Users' Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model

This paper presents current findings from cross-cultural studies investigating the adoption of new secure technology, based on fingerprint authentication systems to be applied to an e-commerce websites, within the perspective of Saudi culture. The aim of the study was to explore factors affecting users’ acceptance of biometric authentication systems. A large scale laboratory experiment of 306 Saudis was performed using a login fingerprint system to observe whether Saudis are practically and culturally enthusiastic to accept this technology. The findings were then examined to measure the reliability and validity along with applying a proposed conceptual framework based on the Unified Theory of Acceptance and Use of Technology (UTAUT) with three moderating variables: age, gender and education level. The study model was adapted to meet the objectives of this study while adding other intrinsic factors such as self-efficiency and biometric system characteristics.

[1]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[2]  Harold Thimbleby,et al.  Validating the unified theory of acceptance and use of technology (UTAUT) tool cross-culturally , 2007 .

[3]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[4]  Jijie Wang,et al.  Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT , 2007, Inf. Manag..

[5]  J. Nunnally Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .

[6]  C. Fornell A Second generation of multivariate analysis : classification of methods and implications for marketing research , 1985 .

[7]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[8]  Suha AlAwadhi,et al.  The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[9]  S. Furnell,et al.  Public awareness and perceptions of biometrics , 2007 .

[10]  Thomas V. Bonoma,et al.  Review of marketing , 1978 .

[11]  Robert M. Davison,et al.  GSS for presentation support , 2000, CACM.

[12]  Reza Barkhi,et al.  Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..

[13]  Rami Qahwaji,et al.  The Effects of Gender Differences in the Acceptance of Biometrics Authentication Systems within Online Transaction , 2009, 2009 International Conference on CyberWorlds.

[14]  S. Liu,et al.  A practical guide to biometric security technology , 2001 .

[15]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[16]  Faith-Michael E. Uzoka,et al.  Empirical analysis of biometric technology adoption and acceptance in Botswana , 2009, J. Syst. Softw..