Search results

1 – 10 of over 1000
Article
Publication date: 12 August 2014

Jungsun (Sunny) Kim and Bo Bernhard

This paper aims to extend the technology acceptance model (TAM) to explore the factors influencing a hotel customer’s intention to use a fingerprint system instead of a…

2584

Abstract

Purpose

This paper aims to extend the technology acceptance model (TAM) to explore the factors influencing a hotel customer’s intention to use a fingerprint system instead of a traditional keycard system and the moderating factors (i.e. gender and age) on the relationships between the proposed factors and the customer’s intention to use fingerprint technology. When hotels add new technologies, the potential vulnerability of their systems also increases. Underestimating such risks can possibly result in massive losses from identity theft and related fraud for hoteliers. Customers who are aware of these risks may become more open to innovative methods of identification or verification, such as biometrics.

Design/methodology/approach

The online survey instrument was developed based on TAMs. The authors collected complete 526 responses from hotel customers and tested the hypotheses using structural equation modeling.

Findings

This study found seven factors (i.e. perceived usefulness, perceived ease of use, subjective norm, perceived convenience, perceived data security, perceived property security and personal concerns) which significantly influence a hotel customer’s intention to use fingerprint technology. Gender and age played important moderating roles in the relationships between some of these factors and the intention to use.

Practical implications

Recommendations are made as to how hotels can benefit from the implementation of biometrics, particularly fingerprint systems. For example, a hotel’s marketing campaign can be more effective by emphasizing the advantages of fingerprint technology related to “data security and convenience” for younger consumers (i.e. Gen X and Gen Y).

Originality/value

Both educators and practitioners will benefit from the findings of this empirical study, as there are very few published studies on a customer’s fingerprint technology acceptance in the hotel context.

Details

Journal of Hospitality and Tourism Technology, vol. 5 no. 2
Type: Research Article
ISSN: 1757-9880

Keywords

Article
Publication date: 10 October 2008

Sitalakshmi Venkatraman and Indika Delpachitra

To identify and discuss the issues and success factors surrounding biometrics, especially in the context of user authentication and controls in the banking sector, using a case…

6656

Abstract

Purpose

To identify and discuss the issues and success factors surrounding biometrics, especially in the context of user authentication and controls in the banking sector, using a case study.

Design/methodology/approach

The literature survey and analysis of the security models of the present information systems and biometric technologies in the banking sector provide the theoretical and practical background for this work. The impact of adopting biometric solutions in banks was analysed by considering the various issues and challenges from technological, managerial, social and ethical angles. These explorations led to identifying the success factors that serve as possible guidelines for a viable implementation of a biometric‐enabled authentication system in banking organisations, in particular for a major bank in New Zealand.

Findings

As the level of security breaches and transaction frauds increase day by day, the need for highly secure identification and personal verification information systems is becoming extremely important especially in the banking and finance sector. Biometric technology appeals to many banking organisations as a near perfect solution to such security threats. Though biometric technology has gained traction in areas like healthcare and criminology, its application in banking security is still in its infancy. Due to the close association of biometrics to human, physical and behavioural aspects, such technologies pose a multitude of social, ethical and managerial challenges. The key success factors proposed through the case study served as a guideline for a biometric‐enabled security project called Bio‐Sec, which is envisaged in a large banking organisation in New Zealand. This pilot study reveals that more than coping with the technology issues of gelling biometrics into the existing information systems, formulating a viable security plan that addresses user privacy fears, human tolerance levels, organisational change and legal issues is of prime importance.

Originality/value

Though biometric systems are successfully adopted in areas such as immigration control and criminology, there is a paucity of their implementation and research pertaining to banking environments. Not all banks venture into biometric solutions to enhance their security systems due to their socio‐technological issues. This paper fulfils the need for a guideline to identify the various issues and success factors for a viable biometric implementation in a bank's access control system. This work is only a starting point for academics to conduct more research in the application of biometrics in the various facets of banking businesses.

Details

Information Management & Computer Security, vol. 16 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Content available
Article
Publication date: 1 January 2006

122

Abstract

Details

Sensor Review, vol. 26 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 21 August 2007

Ong Thian Song, Andrew Teoh Beng Jin and Tee Connie

This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.

2016

Abstract

Purpose

This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.

Design/methodology/approach

Study the two existing directions of biometric‐based key generation approach based on the usability, security and accuracy aspects. Discuss the requisite unresolved issues related to this approach.

Findings

The proposed Fingerhashing approach transforms fingerprint into a binary discretized representation called Fingerhash. The Reed Solomon error correction method is used to stabilize the fluctuation in Fingerhash. The stabilized Fingerhash is then XORed with a biometric key. The key can only be released upon the XOR process with another Fingerhash derived from an authentic fingerprint. The proposed method could regenerate an error‐free biometric key based on an authentic fingerprint with up to 99.83 percent success rate, leading to promising result of FAR = 0 percent and FRR = 0.17 percent. Besides, the proposed method can produce biometric keys (1,150 bit length) which are longer in size than the other prevailing biometric key generation schemes to offer higher security protection to safeguard digital contents.

Originality/value

Outlines a novel solution to address the issues of usability, security and accuracy of biometric based key generation scheme.

Details

Information Management & Computer Security, vol. 15 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 May 1995

Gail E. Torbet, Ian M. Marshall and Steve Jones

Explores the potential use of behavioural and physiologicalbiometric techniques in the battle against credit card fraud in theretail environment. Discusses automatic speaker and…

1542

Abstract

Explores the potential use of behavioural and physiological biometric techniques in the battle against credit card fraud in the retail environment. Discusses automatic speaker and dynamic signature verification, fingerprint and facial recognition, retinal and iris scanning, and hand and finger geometry. The requirement for recognition performance, speed of use, usability and customer acceptance, device and card cost are considered, along with industry standards for biometric devices.

Details

International Journal of Retail & Distribution Management, vol. 23 no. 5
Type: Research Article
ISSN: 0959-0552

Keywords

Article
Publication date: 29 March 2011

Yair Levy, Michelle M. Ramim, Steven M. Furnell and Nathan L. Clarke

Concerns for information security in e‐learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students'…

Abstract

Purpose

Concerns for information security in e‐learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students' authentication during online exams beyond passwords. This paper aims to assess e‐learners' intention to provide multibiometric data and use of multibiometrics during online exams.

Design/methodology/approach

Based on data collected from 163 e‐learners from two institutions, the authors compared such measures when provided by their university versus by a third‐party service vendor. The multibiometrics discussed included fingerprint, face, and voice recognition.

Findings

The results show a clear indication by the learners that they are significantly more willing to provide their biometric data and intend to use multibiometrics when provided by their university compared with same services provided by a third‐party vendor.

Research limitations/implications

Research implications include the need for better understanding of multibiometrics implementations in educational settings.

Practical implications

The findings are profound for vendors of multibiometrics as they must adjust their approach when implementing such technologies at higher educational institutions, rather than simply opt to license the use of such solutions and to host them.

Originality/value

This study helps higher educational institutions better understand that learners do not appear to object to the use of multibiometrics technologies during online exams, rather the way in which such technologies are implemented and managed on‐campus.

Details

Campus-Wide Information Systems, vol. 28 no. 2
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 11 May 2012

Olli I. Heimo, Antti Hakkala and Kai K. Kimppa

The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear…

929

Abstract

Purpose

The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear problems with the databases into which biometric data are being collected, due to use of this data for other (publicly), non‐intended uses.

Design/methodology/approach

The approach of this paper is both a meta‐study of the flaws in the technological specifications as well as the social implementation of RFID/biometric passports. Finland is used as a case, but the results extend beyond Finland in most, if not all the topics presented – not necessarily all results to all implementations, but all to some others.

Findings

The current implementations of RFID/biometric passports are lacking in both technical and social implementations and pose clear risks to their use, both due to lax implementation of the technology itself but specifically due to the social changes brought about. These problems cause both erosion of privacy and trust.

Research limitations/implications

Further research into other potential social implications on a national level is required. The authors fear that the cases presented do not necessarily reflect all the potential problems, but just the most evident ones.

Practical implications

The problems with the technological implications can be averted by using the best technological solutions, and thus the best technological solutions should be used instead of the ones proven to be lacking.

Social implications

The social implications should at least be brought forth for public discourse and acknowledged, which currently does not seem to happen.

Originality/value

The paper contributes to the understanding of problems with current RFID/biometric passport implementations as well as inherent social problems that are hard, if not impossible to avoid. The problems belong under the category of critical eGovernment applications, and similar issues are visible in other eGovernment applications.

Details

Journal of Information, Communication and Ethics in Society, vol. 10 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Book part
Publication date: 1 January 2009

Todd A. Watkins

Despite the remarkable expansion of microfinance over the past several decades, the industry remains in a developmental period of experimentation and rapid growth, exploring which…

Abstract

Despite the remarkable expansion of microfinance over the past several decades, the industry remains in a developmental period of experimentation and rapid growth, exploring which approaches work best under different circumstances. Widespread diffusion and local adaptation of techniques and innovations from pioneering organizations such as ACCION International, Grameen Bank, FINCA, Bank Rakyat Indonesia, BancoSol, and many others fostered the emergence of a global industry that by most counts now serves more than 100 million clients. Yet along many dimensions of the industry – for example, client methodologies, information technologies and infrastructures, transparency and performance monitoring, product and service portfolios, funding structures, human resource management, health and environmental amelioration, and regulations – significant barriers remain to achieving the broad vision of microfinance as a major contributor in fighting global poverty.

Details

Moving Beyond Storytelling: Emerging Research in Microfinance
Type: Book
ISBN: 978-1-84950-682-3

Article
Publication date: 8 June 2010

Michael Pearce, Sherali Zeadally and Ray Hunt

The purpose of this paper is to address some weaknesses in the handling of current multi‐factor authentication, suggests some criteria for overcoming these weaknesses and presents…

1173

Abstract

Purpose

The purpose of this paper is to address some weaknesses in the handling of current multi‐factor authentication, suggests some criteria for overcoming these weaknesses and presents a simple proof of concept authentication system.

Design/methodology/approach

First, this paper evaluates some of the underlying practices and assumptions in multi‐factor authentication systems. Next, the paper assesses the implications of these when compared to a quantitative authentication risk management approach. Based upon these implications this paper next note the requirements for an improved system and detail some related research areas that meet these requirements. Finally, this paper discussed how a system that meets these requirements through the application of that research could provide benefits and outlined a simple points‐based authentication system.

Findings

The paper proposes that many of the weaknesses in authentication confidence management could be effectively mitigated through the deployment of a factor independent multi‐modal fusion quantitative authentication‐based system. This paper details a simple point‐based approach that does this and discuss how addressing the problems in handling authentication confidence could further optimise risk management in multi‐factor authentication systems.

Practical implications

This paper's suggestions for optimising multi‐factor authentication have many implications within medium to high‐security commercial and government applications. Correct authentication risk handling enables decisions regarding risk and authentication to be made more accurately.

Originality/value

This implications of the issues discussed in this paper have relevance to anyone who deploys or uses any medium to high‐security authentication system. As the bottom end of the medium to high‐security range includes online banking, there are implications for a wide range of stakeholders.

Details

Information Management & Computer Security, vol. 18 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 March 2002

Austin Jay Harris and David C. Yen

In this paper biometric technology will be defined and then discussed as to how it will help the business world protect its information. Background will be given to show how…

3103

Abstract

In this paper biometric technology will be defined and then discussed as to how it will help the business world protect its information. Background will be given to show how identification and authentication have developed throughout the years and why another form of authorization needs to come to the forefront. There are reasons for higher security and biometric authentication will be shown to be the solution to answer this call. Biometric is a powerful way of deciding who can gain access to our most valuable systems in this volatile world. Factors will be uncovered about what can and will affect an identification system, which will lead us to the feasibility of implementing a biometric system. As one will see, biometric will not be the best choice for everyone. Already, parts of the Department of Defense community rely on this technology in order to maintain the integrity of their own systems. For the business world, it is critical that biometric be grasped now in order to do the same.

Details

Information Management & Computer Security, vol. 10 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of over 1000