Initial Development of a Learners ’ Ratified Acceptance of Multibiometrics Intentions Model ( RAMIM )

Authenticating users is a continuous tradeoff between the level of invasiveness and the degree of system security. Password protection has been the most widely authentication approach used, however, it is easily compromised. Biometric authentication devices have been implemented as a more robust approach. This paper reports on initial results of student perceptions about their acceptance of a multibiometrics authentication approach in the context of e-learning systems. Specifically, this paper reports on the initial empirical development of a learners’ Ratified Acceptance of Multibiometrics Intentions Model (RAMIM). The model proposed investigates the impact of students’ code of conduct awareness, perceived ease-of-use, perceived usefulness, and ethical decision making on learners’ intention to use multibiometrics for authentication during elearning exams. The study’s participants included 97 non-information technology (IT) students who attended e-learning courses. Additionally, results of a path analysis using Partial Least Square (PLS) indicate that perceived usefulness has the most significant impact on learners’ intention to use multibiometrics during e-learning exams. Students’ ethical decision making and perceived usefulness demonstrated significant impact on their intention to use multibiometrics. Additionally, students’ code of conduct awareness appears to have a positive impact on their ethical decision making. Conclusions are discussed including recommendations for future research on extending this initial research into applied experiments to address e-learning security issues.

[1]  Yair Levy,et al.  Towards a framework of biometrics exam authentication in e-learning environments , 2007 .

[2]  Fred D. Davis A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .

[3]  Nicole A. Buzzetto-More Student Perceptions of Various E-Learning Components , 2008 .

[4]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[5]  David J. Paper,et al.  User Acceptance of Voice Recognition Technology: An Empirical Extension of the Technology Acceptance Model , 2007, J. Organ. End User Comput..

[6]  John D. Woodward,et al.  Biometrics: privacy's foe or privacy's friend? , 1997, Proc. IEEE.

[7]  Khalil El-Khatib,et al.  Privacy and Security in E-Learning , 2003, Int. J. Distance Educ. Technol..

[8]  Lori N. K. Leonard,et al.  An Empirical Validation of Perceived Importance and Behavior Intention in IT Ethics , 2005 .

[9]  Liora Pedhazur Schmelkin,et al.  Faculty Perceptions of Academic Dishonesty: A Multidimensional Scaling Analysis , 2003 .

[10]  Gaby Odekerken-Schröder,et al.  Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .

[11]  Yair Levy,et al.  Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University , 2006, J. Cases Inf. Technol..

[12]  Marlyn Kemper Littman Guidelines for Network Security in the Learning Environment. , 1996 .

[13]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[14]  Denise Nitterhouse,et al.  Plagiarism – Not Just an ``Academic'' Problem , 2003 .

[15]  Steve Wheeler Connected Minds, Emerging Cultures: Cybercultures in Online Learning , 2008 .

[16]  Detmar W. Straub,et al.  Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..

[17]  Arun Ross,et al.  Multibiometric systems , 2004, CACM.

[18]  Deborah Compeau,et al.  Intentions to Use Information Technologies: An Integrative Model , 2006, J. Organ. End User Comput..

[19]  Jane E. West Increasing access to higher education for students with disabilities and strengthening the preparation of professionals who instruct them: The Higher Education Opportunity Act of 2008 , 2009 .

[20]  Terry W. Loe,et al.  The Impact of Ethics Code Familiarity on Manager Behavior , 2001 .

[21]  Hassan M. Selim,et al.  Critical success factors for e-learning acceptance: Confirmatory factor models , 2007, Comput. Educ..

[22]  Jingguo Wang,et al.  Research Note - A Value-at-Risk Approach to Information Security Investment , 2008, Inf. Syst. Res..

[23]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[24]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[25]  Steven Furnell,et al.  Advanced user authentication for mobile devices , 2007, Comput. Secur..

[26]  Roxane L. Dufrene,et al.  The Ethical Decision-Making Scale-Revised , 2004 .

[27]  Craig V. VanSandt,et al.  An Examination of the Relationship Between Ethical Work Climate and Moral Awareness , 2006 .

[28]  Wayne Bedford,et al.  Implementing Technology to Prevent Online Cheating: A Case Study at a Small Southern Regional University (SSRU) , 2009 .

[29]  Jay F. Nunamaker,et al.  Can e-learning replace classroom learning? , 2004, CACM.

[30]  Fernando L. Podio,et al.  Biometric Authentication Technology: From the Movies to Your Desktop , 2001 .

[31]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[32]  Yoram Eshet-Alkalai,et al.  Does the medium affect the message? The influence of text representation format on critical thinking , 2007 .

[33]  Joobin Choobineh,et al.  Enterprise information security strategies , 2008, Comput. Secur..

[34]  Alexander P. Pons Biometric marketing: targeting the online consumer , 2006, CACM.

[35]  John Ingham,et al.  Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..

[36]  Detmar W. Straub,et al.  Validation in Information Systems Research: A State-of-the-Art Assessment , 2001, MIS Q..

[37]  Philip Barker,et al.  Assessing the Value of E‐Learning Systems , 2006 .

[38]  Kristen M. Kennedy,et al.  Academic dishonesty and distance learning: Student and faculty views. , 2000 .

[39]  Mohammed Y. A. Rawwas,et al.  Academic Dishonesty: A Cross-Cultural Comparison of U.S. and Chinese Marketing Students , 2004 .

[40]  Chih-Lung Lin,et al.  Palmprint verification using hierarchical decomposition , 2005, Pattern Recognit..

[41]  Terry W. Loe,et al.  Ethics Code Familiarity and Usefulness: Views on Idealist and Relativist Managers Under Varying Conditions of Turbulence , 2003 .

[42]  Carla E. Brodley,et al.  User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.

[43]  Jeffrey L. Bailie,et al.  Online Learner Authentication: Verifying the Identity of Online Users , 2009 .

[44]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[45]  Julie Thorpe,et al.  On predictive models and user-drawn graphical passwords , 2008, TSEC.

[46]  Bruce W. Char,et al.  Academic dishonesty in a high-tech environment , 2003, SIGCSE.

[47]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[48]  Craig A. Mertler,et al.  Advanced and multivariate statistical methods: Practical application and interpretation: Sixth edition , 2001 .

[49]  R. Coughlan,et al.  Codes, Values and Justifications in the Ethical Decision-Making Process , 2005 .

[50]  Raafat George Saadé,et al.  The impact of cognitive absorption on perceived usefulness and perceived ease of use in on-line learning: an extension of the technology acceptance model , 2005, Inf. Manag..

[51]  Michelle M. Ramim,et al.  An examination of factors associated with students' ethical decision making in post-secondary e-learning programs , 2007 .

[52]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[53]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[54]  Anindya Ghose,et al.  The Economic Incentives for Sharing Security Information , 2004, Inf. Syst. Res..

[55]  Eric W. T. Ngai,et al.  Empirical examination of the adoption of WebCT using TAM , 2007, Comput. Educ..

[56]  Steven Furnell,et al.  Authentication and Supervision: A Survey of User Attitudes , 2000, Comput. Secur..

[57]  Michael G. Strintzis,et al.  A 3D face and hand biometric system for robust user-friendly authentication , 2007, Pattern Recognit. Lett..

[58]  Marlyn K. Littman Security in the Telelearning Environment: Part I: Cyberinvasions and Countermeasures. , 1997 .

[59]  Nitza Geri,et al.  Is There a Value Paradox of E-Learning in MBA Programs? , 2007 .

[60]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[61]  Yair Levy,et al.  An empirical development of critical value factors (CVF) of online learning activities: An application of activity theory and cognitive value theory , 2008, Comput. Educ..

[62]  Armin Liebl,et al.  Authentication in distributed systems: a bibliography , 1993, OPSR.

[63]  David R. Firth,et al.  Communications of the Association for Information Systems , 2011 .

[64]  Liz Riley,et al.  E-Learning and Constructivism: From Theory to Application , 2009 .

[65]  Huseyin Cavusoglu,et al.  The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..

[66]  Yair Levy,et al.  An Empirical Study of Computer Self-Efficacy and the Technology Acceptance Model in the Military: A Case of a U.S. Navy Combat Information System , 2009, J. Organ. End User Comput..

[67]  Elmarie Kritzinger Information Security in an E-learning Environment , 2006, Education for the 21st Century.

[68]  Quey-Jen Yeh,et al.  Threats and countermeasures for information system security: A cross-industry study , 2007, Inf. Manag..

[69]  Hassan M. Selim,et al.  An empirical investigation of student acceptance of course websites , 2003, Comput. Educ..

[70]  Timothy Paul Cronan,et al.  How men and women view ethics , 1998, CACM.

[71]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[72]  Elmarie Kritzinger,et al.  E-learning: Incorporating Information Security Governance , 2006 .

[73]  Steven Furnell,et al.  Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..

[74]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[75]  C.A. Dorantes,et al.  Ethical Decision-Making in an IT Context: The Roles of Personal Moral Philosophies and Moral Intensity , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[76]  Andrea F. Abate,et al.  2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..

[77]  Rossouw von Solms,et al.  Information security requirements - Interpreting the legal aspects , 2008, Comput. Secur..

[78]  Reza Barkhi,et al.  Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..

[79]  Steven Furnell,et al.  A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head , 2007, Comput. Secur..

[80]  Donald L. Mccabe,et al.  Ten (Updated) Principles of Academic Integrity: How Faculty Can Foster Student Honesty , 2004 .

[81]  Nicolas Christin,et al.  Undercover: authentication usable in front of prying eyes , 2008, CHI.

[82]  Kenji Takahashi,et al.  Authentication using multiple communication channels , 2005, DIM '05.

[83]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[84]  Juhani Heikka,et al.  Do secure information system design methods provide adequate modeling support? , 2008, Inf. Softw. Technol..

[85]  Richard P. Bagozzi,et al.  The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift , 2007, J. Assoc. Inf. Syst..

[86]  Anil K. Jain,et al.  Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[87]  L. Ferrell,et al.  A Review of Empirical Studies Assessing Ethical Decision Making in Business , 2000 .

[88]  Camille F. Rogers,et al.  Faculty perceptions about e-cheating during online testing , 2006 .

[89]  ProTon Europe,et al.  Ethics and technology : ethical issues in an age of information and communication technology , 2007 .