify (or secure) the
individual, facility, or digital information.
The study was limited due to the number and
variation of survey participants. The sample was
restricted to faculty, staff, and students at one
major university located in an area with a small
population. While providing a good sample due
to the variation of backgrounds, educational level,
and employment opportunities that are present
in a university environment, a larger sample
size with greater variation in physical location
and place of employment may be a direction for
future research. Due to the substantial number of
constructs, a larger number of subjects would be
required to employ a technique such as structural
equation modeling. The methodology employed
in the current study provided key insights into the
model being explored. However, the model could
be further investigated in later studies utilizing
methods such as structural equation modeling.
ConClusion
The model developed in this study is shown to
be a good predictor for intention to use biometric
devices. The instrument developed in this research
could be used as an indicator of adoption success
of biometric technologies for both an adoption
company and entities wishing to market and sell
these technologies for different security situations.
Obtaining an idea of adoption success could be
useful in preventing unsuccessful attempts to
utilize a biometric technology prior to adoption
and prevent or mitigate financial losses due to
unsuccessful adoption attempts or underutilized
technology.
The results of testing the model show that an
individual's perceived need for security and the
perceived ease of use of the device significantly
impact the individual's perception of the useful-
ness of the biometric device. This would imply that
the more security conscious an individual is the
more likely they would be to accept the use of a
biometric technology. This implies that they would
perceive the device as being useful as a means to
Search WWH ::




Custom Search