Empirical analysis of biometric technology adoption and acceptance in Botswana

There has been a slight surge in the study of technology adoption in developing countries. However, little attention has been paid to the adoption of biometric security systems. This paper reports a study that analyzed the adoption of biometric technology in a developing country from an institutional point of view. The results show that job positions (managerial and operational) could influence perceptions of innovation characteristics (especially ease of use and usefulness) in the decision to adopt biometrics. However, the unified organizational analyses indicate that ease of use, communication, size and type of organizations have significant impacts on the decision to adopt biometrics.

[1]  D. Bailey,et al.  Adoption of security systems by dairy farms to address bioterrorist threats in the intermountain United States. , 2006, Journal of dairy science.

[2]  Margaret Tan,et al.  Factors Influencing the Adoption of Internet Banking , 2000, J. Assoc. Inf. Syst..

[3]  Jack Hollingum They’ve got the measure of you , 1999 .

[4]  Stephen M. Mutula,et al.  E-readiness of SMEs in the ICT sector in Botswana with respect to information access , 2006, Electron. Libr..

[5]  Blair H. Sheppard,et al.  The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research , 1988 .

[6]  Anil K. Jain Biometric recognition: how do I know who you are? , 2004, Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, 2004..

[7]  Mahmoud M. Yasin,et al.  E-commerce implementation challenges: small to medium-sized versus large organisations , 2006, Int. J. Bus. Inf. Syst..

[8]  Reza Barkhi,et al.  Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..

[9]  Alemayehu Molla,et al.  Perceived E-Readiness Factors in E-Commerce Adoption: An Empirical Investigation in a Developing Country , 2005, Int. J. Electron. Commer..

[10]  Vasilios Zorkadis,et al.  On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements , 2004, Inf. Manag. Comput. Secur..

[11]  Anna Kochan Breakthrough in Biometrics , 2004 .

[12]  Gail E. Torbet,et al.  One in the eye to plastic card fraud , 1995 .

[13]  Julian Ashbourn,et al.  Biometrics - advanced identity verification: the complete guide , 2000 .

[14]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[15]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[16]  Julian Ashbourn Practical Biometrics: From Aspiration to Implementation , 2000 .

[17]  Louis A. Lefebvre,et al.  Firm innovativeness and CEO characteristics in small manufacturing firms , 1992 .

[18]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[19]  Christine Connolly Image processing algorithms underpinning iris and facial recognition systems , 2006 .

[20]  Warren A. Whisenant Using biometrics for sport venue management in a post 9‐11 era , 2003 .

[21]  Kevin Grant,et al.  An Investigation into Issues Influencing the Use of the Internet and Electronic Commerce among Small-Medium Sized Enterprises , 2003, J. Electron. Commer. Res..

[22]  Stephen M. Mutula,et al.  Use of cybercafés: study of Gaborone City, Botswana , 2004, Program.

[23]  R. Dewar,et al.  Elite Values Versus Organizational Structure in Predicting Innovation , 1973 .

[24]  J. Britz,et al.  Africa as a knowledge society: A reality check , 2006 .

[25]  S. Liu,et al.  A practical guide to biometric security technology , 2001 .

[26]  I. Ajzen The theory of planned behavior , 1991 .

[27]  Nicole C. Krämer,et al.  User acceptance: the BioSec approach , 2005 .

[28]  Shearon Lowery Milestones in mass communication research , 1983 .

[29]  Yingzi Eliza Du Review of iris recognition: cameras, systems, and their applications , 2006 .

[30]  J. Britz,et al.  Africa as a knowledge society , 2006 .

[31]  Blair H. Sheppard,et al.  THEORY OF REASONED ACTION , 2014 .

[32]  Antonella De Angeli,et al.  Honest, it’s me! Self-service verification , 2003 .

[33]  Thomas L. Ainscough,et al.  Characterizing consumer concerns about identification technology , 2006 .

[34]  Sandra Giarimi,et al.  Investigation of User Acceptance for Biometric Verification / Identification Methods in Mobile Units , 2004 .

[35]  G. Vyver,et al.  An Electronic Commerce Initiative in Regional Sri Lanka: The Vision for the Central Province Electronic Commerce Portal , 2004, Electron. J. Inf. Syst. Dev. Ctries..

[36]  Don Braggins Fingerprint sensing and analysis , 2001 .

[37]  John N. Carter,et al.  Automatic recognition by gait: progress and prospects , 2003 .

[38]  Faith-Michael E. Uzoka,et al.  E-commerce adoption in developing countries: a case analysis of environmental and organisational inhibitors , 2007, Int. J. Inf. Syst. Chang. Manag..

[39]  Julian Ashbourn,et al.  Biometrics: Advanced Identity Verification , 2000, Springer London.

[40]  Mark S. Nixon,et al.  Automatic Recognition by Gait , 2006, Proceedings of the IEEE.

[41]  Norman Desmarais Body language, security and e‐commerce , 2000 .

[42]  Philip Bennett Access control by audio‐visual recognition , 2000 .

[43]  Elizabeth K Bye,et al.  An analysis of apparel industry fit sessions , 2005 .

[44]  Yogesh Kumar Dwivedi,et al.  E-Commerce Adoption in Developing Countries , 2009 .

[45]  Jana Hawley,et al.  E-commerce Adoption For Supply Chain Management in U.S. Apparel Manufacturers , 2004 .

[46]  Kenneth C. C. Yang,et al.  Exploring factors affecting the adoption of mobile commerce in Singapore , 2005, Telematics Informatics.

[47]  F. Damanpour Organizational Innovation: A Meta-Analysis Of Effects Of Determinants and Moderators , 1991 .

[48]  Timothy Pearson,et al.  Evaluating Biometrics an Internal Control Solutions to Organizational Risk , 2005 .

[49]  M. Whitman,et al.  Management Of Information Security , 2004 .

[50]  Loizos Heracleous,et al.  Biometrics: the next frontier in service excellence, productivity and security in the service sector , 2006 .

[51]  Sanjiv D. Vaidya,et al.  Adoption of Electronic Commerce by Organizations in India: Strategic and Environmental Imperatives , 2004, Electron. J. Inf. Syst. Dev. Ctries..

[52]  David C. Yen,et al.  Biometric authentication: assuring access to information , 2002, Inf. Manag. Comput. Secur..

[53]  Irwin Brown,et al.  T-Commerce : an Investigation of Non-Adoption in South Africa , 2006 .

[54]  L. G. Tornatzky,et al.  Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.

[55]  Mike Hendry Smart Card Security and Applications , 1997 .

[56]  Jorgen P. Bansler,et al.  Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices , 2000, J. Assoc. Inf. Syst..

[57]  Angappa Gunasekaran,et al.  Global e-business: firm size, credibility and desirable modes of payment , 2006, Int. J. Bus. Inf. Syst..

[58]  Russell Ryan Identity assurance and the protection of the civil infrastructure , 2006 .

[59]  E. Rogers Diffusion of Innovations , 1962 .

[60]  Virginia Franke Kleist,et al.  The biometric technologies business case: a systematic approach , 2005, Inf. Manag. Comput. Security.

[61]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[62]  R. Zmud,et al.  Information technology implementation research: a technological diffusion approach , 1990 .

[63]  I. M. Jimu,et al.  An Exploration of Street Vending's Contribution Towards Botswana's Vision of Prosperity for All by 2016 , 2004 .

[64]  Faith-Michael E. Uzoka,et al.  Organisational influences on e-commerce adoption in a developing country context using UTAUT , 2008, Int. J. Bus. Inf. Syst..

[65]  David R. Lease Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers , 2005 .

[66]  Jane You,et al.  A robust automatic face recognition system for real‐time personal identification , 2006 .

[67]  Mohammed Yakoob Siyal,et al.  Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..

[68]  J. Munene,et al.  Organizational Environment in Africa: A Factor Analysis of Critical Incidents , 1991 .

[69]  Stephen L. Parente,et al.  Barriers to Technology Adoption and Development , 1994, Journal of Political Economy.