메뉴 건너뛰기




Volumn 21, Issue 3, 2011, Pages 221-245

Adoption of biometric authentication systems: Implications for research and practice in the deployment of end-user security systems

Author keywords

Biometric technology; Diffusion of innovations; End user security systems; Financial services industry; Organizational adoption; User authentication

Indexed keywords


EID: 79960944032     PISSN: 10919392     EISSN: None     Source Type: Journal    
DOI: 10.1080/10919392.2011.590111     Document Type: Article
Times cited : (12)

References (70)
  • 1
    • 19444362827 scopus 로고    scopus 로고
    • A novel approach for regenerating a private key using password, fingerprint and smart card
    • Ahmed, F., and M. Y. Siyal. 2005. "A novel approach for regenerating a private key using password, fingerprint and smart card. Information Management & Computer Security 13(1):39-54.
    • (2005) Information Management & Computer Security , vol.13 , Issue.1 , pp. 39-54
    • Ahmed, F.1    Siyal, M.Y.2
  • 2
    • 9544226886 scopus 로고    scopus 로고
    • A piece of yourself: Ethical issues in biometric identification
    • Alterman, A. 2003. "A piece of yourself: Ethical issues in biometric identification. Ethics and Information Technology 5(3):139-150.
    • (2003) Ethics and Information Technology , vol.5 , Issue.3 , pp. 139-150
    • Alterman, A.1
  • 3
    • 0033266809 scopus 로고    scopus 로고
    • Information technology assimilation in firms: The influence of senior leadership and IT infrastructures
    • Armstrong, C. P., and V. Sambamurthy. 1999. "Information technology assimilation in firms: The influence of senior leadership and IT infrastructures. Information Systems Research 10(4):304-327.
    • (1999) Information Systems Research , vol.10 , Issue.4 , pp. 304-327
    • Armstrong, C.P.1    Sambamurthy, V.2
  • 8
    • 21344462624 scopus 로고    scopus 로고
    • The biometric state: The promise and peril of digital government in the new South Africa
    • Breckenridge, K. 2005. "The biometric state: The promise and peril of digital government in the new South Africa." Journal of Southern African Studies 31(2):267-282.
    • (2005) Journal of Southern African Studies , vol.31 , Issue.2 , pp. 267-282
    • Breckenridge, K.1
  • 9
    • 33745215611 scopus 로고    scopus 로고
    • Challenges and constraints to the diffusion of biometrics in information systems
    • Chandra, A., and T. Calderon. 2005. "Challenges and constraints to the diffusion of biometrics in information systems." Communication of the ACM 48(12):101-106.
    • (2005) Communication of the ACM , vol.48 , Issue.12 , pp. 101-106
    • Chandra, A.1    Calderon, T.2
  • 11
    • 0003095695 scopus 로고    scopus 로고
    • The partial least squares approach to structural equation modeling
    • edited by G. A. Marcoulides. Mahwah, NJ: Lawrence Erlbaum Associates
    • Chin, W. W. 1998. "The partial least squares approach to structural equation modeling." In Modern Methods for Business Research, edited by G. A. Marcoulides. Mahwah, NJ: Lawrence Erlbaum Associates.
    • (1998) Modern Methods For Business Research
    • Chin, W.W.1
  • 12
    • 0031314601 scopus 로고    scopus 로고
    • Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation
    • Chin, W. W., A. Gopal, and W. D. Salisbury. 1997. "Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation." Information Systems Research 8(4):342-367.
    • (1997) Information Systems Research , vol.8 , Issue.4 , pp. 342-367
    • Chin, W.W.1    Gopal, A.2    Salisbury, W.D.3
  • 13
    • 0035637810 scopus 로고    scopus 로고
    • Research report: Empirical test of an EDI adoption model
    • Chwelos, P., I. Benbasat, and A. S. Dexter. 2001. "Research report: Empirical test of an EDI adoption model." Information Systems Research 12(3):304-321.
    • (2001) Information Systems Research , vol.12 , Issue.3 , pp. 304-321
    • Chwelos, P.1    Benbasat, I.2    Dexter, A.S.3
  • 14
    • 79960959955 scopus 로고    scopus 로고
    • Paper read at CHI Workshop on Human-Computer Interaction, Adoption Study and Security Systems, at Fort Lauderdale, FL
    • Coventry, L., A. De Angeli, and G. Johnson. 2003a. "Honest it's me! Self service verification." Paper read at CHI Workshop on Human-Computer Interaction, Adoption Study and Security Systems, at Fort Lauderdale, FL.
    • (2003) Honest It's Me! Self Service Verification
    • Coventry, L.1    de Angeli, A.2    Johnson, G.3
  • 16
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis, F. D. 1989. "Perceived usefulness, perceived ease of use, and user acceptance of information technology." MIS Quarterly 13(3):319-340.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.D.1
  • 17
    • 0040218852 scopus 로고
    • Corporate culture, customer orientation, and innovativeness in Japanese firms: A quadrad analysis
    • Deshpande, R., J. Farley, and F. Webster, Jr. 1993. "Corporate culture, customer orientation, and innovativeness in Japanese firms: A quadrad analysis." Journal of Marketing 57: 23-27.
    • (1993) Journal of Marketing , vol.57 , pp. 23-27
    • Deshpande, R.1    Farley, J.2    Webster, F.3
  • 18
    • 78049404188 scopus 로고    scopus 로고
    • Biometrics: An overview of the technology, challenges and control considerations
    • Down, M. P., and R. J. Sands. 2004. "Biometrics: An overview of the technology, challenges and control considerations." Information System Control Journal 4:53-56.
    • (2004) Information System Control Journal , vol.4 , pp. 53-56
    • Down, M.P.1    Sands, R.J.2
  • 19
    • 0036765493 scopus 로고    scopus 로고
    • Management's role in information security in a cyber economy
    • Dutta, A., and K. McCrohen. 2002. "Management's role in information security in a cyber economy." California Management Review 45(1):67-87.
    • (2002) California Management Review , vol.45 , Issue.1 , pp. 67-87
    • Dutta, A.1    McCrohen, K.2
  • 22
    • 35348902971 scopus 로고    scopus 로고
    • Federal Deposit Insurance Corporation, 2004. Retrieved from, (accessed July 7, 2010
    • Federal Deposit Insurance Corporation. 2004. Putting an End to Account-Hijacking dentity Theft. 2004. Retrieved from http://www.fdic.gov/consumers/consumer/idtheftstudy/identity_theft.pdf, (accessed July 7, 2010).
    • (2004) Putting An End to Account-Hijacking Dentity Theft
  • 23
    • 70449332446 scopus 로고    scopus 로고
    • Financial Institutions Examination Council, 2005. Retrieved from, (accessed July 7, 2010)
    • Financial Institutions Examination Council. 2005. Authentication in an Internet Banking Environment. 2005. Retrieved from http://www.ffiec.gov/pdf/authentication_guidance.pdf (accessed July 7, 2010).
    • (2005) Authentication In An Internet Banking Environment
  • 24
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell, C., and D. F. Larcker. 1981. "Evaluating structural equation models with unobservable variables and measurement error." Journal of Marketing Research 18(1):39-50.
    • (1981) Journal of Marketing Research , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 25
    • 0011763155 scopus 로고    scopus 로고
    • Organizational innovation adoption: A multi-level framework of determinants and opportunities for future research
    • Frambach, R. T., and N. Schillewaert. 2002. "Organizational innovation adoption: A multi-level framework of determinants and opportunities for future research." Journal of Business Research 55(2):163-176.
    • (2002) Journal of Business Research , vol.55 , Issue.2 , pp. 163-176
    • Frambach, R.T.1    Schillewaert, N.2
  • 28
  • 29
    • 4544289614 scopus 로고    scopus 로고
    • Electronic commerce adoption: An empirical study of small and medium US businesses
    • Grandon, E., and M. Pearson. 2004. "Electronic commerce adoption: An empirical study of small and medium US businesses." Information & Management 42(1):197-216.
    • (2004) Information & Management , vol.42 , Issue.1 , pp. 197-216
    • Grandon, E.1    Pearson, M.2
  • 31
    • 0036198047 scopus 로고    scopus 로고
    • Biometric authentication: Assuring access to information
    • Harris, A. J., and D. C. Yen. 2002. "Biometric authentication: Assuring access to information." Information Management & Computer Security 10(1):12-19.
    • (2002) Information Management & Computer Security , vol.10 , Issue.1 , pp. 12-19
    • Harris, A.J.1    Yen, D.C.2
  • 32
    • 0032223734 scopus 로고    scopus 로고
    • Emerging electronic partnerships: Antecedents and dimensions of EDI use from the supplier's perspective
    • Hart, P. J., and C. S. Saunders. 1998. "Emerging electronic partnerships: Antecedents and dimensions of EDI use from the supplier's perspective." Journal of Management Information Systems 14(4):87-111.
    • (1998) Journal of Management Information Systems , vol.14 , Issue.4 , pp. 87-111
    • Hart, P.J.1    Saunders, C.S.2
  • 34
    • 31744437338 scopus 로고    scopus 로고
    • Biometrics: The next frontier in service excellence, productivity and security in the service sector
    • Heracleous, L., and J.Wirtz. 2006. "Biometrics: The next frontier in service excellence, productivity and security in the service sector." Managing Service Quality 16(1):12-22.
    • (2006) Managing Service Quality , vol.16 , Issue.1 , pp. 12-22
    • Heracleous, L.1
  • 35
    • 67650706330 scopus 로고    scopus 로고
    • Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives
    • Hu, L., and P. M. Bentler. 1999. "Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives." Structural Equation Modeling 6(1):1-55.
    • (1999) Structural Equation Modeling , vol.6 , Issue.1 , pp. 1-55
    • Hu, L.1    Bentler, P.M.2
  • 37
    • 39749159243 scopus 로고
    • Electronic data interchange and small organizations: Adoption and impact of technology
    • Iacovou, C. L., I. Benbasat, and A. S. Dexter. 1995. "Electronic data interchange and small organizations: Adoption and impact of technology." MIS Quarterly 19(4):465-485.
    • (1995) MIS Quarterly , vol.19 , Issue.4 , pp. 465-485
    • Iacovou, C.L.1    Benbasat, I.2    Dexter, A.S.3
  • 39
    • 10044236375 scopus 로고    scopus 로고
    • Paper read at 17th International Conf. on Pattern Recognition (ICPR'04), August 23-26, Cambridge, U.K
    • Jain, A. K., S. Pankanti, S. Prabhakar, L. Hong, and A. Ross. 2004. "Biometrics: A grand challenge." Paper read at 17th International Conf. on Pattern Recognition (ICPR'04), August 23-26, Cambridge, U.K.
    • (2004) Biometrics: A Grand Challenge
    • Jain, A.K.1    Pankanti, S.2    Prabhakar, S.3    Hong, L.4    Ross, A.5
  • 40
    • 33749373316 scopus 로고    scopus 로고
    • Determining the intention to use biometric devices: An application and extension of the technology acceptance model
    • James, T., T. Pirim, K. Boswell, B. Reithel, and R. Barkhi. 2006. "Determining the intention to use biometric devices: An application and extension of the technology acceptance model." Journal of Organizational and End User Computing 18(3):1-24.
    • (2006) Journal of Organizational and End User Computing , vol.18 , Issue.3 , pp. 1-24
    • James, T.1    Pirim, T.2    Boswell, K.3    Reithel, B.4    Barkhi, R.5
  • 41
    • 33344465188 scopus 로고    scopus 로고
    • A review of the predictors, linkages, and biases in IT innovation adoption research
    • Jeyaraj, A., J. Rottman, and M. Lacity. 2006. "A review of the predictors, linkages, and biases in IT innovation adoption research." Journal of Information Technology 21:1-23.
    • (2006) Journal of Information Technology , vol.21 , pp. 1-23
    • Jeyaraj, A.1    Rottman, J.2    Lacity, M.3
  • 43
    • 60649108798 scopus 로고    scopus 로고
    • Out of dedication or constraint? A dual model of post-adoption phenomena and its empirical test in the context of online services
    • Kim, S. S., and J.-Y. Son. 2009. "Out of dedication or constraint? A dual model of post-adoption phenomena and its empirical test in the context of online services." MISQuarterly 33(1):49-70.
    • (2009) MISQuarterly , vol.33 , Issue.1 , pp. 49-70
    • Kim, S.S.1    Son, J.-Y.2
  • 44
    • 33745294915 scopus 로고    scopus 로고
    • Evaluating biometrics as internal control solutions to organizational risk
    • Kleist, V., R. Riley Jr., and T. Pearson. 2005. "Evaluating biometrics as internal control solutions to organizational risk." Journal of American Academy of Business 6(2):339-343.
    • (2005) Journal of American Academy of Business , vol.6 , Issue.2 , pp. 339-343
    • Kleist, V.1    Riley Jr., R.2    Pearson, T.3
  • 45
    • 33745302193 scopus 로고    scopus 로고
    • The emergence of biometrics and its effect on consumers
    • Langenderfer, J., and S. Linnhoff. 2005. "The emergence of biometrics and its effect on consumers." Journal of Consumer Affairs 39(2):314-338.
    • (2005) Journal of Consumer Affairs , vol.39 , Issue.2 , pp. 314-338
    • Langenderfer, J.1    Linnhoff, S.2
  • 46
    • 0000354529 scopus 로고
    • Managerial influence in the implementation of new technology
    • Leonard-Barton, D., and I. Deschamps. 1988. "Managerial influence in the implementation of new technology." Management Science 34(10):1252-1265.
    • (1988) Management Science , vol.34 , Issue.10 , pp. 1252-1265
    • Leonard-Barton, D.1    Deschamps, I.2
  • 47
    • 33847761422 scopus 로고    scopus 로고
    • Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management
    • Liang, H., S. Nilesh, Q. Hu, and Y. Xue. 2007. "Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management." MIS Quarterly 31(1):59-87.
    • (2007) MIS Quarterly , vol.31 , Issue.1 , pp. 59-87
    • Liang, H.1    Nilesh, S.2    Hu, Q.3    Xue, Y.4
  • 48
    • 36849068492 scopus 로고    scopus 로고
    • Public perceptions of biometric devices: The effect of misinformation on acceptance and use
    • Moody, J. 2004. "Public perceptions of biometric devices: The effect of misinformation on acceptance and use." Journal of Issues in Informing Science and Information Technology 1:753-761.
    • (2004) Journal of Issues In Informing Science and Information Technology , vol.1 , pp. 753-761
    • Moody, J.1
  • 51
    • 51049103392 scopus 로고    scopus 로고
    • Understanding user perspectives on biometric technology
    • Pons, A., and P. Polak. 2008. "Understanding user perspectives on biometric technology." Communications of the ACM 51(9):115-118.
    • (2008) Communications of the ACM , vol.51 , Issue.9 , pp. 115-118
    • Pons, A.1    Polak, P.2
  • 53
    • 0000076972 scopus 로고
    • Implementation of electronic data interchange: An innovation diffusion perspective
    • Premkumar, G., K. Ramamurthy, and S. Nilakanta. 1994. "Implementation of electronic data interchange: An innovation diffusion perspective." Journal of Management Information Systems 11(2):157-186.
    • (1994) Journal of Management Information Systems , vol.11 , Issue.2 , pp. 157-186
    • Premkumar, G.1    Ramamurthy, K.2    Nilakanta, S.3
  • 54
    • 0000309139 scopus 로고    scopus 로고
    • Organizational and interorganizational determinants of EDI diffusion and organizational performance: A causal model
    • Ramamurthy, K., G. Premkumar, and M. Crum. 1999. "Organizational and interorganizational determinants of EDI diffusion and organizational performance: A causal model." Journal of Organizational Computing and Electronic Commerce 9(4):253-285.
    • (1999) Journal of Organizational Computing and Electronic Commerce , vol.9 , Issue.4 , pp. 253-285
    • Ramamurthy, K.1    Premkumar, G.2    Crum, M.3
  • 55
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometricsbased authentication systems
    • Ratha, N. K., J. H. Connell, and R. M. Bolle. 2001. "Enhancing security and privacy in biometricsbased authentication systems." IBM Systems Journal 40(3):614-634.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 56
    • 18144405742 scopus 로고    scopus 로고
    • The biometric technologies business case: A systematic approach
    • Riley Jr., R. A., and V. F. Kleist. 2005. "The biometric technologies business case: A systematic approach." Information Management & Computer Security 13(2):89-105.
    • (2005) Information Management & Computer Security , vol.13 , Issue.2 , pp. 89-105
    • Riley, R.A.1    Kleist, V.F.2
  • 60
    • 0036021507 scopus 로고    scopus 로고
    • Technological opportunism and radical technology adoption: An application to e-business
    • Srinivasan, R., G. Lilien, and A. Rangaswamy. 2002. "Technological opportunism and radical technology adoption: An application to e-business." Journal of Marketing 66(3):47-60.
    • (2002) Journal of Marketing , vol.66 , Issue.3 , pp. 47-60
    • Srinivasan, R.1    Lilien, G.2    Rangaswamy, A.3
  • 61
    • 79960937453 scopus 로고    scopus 로고
    • Introduction to biometric technology: Capabilities and applications to the food stamp program
    • Arlington, VA: R. Lewis & Co., Inc
    • Sticha, P. J., and J. P. Ford. 1999. "Introduction to biometric technology: Capabilities and applications to the food stamp program." In U.S. Department of Agriculture contract no: FCS 53-3198-6-025 (pp. 1-39). Arlington, VA: R. Lewis & Co., Inc.
    • (1999) U.S. Department of Agriculture Contract No: FCS 53-3198-6-025 , pp. 1-39
    • Sticha, P.J.1    Ford, J.P.2
  • 62
    • 0030529141 scopus 로고    scopus 로고
    • Organizational innovativeness: Exploring the relationship between organizational determinants of innovation, types of innovations, and the measures of organizational performance
    • Subramanian, A., and S. Nilakanta. 1996. "Organizational innovativeness: Exploring the relationship between organizational determinants of innovation, types of innovations, and the measures of organizational performance." Omega, International Journal of Management Science 24(6):631-647.
    • (1996) Omega, International Journal of Management Science , vol.24 , Issue.6 , pp. 631-647
    • Subramanian, A.1    Nilakanta, S.2
  • 64
    • 0242454335 scopus 로고    scopus 로고
    • Predicting intention to adopt interorganizational linkages: An institutional perspective
    • Teo, H. H., K. K. Wei, and I. Benbasat. 2003. "Predicting intention to adopt interorganizational linkages: An institutional perspective." MIS Quarterly 27(1):19-49.
    • (2003) MIS Quarterly , vol.27 , Issue.1 , pp. 19-49
    • Teo, H.H.1    Wei, K.K.2    Benbasat, I.3
  • 65
    • 11144254446 scopus 로고    scopus 로고
    • Adoption of e-processes by service firms: An empirical study of antecedents
    • Tsikriktsis, N., G. Lanzolla, and M. Frohlich. 2004. "Adoption of e-processes by service firms: An empirical study of antecedents." Production and Operations Management 13(3):216-229.
    • (2004) Production and Operations Management , vol.13 , Issue.3 , pp. 216-229
    • Tsikriktsis, N.1    Lanzolla, G.2    Frohlich, M.3
  • 67
    • 79960933906 scopus 로고    scopus 로고
    • Marketwatch. Retrieved from, accessed June 21, 2011
    • Waters, J. 2010. "Identity fraud nightmare: One man's story." Marketwatch. Retrieved from http://www.marketwatch.com/story/the-rise-of-identity-theft-one-mans-nightmare-2010-02-10 (accessed June 21, 2011).
    • (2010) Identity Fraud Nightmare: One Man's Story
    • Waters, J.1
  • 68
    • 41949138126 scopus 로고    scopus 로고
    • Biometrics in identity management systems
    • Wayman, J. L. 2008. "Biometrics in identity management systems." IEEE Security and Privacy Magazine 6(2):30-37.
    • (2008) IEEE Security and Privacy Magazine , vol.6 , Issue.2 , pp. 30-37
    • Wayman, J.L.1
  • 69
    • 32644486640 scopus 로고    scopus 로고
    • Generating premium returns on your IT investments
    • Weil, P., and S. Aral. 2006. "Generating premium returns on your IT investments." Sloan Management Review 47(2):39-48.
    • (2006) Sloan Management Review , vol.47 , Issue.2 , pp. 39-48
    • Weil, P.1    Aral, S.2
  • 70
    • 1642301442 scopus 로고    scopus 로고
    • On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements
    • Zorkadis, V., and P. Donos. 2004. "On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements." Information Management & Computer Security 12(1):125-137.
    • (2004) Information Management & Computer Security , vol.12 , Issue.1 , pp. 125-137
    • Zorkadis, V.1    Donos, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.