Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment

Abstract Biometrics authentication for electronic payment is generally viewed as a quicker, convenient and a more secure means to identify and authenticate users for online payment. This view is mostly anecdotal and conceptual is nature. The aim of the paper is to shed light on the comparison of perceptions and beliefs of different authentication methods for electronic payment (i.e., credit card, credit card with PIN, and fingerprint biometrics authentication) in an e-commerce context. As theoretical foundation, the valence framework is used in understanding and explaining the individual's evaluation of benefit and risk concerning the payment methods. We propose a research model with hypotheses that evaluate and compare the individual's perceptions of the payment authentication methods, trust of the online store, and the willingness to continue using the website account associated with the payment authentication method. An experiment is used to test the hypotheses. The results show that biometrics authentication significantly influences the individual's security concern, perceived usefulness, and trust of online store. Theoretically, through the study's context – biometrics versus credit card authentication – evidence is provided for the importance of the individual's perceptions, concerns, and beliefs in the use of biometrics for electronic payments. Managerial implications include shedding light on the perceptions and concerns of secure authentication and the need for implementing biometrics authentication for electronic payments.

[1]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[2]  Sirkka L. Jarvenpaa,et al.  Consumer trust in an Internet store , 2000, Inf. Technol. Manag..

[3]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[4]  Reza Barkhi,et al.  Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..

[5]  Kenneth A. Carow,et al.  Debit, credit, or cash: survey evidence on gasoline purchases , 1999 .

[6]  Virginia Franke Kleist,et al.  Building Technologically Based Online Trust: Can the Biometrics Industry Deliver the Online Trust Silver Bullet? , 2007, Inf. Syst. Manag..

[7]  Edmund Kohlwey,et al.  Leveraging the Cloud for Big Data Biometrics: Meeting the Performance Requirements of the Next Generation Biometric Systems , 2011, 2011 IEEE World Congress on Services.

[8]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[9]  Paul A. Pavlou,et al.  Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role , 2005, Inf. Syst. Res..

[10]  Han Zhang,et al.  Factors affecting payment choices in online auctions: A study of eBay traders , 2006, Decis. Support Syst..

[11]  Dan J. Kim,et al.  A Study of the Multilevel and Dynamic Nature of Trust in E-Commerce from a Cross-Stage Perspective , 2014, Int. J. Electron. Commer..

[12]  Andrew Whinston,et al.  Electronic Commerce: A Manager's Guide , 1997 .

[13]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[14]  Izak Benbasat,et al.  Designing Warning Messages for Detecting Biased Online Product Recommendations: An Empirical Investigation , 2015, Inf. Syst. Res..

[15]  J. H. Davis,et al.  The effect of the performance appraisal system on trust for management: A field quasi-experiment. , 1999 .

[16]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[17]  Hyoungjoo Lee,et al.  Account-Sharing Detection Through Keystroke Dynamics Analysis , 2009, Int. J. Electron. Commer..

[18]  Anol Bhattacherjee,et al.  Individual Trust in Online Firms: Scale Development and Initial Test , 2002, J. Manag. Inf. Syst..

[19]  Izak Benbasat,et al.  E-Commerce Product Recommendation Agents: Use, Characteristics, and Impact , 2007, MIS Q..

[20]  John Kane,et al.  Exploring the psychological and somatic impact of identity theft. , 2004, Journal of forensic sciences.

[21]  M. Sarstedt,et al.  A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .

[22]  R. Bharat Rao,et al.  Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange , 2006, J. Comput. Mediat. Commun..

[23]  Izak Benbasat,et al.  Effects of rational and social appeals of online recommendation agents on cognition- and affect-based trust , 2016, Decis. Support Syst..

[24]  İsa Ipcioglu,et al.  Adoption of Biometric Technology in Online Applications , 2010 .

[25]  Dennis D Abrazhevich,et al.  Electronic payment systems : a user-centered perspective and interaction design , 1999 .

[26]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[27]  Akhilesh Chandra,et al.  Challenges and constraints to the diffusion of biometrics in information systems , 2005, CACM.

[28]  Adamantios Diamantopoulos,et al.  The error term in formative measurement models: interpretation and modeling implications , 2006 .

[29]  Anol Bhattacherjee,et al.  Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..

[30]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[31]  Jianying Hu,et al.  Retail applications of signature verification , 2004, SPIE Defense + Commercial Sensing.

[32]  Robert J. Kauffman,et al.  Should We Wait? Network Externalities, Compatibility, and Electronic Billing Adoption , 2001, J. Manag. Inf. Syst..

[33]  Hyun-jung Kim Biometrics, is it a viable proposition for identity authentication and access control? , 1995, Comput. Secur..

[34]  Paul A. Pavlou,et al.  The Boundaries of Trust and Risk: The Quadratic Moderating Role of Institutional Structures , 2012, Inf. Syst. Res..

[35]  D. Gefen,et al.  E-commerce: the role of familiarity and trust , 2000 .

[36]  Paul A. Pavlou,et al.  Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..

[37]  Wang Tao,et al.  An empirical study of customers' perceptions of security and trust in e-payment systems , 2010, Electron. Commer. Res. Appl..

[38]  Anat Hovav,et al.  Tutorial: Identity Management Systems and Secured Access Control , 2009, Commun. Assoc. Inf. Syst..

[39]  J. P. Peter,et al.  A Comparative Analysis of Three Consumer Decision Strategies , 1975 .

[40]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[41]  Joseph S. Valacich,et al.  The Effect of Perceived Novelty on the Adoption of Information Technology Innovations: A Risk/Reward Perspective , 2010, Decis. Sci..

[42]  Gurpreet Dhillon,et al.  TORKZADEH AND DHILLON Measuring Factors that Influence the Success of Internet , 2015 .

[43]  Cristian Morosan,et al.  Voluntary Steps toward Air Travel Security , 2012 .

[44]  Keng Siau,et al.  Building customer trust in mobile commerce , 2003, CACM.

[45]  Moshe Zviran,et al.  Password Security: An Empirical Study , 1999, J. Manag. Inf. Syst..

[46]  Richard Clodfelter Biometric technology in retailing: Will consumers accept fingerprint authentication? , 2010 .

[47]  Charles M. Kahn,et al.  Identity Theft and Consumer Payment Choice: Does Security Really Matter? , 2016 .

[48]  Shuiqing Yang,et al.  Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective , 2011, Inf. Manag..

[49]  Matthew K. O. Lee,et al.  Trust in Internet Shopping: Instrument Development and Validation through Classical and Modern Approaches , 2001, J. Glob. Inf. Manag..

[50]  Michael J. Ryan,et al.  An Investigation of Perceived Risk at the Brand Level , 1976 .

[51]  Sookeun Byun,et al.  Exploring perceptions toward biometric technology in service encounters: a comparison of current users and potential adopters , 2013, Behav. Inf. Technol..

[52]  I. Ajzen,et al.  Predicting dishonest actions using the theory of planned behavior , 1991 .

[53]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[54]  H. Raghav Rao,et al.  Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration , 2009, Inf. Syst. Res..

[55]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[56]  Zhongju Zhang,et al.  A Finite Mixture Logit Model to Segment and Predict Electronic Payments System Adoption , 2011, Inf. Syst. Res..

[57]  P. Pavlou,et al.  Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions , 2002 .

[58]  D. Whetten What Constitutes a Theoretical Contribution , 1989 .

[59]  D. Larcker,et al.  PERCEIVED USEFULNESS OF INFORMATION: A PSYCHOMETRIC EXAMINATION* , 1980 .

[60]  Izak Benbasat,et al.  A Comprehensive Model of Perceived Risk of E-Commerce Transactions , 2010, Int. J. Electron. Commer..

[61]  Joseph S. Valacich,et al.  An Alternative to Methodological Individualism: A Non-Reductionist Approach to Studying Technology Adoption by Groups , 2010, MIS Q..

[62]  M. Tremaine,et al.  Intention to Use Biometric Systems , 2012 .

[63]  Mark Cohn Biometrics: Key to securing consumer trust , 2007 .

[64]  Raymond N. J. Veldhuis,et al.  Biometric Authentication System on Mobile Personal Devices , 2010, IEEE Transactions on Instrumentation and Measurement.

[65]  K. Havenetidis,et al.  Encryption and Biometrics:Context, methodologies and perspectives of biological data , 2013 .

[66]  Marko Sarstedt,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .

[67]  Yeonseung Ryu,et al.  A survey on biometric fingerprints: The cardless payment system , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[68]  Christian Böhm,et al.  Biometric Template Protection , 2011, Datenschutz und Datensicherheit - DuD.

[69]  Peter Jones,et al.  Biometrics in retailing , 2007 .

[70]  Christoph Busch,et al.  Biometric template protection , 2009, Datenschutz und Datensicherheit - DuD.

[71]  Tiago Oliveira,et al.  Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context , 2013, Decis. Support Syst..

[72]  Annemette Kjærgaard,et al.  Who do you think you are? A review of the complex interplay between information systems, identification and identity , 2014, Eur. J. Inf. Syst..

[73]  William J. Doll,et al.  The Measurement of End-User Computing Satisfaction , 1988, MIS Q..

[74]  Václav Matyás,et al.  Biometric authentication - security and usability , 2002, Communications and Multimedia Security.