A Study of Biometric Authentication Adoption in Health Services

Authentication technologies using biometrics already play a major role in the context of security systems. Some techniques are used in several services not only to ensure physical access to facilities but also to provide some thoroughness in access control. This study addresses the perception of users regarding the use of biometric authentication technologies. The results derived from a survey indicate a trend of acceptance of such technologies on the access control to health services.

[1]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[2]  AltermanAnton A piece of yourself , 2003 .

[3]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[4]  Marek Rejman-Greene,et al.  Privacy Issues in the Application of Biometrics: a European Perspective , 2005 .

[5]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[6]  Evropi Papadopoulou-Chatzilazarou Το ανθρώπινο του Χριστού στο έργο του Ευστρατίου Νικαίας , 2014 .

[7]  Sabine Delaître Risk management approach on identity theft in biometric systems context , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[8]  Mario Savastano Biometrics: Modelling the Body , 2008, Tenth International Conference on Computer Modeling and Simulation (uksim 2008).

[9]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[10]  Michael C. Fairhurst Document identity, authentication and ownership: the future of biometric verification , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[11]  Paulo Sérgio Tenreiro Magalhães,et al.  Biometria e autenticação , 2003 .

[12]  Vasilios Zorkadis,et al.  On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements , 2004, Inf. Manag. Comput. Secur..

[13]  A. Anthony Irudhayaraj,et al.  Biometric system , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[14]  Fred D. Davis A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .

[15]  Reza Barkhi,et al.  Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..

[16]  Despina Polemi,et al.  Risk Analysis of Biometric Systems , 2004, WOSIS.

[17]  A. Alterman,et al.  ``A piece of yourself'': Ethical issues in biometric identification , 2003, Ethics and Information Technology.

[18]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[19]  Václav Matyás,et al.  Security of biometric authentication systems , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).

[20]  Rodger Jamieson,et al.  Biometric Authentication Adoption Issues , 2003 .

[21]  Andrew Watson Biometrics: easy to steal, hard to regain identity , 2007, Nature.

[22]  Younghwa Lee,et al.  The Technology Acceptance Model: Past, Present, and Future , 2003, Commun. Assoc. Inf. Syst..

[23]  S. Liu,et al.  A practical guide to biometric security technology , 2001 .

[24]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[25]  Stephen L. Chan,et al.  Information technology in business processes , 2000, Bus. Process. Manag. J..

[26]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[27]  Arun Ross,et al.  An introduction to biometrics , 2008, ICPR 2008.