Biometric Authentication in Financial Institutions: The intention of Banks to Adopt Biometric Powered ATM

Herman Mandari, Daniel Koloseni

Abstract


The main purpose of this study was to assess the intention of banks to adopt biometric powered ATMs in Tanzania’s financial sector. The study adopted Electronic Data Interchange (EDI) model and extended it by introducing perceived risks in order to address the issue of risk which is mostly considered as the main barrier in implementing various technologies. The study used a sample of 47 banks, using ATM in Tanzania, and a multiple respondent’s technique was used to collect 102 valid responses. Multiple regression analysis was used to analyze the data; the empirical result shows that external pressure and perceived benefit are positively influencing the adoption of biometric powered ATM while perceived risk has negative influence. However, organization readiness was found to be insignificant in this study. This study has provided a more holistic understanding on the factors affecting adoption of biometric powered ATM which may enable various banks managers to adopt and implement biometric powered ATMs in Tanzania’s financial sector.


Keywords


Biometric powered ATMs; ATMs; Electronic Data Interchange; Perceived Risk

Full Text:

PDF

References


S. Mayhew, “History of Biometrics,” 2015. .

B. James, “Banks under siege from ATM Hackers,” The Citizen, 2015.

C. L. Miltgen, A. Popovič, and T. Oliveira, “Determinants of end-user acceptance of biometrics: Integrating the ‘Big 3’ of technology acceptance with privacy context,” Decis. Support Syst., vol. 56, pp. 103–114, 2013.

F.-M. E. Uzoka and T. Ndzinge, “Empirical analysis of biometric technology adoption and acceptance in Botswana,” J. Syst. Softw., vol. 82, no. 9, pp. 1550–1564, 2009.

J. Munilla and A. Peinado, “HB-MP: A further step in the HB-family of lightweight authentication protocols,” Comput. Networks, vol. 51, no. 9, pp. 2262–2267, 2007.

L. O’Gorman, “Seven issues with human authentication technologies,” in Workshop Automatic Identification Advanced Technologies (AutoID), 2002, pp. 185–186.

D. Kumar and Y. Ryu, “A brief introduction of biometrics and fingerprint payment technology,” Int. J. Adv. Sci. Technol., vol. 4, pp. 25–38, 2009.

B. Joke and O. Tiwalade, “Biometric Enabled E-Banking in Nigeria: Management and Customers’ Perspectives,” in Information and Knowledge Management, 2014, vol. 4, no. 11, pp. 23–28.

F. D. Davis, “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Q., pp. 319–340, 1989.

I. Ajzen, From intentions to actions: A theory of planned behavior. Berlin Heidelberg: Springer, 1985.

M. Fishbein and I. Ajzen, Belief, attitude, intention and behavior: An introduction to theory and research. 1975.

M. Rogers, Diffusion of Innovation, 3rd ed. New York: The Free Press, 1983.

V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, “User acceptance of information technology: Toward a unified view,” MIS Q., pp. 425–478, 2003.

P. Chwelos, I. Benbasat, and A. S. Dexter, “Research report: Empirical test of an EDI adoption model,” Inf. Syst. Res., vol. 12, no. 3, pp. 304–321, 2001.

C. L. Iacovou, I. Benbasat, and A. S. Dexter, “Electronic Data Interchange and Small Businesses: Adoption and Impact of Technology,” MIS Q., vol. 19, no. 4, pp. 465–485, 1995.

D. Laux, “A study of Biometrics Authentication Adoption in the Credit Union Industry,” Iowa State University, 2007.

D. Laux, A. Luse, B. Mennecke, and A. M. Townsend, “Adoption of biometric authentication systems: implications for research and practice in the deployment of end-user security systems,” J. Organ. Comput. Electron. Commer., vol. 21, no. 3, pp. 221–245, 2011.

M. Rogers, Diffusion of Innovations, 4th ed. New York: The Free Press, 1995.

S. Clark and C. S. Saunders, “EDI adoption and implementation: A focus on interorganizational linkages,” Inf. Resour. Manag. J., vol. 5, no. 1, pp. 9–20, 1992.

K. S. Tan, S. C. Chong, B. Lin, and U. C. Eze, “Internet-based ICT adoption among SMEs: Demographic versus benefits, barriers, and adoption intention,” J. Enterp. Inf. Manag., vol. 23, no. 1, pp. 27–55, 2010.

E. E. Grandon and J. M. Pearson, “Perceived Strategic Value and Adoption of Electronic Commerce : An Empirical Study of Small and Medium Sized Businesses,” Sci. York, 2002.

J. Y. L. Thong and C. S. Yap, “Information technology adoption by small business: An empirical study,” in Diffusion and adoption of information technology, Springer, 1996, pp. 160–175.

J. Webster, “EDI in a UK Automobile Manufacturer: Creating Systems, Forming Linkages, Driving Changes,” in The Seventh Electronic Data Interchange, 1994.

S. W. Wijaya, A. Dwiatmoko, K. Surendro, and H. S. Sastramihardja, “A Statistical Analysis of Priority Factors for Local e-Government in a Developing Country: Case Study of Yogyakarta Local Government, Indonesia,” in Handbook of Research on E-Government in Emerging Economies: Adoption, E-Participation, and Legal Frameworks, K. Bwalya and S. Zulu, Eds. Hershey, PA: IGI Global, 2012, pp. 194–211.

A.-M. Chang and P. K. Kannan, “Preparing for wireless and mobile technologies in government,” E-government, pp. 345–393, 2003.

C. Ferran and R. Salim, Electronic Business in Developing Countries: The Digitalization of Bad Practices? Hershey, PA: IGI Global, 2006.

S. S. Alam and M. K. M. Noor, “ICT Adoption in Small and Medium Enterprises : an Empirical Evidence of Service Sectors in Malaysia,” Int. J. Bus. Manag., vol. 4, no. 2, pp. 112–125, 2009.

M.-C. Lee, “Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit,” Electron. Commer. Res. Appl., vol. 8, no. 3, pp. 130–141, 2009.

M. S. Featherman and P. a. Pavlou, “Predicting e-services adoption: a perceived risk facets perspective,” Int. J. Hum. Comput. Stud., vol. 59, no. 4, pp. 451–474, 2003.

J. Jackson, N. Allum, and G. Gaskell, Perceptions of risk in cyberspace. Citeseer, 2005.

S. Mathswenyego, R. Klopper, and S. Lubbe, “ICT Investment Effectiveness in the South African Post Office,” African J. Inf. Syst., vol. 7, no. 3, pp. 27–51, 2013.

M. Carr, “Adoption and Diffusion of Internet Banking,” in Advances in Banking Technology and Management: Impacts of ICT and CRM, R. Vadlamani, Ed. Hershey, PA: IGI Global, 2007.

K. M. Eisenhardt and M. E. Graebner, “Theory building from cases: Opportunities and challenges,” Acad. Manag. J., vol. 50, no. 1, p. 25, 2007.

J. L. Balloun, H. Barrett, and A. Weinstein, “One is Not Enough: The Need for Multiple Respondents in Survey Research of Organizations,” J. Mod. Appl. Stat. Methods, vol. 10, no. 1, p. 26, 2011.

S. M. Young, “Survey research in management accounting: a critical assessment,” Res. methods Account. Issues debates, pp. 55–68, 1996.

P. L. Barreiro and J. P. Albandoz, “Population and sample: Sampling techniques.,” J. Manag. Math. Eur. Sch., 2001.

R. Srinivasan, G. L. Lilien, and A. Rangaswamy, “Technological Opportunism and Radical Technology Adoption: An Application to E-Business,” J. Mark., vol. 66, pp. 47–60, 2002.

E. E. Grandon and J. M. Pearson, “Electronic commerce adoption: An empirical study of small and medium US businesses,” Inf. Manag., vol. 42, no. 1, pp. 197–216, 2004.

M. Y. Yi, J. D. Jackson, J. S. Park, and J. C. Probst, “Understanding information technology acceptance by individual professionals: Toward an integrative view,” Inf. Manag., vol. 43, no. 3, pp. 350–363, 2006.

A. Molla and P. S. Licker, “ECommerce adoption in developing countries: A model and instrument,” Inf. Manag., vol. 42, no. 6, pp. 877–899, 2005.

J. Osborne and E. Waters, “Four assumptions of multiple regression that researchers should always test,” Pract. assessment, Res. Eval., vol. 8, no. 2, pp. 1–9, 2002.

P. A. Linley, J. Maltby, A. M. Wood, G. Osborne, and R. Hurling, “Measuring happiness: The higher order factor structure of subjective and psychological well-being measures,” Pers. Individ. Dif., vol. 47, no. 8, pp. 878–884, 2009.

J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson, and R. L. Tatham, Multivariate data analysis, 6th Ed. Upper Saddle River, NJ: Pearson Prentice Hall, 2006.

H. F. Kaiser, “A second generation little jiffy,” Psychometrika, vol. 35, no. 4, pp. 401–415, 1970.

T. R. Hinkin, J. B. Tracey, and C. A. Enz, “Scale construction: Developing reliable and valid measurement instruments,” J. Hosp. Tour. Res., vol. 21, no. 1, pp. 100–120, 1997.

Q. Ma and L. Liu, “The role of Internet self-efficacy in the acceptance of web-based electronic medical records,” Contemp. Issues End User Comput., vol. 17, no. 1, pp. 38–57, 2005.

D. Laux, N. G. Street, and A. M. Townsend, “Adoption of Biometric Authentication Systems: Implications for Research and Practice in the Deployment of End-user Security Systems,” J. Organ. Comput. Electron. Commer., vol. 21, no. 3, pp. 221–245, 2011.

C. P. Armstrong and V. Sambamurthy., “Information Technology Assimilation in Firms: The Influence of Senior Leadership and IT Infrastructures.,” Inf. Syst. Res., vol. 10, no. 4, pp. 304–327, 1999.

H. H. Teo, K. K. Wei, and I. Benbasat, “Predicting Intention to Adopt Interorganizational Linkages,” An Institutional Perspect. MIS Q., vol. 27, no. 1, pp. 19–49, 2003.




Lululemon Black Friday cheap nfl jerseys Lululemon factory Outlet ny Black Friday discount tiffany outlet wholesale soccer jerseys online oakley black friday cheap nhl jerseys china cheap nfl jerseys north face black friday sale cheap nfl jerseys online Jordans Black Friday Sale 2015 Cheap Moncler Cyber Monday moncler outlet cheap soccer jerseys moncler outlet black friday cheap authentic nfl jerseys north face cyber monday Louboutin Black Friday canada wholesale cheap nfl jerseys lululemon cyber monday 2015 cheap nfl jerseys from china 2015 Cheap Moncler Black Friday Sale Moncler Cyber Monday 2015 cheap jerseys Lululemon Cyber Monday Sale jordans cyber monday deals 2015 cheap nike nfl jerseys Black Friday deals Lululemon 2015 jordan black friday 2015 Moncler Jackets Black Friday Sale 2015 Louboutin Pas Cher Black Friday 2015 Canada Lululemon north face black friday cheap wholesale soccer jerseys