Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory

Mobile devices have become the world’s most common means of interpersonal communication; and, the growing marketplace for new software, or “apps”, enriches an already burgeoning array of purposes to which mobile technology can be lent. We are thus witnessing the advent of conditions for a range of mobile technology enabled information systems. According to the latest statistics produced by the Central Intelligence Agency (CIA), there were 5.3 billion mobile subscriptions worldwide in 2010 out of a world population of about 7 billion people (World Fact Book 2011). With the advancements in mobile technologies, several governments have started looking to provide their services via wireless and mobile devices. Mobile government (m-government) is a new delivery channel using Information and Communication Technology to deliver and improve government services that complements current e-government (Antovski and Gusev 2005). Currently, a number of m-government applications exist in several countries around the world. With the growth of m-government services, the importance of security for its acceptance and adoption has been noted in many studies (NECCC 2001; Al-khamayseh et al. 2006; Clarke and Furnell 2005, 2007). Requirements for user acceptance lead to a greater need for user and government authentication to protect data, services, and the promotion of public trust. The negative security perception is a serious issue that citizens have regarding the use of mobile services which may affect their adoption of the technology for critical applications (Chang and Kannan 2002).

[1]  J. McLeod Practitioner Research in Counselling , 1999 .

[2]  Cathy Urquhart,et al.  Grounded Theory Method: The Researcher as Blank Slate and Other Myths , 2006, ICIS.

[3]  Ilse Giesing,et al.  User perceptions related to identification through biometrics within electronic business , 2005 .

[4]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[5]  Steven Furnell,et al.  Advanced user authentication for mobile devices , 2007, Comput. Secur..

[6]  J. Ettlie Managing Technological Innovation , 2000 .

[7]  Christina Goulding Grounded Theory: A Practical Guide for Management, Business and Market Researchers , 2002 .

[8]  Yazdan Mansourian,et al.  Adoption of grounded theory in LIS research , 2006 .

[9]  Raj Nanavati,et al.  Biometrics: Identity Verification in a Networked World , 2002 .

[10]  Anselm L. Strauss,et al.  Basics of Qualitative research : techniques and , 2008 .

[11]  Timothy Pearson,et al.  Evaluating Biometrics an Internal Control Solutions to Organizational Risk , 2005 .

[12]  Cathy Urquhart,et al.  Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems , 2009, Inf. Syst. J..

[13]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[14]  N. Denzin,et al.  Handbook of Qualitative Research , 1994 .

[15]  James B. Pick,et al.  Technology factors in corporate adoption of mobile cell phones: a case study analysis , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[16]  Claus Vielhauer Biometric User Authentication for it Security - From Fundamentals to Handwriting , 2006, Advances in Information Security.

[17]  Faith-Michael E. Uzoka,et al.  An investigation of factors affecting biometric technology adoption in a developing country context , 2009, Int. J. Biom..

[18]  J. Creswell Qualitative inquiry and research design: choosing among five traditions. , 1998 .

[19]  Steven Furnell,et al.  Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..

[20]  Sandra Giarimi,et al.  Investigation of User Acceptance for Biometric Verification / Identification Methods in Mobile Units , 2004 .

[21]  K. Charmaz,et al.  Constructing Grounded Theory: A practical guide through qualitative analysis Kathy Charmaz Constructing Grounded Theory: A practical guide through qualitative analysis Sage 224 £19.99 0761973532 0761973532 [Formula: see text]. , 2006, Nurse researcher.

[22]  Christos Kalloniatis Security Enhanced Applications For Information Systems , 2014 .

[23]  B. Glaser Basics of Grounded Theory Analysis: Emergence Vs. Forcing , 1992 .

[24]  Anil K. Jain,et al.  Biometric Systems: Technology, Design and Performance Evaluation , 2004 .

[25]  N. Jahangir,et al.  The role of perceived usefulness, perceived ease of use, security and privacy, and customer attitude to engender customer adaptation in the context of electronic banking , 2008 .

[26]  Thompson S. H. Teo,et al.  Adoption of WAP-enabled mobile phones among Internet users , 2003 .

[27]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[28]  Panagiotis Kanellis,et al.  User Behaving Badly: Phenomena and Paradoxes from an Investigation into Information System Misfit , 2005, J. Organ. End User Comput..

[29]  David C. Yen,et al.  Biometric authentication: assuring access to information , 2002, Inf. Manag. Comput. Secur..

[30]  Julian Ashbourn Practical Biometrics , 2004, Springer Professional Computing.

[31]  Martin Hughes,et al.  An assessment of biometric identities as a standard for e-government services , 2005, Int. J. Serv. Stand..

[32]  H. Heath,et al.  Developing a grounded theory approach: a comparison of Glaser and Strauss. , 2004, International journal of nursing studies.

[33]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[34]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[35]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[36]  Theodoulos Garefalakis,et al.  PKI in mobile systems , 2004 .

[37]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[38]  Anselm L. Strauss,et al.  Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .

[39]  Abdullah Mohammed Al-shehry,et al.  Transformation towards e-government in The Kingdom of Saudi Arabia : technological and organisational perspectives , 2009 .

[40]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[41]  A. Strauss,et al.  Basics of qualitative research: Grounded theory procedures and techniques. , 1993 .

[42]  E. Brink,et al.  Constructing grounded theory : A practical guide through qualitative analysis , 2006 .

[43]  Pam J. Mayhew,et al.  M-government Implications For E-Government In Developing Countries: The Case of Saudi Arabia. , 2005 .

[44]  Rana Tassabehji,et al.  GENERATING CITIZEN TRUST IN E-GOVERNMENT USING A TRUST VERIFICATION AGENT: A RESEARCH NOTE , 2006 .

[45]  Jung P. Shim,et al.  Factors influencing corporate web site adoption: a time-based assessment , 2001, Inf. Manag..

[46]  A. Strauss,et al.  Grounded theory methodology: An overview. , 1994 .

[47]  A. Michael Huberman,et al.  An expanded sourcebook qualitative data analysis , 1994 .

[48]  Feng Li,et al.  Implementing E-Government Strategy in Scotland: Current Situation and Emerging Issues , 2003, J. Electron. Commer. Organ..

[49]  Singh Sheenal Preparing for Wireless and Mobile Technologies in Government , 2002 .

[50]  Felix B. Tan,et al.  Beyond Models of National Culture in Information Systems Research , 2002, J. Glob. Inf. Manag..