Information Technology Reference
In-Depth Information
protect their security. Both perceived usefulness
and perceived ease of use impact an individual's
intention to use the biometric device. Perceived
physical invasiveness of the device was shown to
have a significant negative impact on intention to
use. Perceived physical invasiveness of the device
is also shown to have a significant negative impact
on the ease of use of the technology. These results
are especially important in the biometrics arena as
several of the devices may produce strong feelings
of physical invasiveness that many other technolo-
gies in the security environment are exempt from.
They are also useful from the perspective of the
choice of biometric type to implement. Since physi-
cal invasiveness is shown to have an impact, more
attention may need to be paid to this concern in
the decision making process.
The results outline two major areas of manage-
rial significance related to the adoption of biometric
devices. First, the careful consideration as to the
specific biometric technology implemented is
important as physical invasiveness may produce
unwanted adoption behavior. This perceived in-
vasiveness may also impact the perceived ease of
use of the device in an unexpected way, possibly
requiring the use of different approaches for adop-
tion procedures or more extensive training on the
technology. Second, it is also useful to note that an
individual's perceived need for security plays an
important role in the intention to use the biometric
device. Therefore, as security concerns become
more important in the current state of the world,
adoption procedures that emphasize this benefit of
the technology may aid in improving the adoption
procedure.
The model proposed and tested in this project
could be modified and applied to other technolo-
gies in the security area. As concern over privacy
and security issues increase, the ability to obtain
an overall picture of security technology adoption
becomes more important not only to help increase
the level of security of crucial assets but to aid in
the prevention of unsuccessful attempts to adopt
new technologies.
reFerenCes
Ajzen, I., & Fishbein, M. (1980). Understanding
attitudes and predicting social behavior . Upper
Saddle River, NJ: Prentice Hall.
Arent, L. (1999). ATM wants to be your friend.
Retrieved August 6, 2007, from Wired News,
http://www.wired.com
Atkinson, R. (2002, May). Biometrics drivers'
licenses on the cards. Biometric Technology
Today, 10 (5), 1-2.
Beiser, V. (1999). Biometrics breaks into prisons.
Retrieved August 6, 2007, from Wired News,
http://www.wired.com
BTT. (2001). Biometrics secure Internet data
centres worldwide. Biometric Technology Today,
9 (2), 3.
BTT. (2006). Biometric statistics in focus. Bio-
metric Technology Today , 14 (), -.
Bureau of Justice. (2005). Bureau of Justice statis-
tics: Criminal victimization. Retrieved August 6,
2007, from http://www.ojp.usdoj.gov/bjs/cvictgen.
htm.
Chen, L., Gillenson, M., & Sherrell, D. (2002).
Enticing online consumers: An extended tech-
nology acceptance perspective. Information and
Management, 39 , 705-719.
Dale, L. (2001). Mobile biometric devices help in
law enforcement. Biometric Technology Today,
9 (8), 6-7.
Davis, F. (1989, September). Perceived useful-
ness, perceived ease of use, and user acceptance
of information technology. MIS Quarterly , pp.
319-340.
Davis, F., Bagozzi, R., & Warshaw, P. (1989). User
acceptance of computer technology: A comparison
of two theoretical models. Management Science,
35 (8), 982-1003.
Search WWH ::




Custom Search