Biometric Authentication in Financial Institutions: The intention of Banks to Adopt Biometric Powered ATM
Abstract
The main purpose of this study was to assess the intention of banks to adopt biometric powered ATMs in Tanzania’s financial sector. The study adopted Electronic Data Interchange (EDI) model and extended it by introducing perceived risks in order to address the issue of risk which is mostly considered as the main barrier in implementing various technologies. The study used a sample of 47 banks, using ATM in Tanzania, and a multiple respondent’s technique was used to collect 102 valid responses. Multiple regression analysis was used to analyze the data; the empirical result shows that external pressure and perceived benefit are positively influencing the adoption of biometric powered ATM while perceived risk has negative influence. However, organization readiness was found to be insignificant in this study. This study has provided a more holistic understanding on the factors affecting adoption of biometric powered ATM which may enable various banks managers to adopt and implement biometric powered ATMs in Tanzania’s financial sector.
Keywords
Full Text:
PDFReferences
S. Mayhew, “History of Biometrics,” 2015. .
B. James, “Banks under siege from ATM Hackers,” The Citizen, 2015.
C. L. Miltgen, A. Popovič, and T. Oliveira, “Determinants of end-user acceptance of biometrics: Integrating the ‘Big 3’ of technology acceptance with privacy context,” Decis. Support Syst., vol. 56, pp. 103–114, 2013.
F.-M. E. Uzoka and T. Ndzinge, “Empirical analysis of biometric technology adoption and acceptance in Botswana,” J. Syst. Softw., vol. 82, no. 9, pp. 1550–1564, 2009.
J. Munilla and A. Peinado, “HB-MP: A further step in the HB-family of lightweight authentication protocols,” Comput. Networks, vol. 51, no. 9, pp. 2262–2267, 2007.
L. O’Gorman, “Seven issues with human authentication technologies,” in Workshop Automatic Identification Advanced Technologies (AutoID), 2002, pp. 185–186.
D. Kumar and Y. Ryu, “A brief introduction of biometrics and fingerprint payment technology,” Int. J. Adv. Sci. Technol., vol. 4, pp. 25–38, 2009.
B. Joke and O. Tiwalade, “Biometric Enabled E-Banking in Nigeria: Management and Customers’ Perspectives,” in Information and Knowledge Management, 2014, vol. 4, no. 11, pp. 23–28.
F. D. Davis, “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Q., pp. 319–340, 1989.
I. Ajzen, From intentions to actions: A theory of planned behavior. Berlin Heidelberg: Springer, 1985.
M. Fishbein and I. Ajzen, Belief, attitude, intention and behavior: An introduction to theory and research. 1975.
M. Rogers, Diffusion of Innovation, 3rd ed. New York: The Free Press, 1983.
V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, “User acceptance of information technology: Toward a unified view,” MIS Q., pp. 425–478, 2003.
P. Chwelos, I. Benbasat, and A. S. Dexter, “Research report: Empirical test of an EDI adoption model,” Inf. Syst. Res., vol. 12, no. 3, pp. 304–321, 2001.
C. L. Iacovou, I. Benbasat, and A. S. Dexter, “Electronic Data Interchange and Small Businesses: Adoption and Impact of Technology,” MIS Q., vol. 19, no. 4, pp. 465–485, 1995.
D. Laux, “A study of Biometrics Authentication Adoption in the Credit Union Industry,” Iowa State University, 2007.
D. Laux, A. Luse, B. Mennecke, and A. M. Townsend, “Adoption of biometric authentication systems: implications for research and practice in the deployment of end-user security systems,” J. Organ. Comput. Electron. Commer., vol. 21, no. 3, pp. 221–245, 2011.
M. Rogers, Diffusion of Innovations, 4th ed. New York: The Free Press, 1995.
S. Clark and C. S. Saunders, “EDI adoption and implementation: A focus on interorganizational linkages,” Inf. Resour. Manag. J., vol. 5, no. 1, pp. 9–20, 1992.
K. S. Tan, S. C. Chong, B. Lin, and U. C. Eze, “Internet-based ICT adoption among SMEs: Demographic versus benefits, barriers, and adoption intention,” J. Enterp. Inf. Manag., vol. 23, no. 1, pp. 27–55, 2010.
E. E. Grandon and J. M. Pearson, “Perceived Strategic Value and Adoption of Electronic Commerce : An Empirical Study of Small and Medium Sized Businesses,” Sci. York, 2002.
J. Y. L. Thong and C. S. Yap, “Information technology adoption by small business: An empirical study,” in Diffusion and adoption of information technology, Springer, 1996, pp. 160–175.
J. Webster, “EDI in a UK Automobile Manufacturer: Creating Systems, Forming Linkages, Driving Changes,” in The Seventh Electronic Data Interchange, 1994.
S. W. Wijaya, A. Dwiatmoko, K. Surendro, and H. S. Sastramihardja, “A Statistical Analysis of Priority Factors for Local e-Government in a Developing Country: Case Study of Yogyakarta Local Government, Indonesia,” in Handbook of Research on E-Government in Emerging Economies: Adoption, E-Participation, and Legal Frameworks, K. Bwalya and S. Zulu, Eds. Hershey, PA: IGI Global, 2012, pp. 194–211.
A.-M. Chang and P. K. Kannan, “Preparing for wireless and mobile technologies in government,” E-government, pp. 345–393, 2003.
C. Ferran and R. Salim, Electronic Business in Developing Countries: The Digitalization of Bad Practices? Hershey, PA: IGI Global, 2006.
S. S. Alam and M. K. M. Noor, “ICT Adoption in Small and Medium Enterprises : an Empirical Evidence of Service Sectors in Malaysia,” Int. J. Bus. Manag., vol. 4, no. 2, pp. 112–125, 2009.
M.-C. Lee, “Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit,” Electron. Commer. Res. Appl., vol. 8, no. 3, pp. 130–141, 2009.
M. S. Featherman and P. a. Pavlou, “Predicting e-services adoption: a perceived risk facets perspective,” Int. J. Hum. Comput. Stud., vol. 59, no. 4, pp. 451–474, 2003.
J. Jackson, N. Allum, and G. Gaskell, Perceptions of risk in cyberspace. Citeseer, 2005.
S. Mathswenyego, R. Klopper, and S. Lubbe, “ICT Investment Effectiveness in the South African Post Office,” African J. Inf. Syst., vol. 7, no. 3, pp. 27–51, 2013.
M. Carr, “Adoption and Diffusion of Internet Banking,” in Advances in Banking Technology and Management: Impacts of ICT and CRM, R. Vadlamani, Ed. Hershey, PA: IGI Global, 2007.
K. M. Eisenhardt and M. E. Graebner, “Theory building from cases: Opportunities and challenges,” Acad. Manag. J., vol. 50, no. 1, p. 25, 2007.
J. L. Balloun, H. Barrett, and A. Weinstein, “One is Not Enough: The Need for Multiple Respondents in Survey Research of Organizations,” J. Mod. Appl. Stat. Methods, vol. 10, no. 1, p. 26, 2011.
S. M. Young, “Survey research in management accounting: a critical assessment,” Res. methods Account. Issues debates, pp. 55–68, 1996.
P. L. Barreiro and J. P. Albandoz, “Population and sample: Sampling techniques.,” J. Manag. Math. Eur. Sch., 2001.
R. Srinivasan, G. L. Lilien, and A. Rangaswamy, “Technological Opportunism and Radical Technology Adoption: An Application to E-Business,” J. Mark., vol. 66, pp. 47–60, 2002.
E. E. Grandon and J. M. Pearson, “Electronic commerce adoption: An empirical study of small and medium US businesses,” Inf. Manag., vol. 42, no. 1, pp. 197–216, 2004.
M. Y. Yi, J. D. Jackson, J. S. Park, and J. C. Probst, “Understanding information technology acceptance by individual professionals: Toward an integrative view,” Inf. Manag., vol. 43, no. 3, pp. 350–363, 2006.
A. Molla and P. S. Licker, “ECommerce adoption in developing countries: A model and instrument,” Inf. Manag., vol. 42, no. 6, pp. 877–899, 2005.
J. Osborne and E. Waters, “Four assumptions of multiple regression that researchers should always test,” Pract. assessment, Res. Eval., vol. 8, no. 2, pp. 1–9, 2002.
P. A. Linley, J. Maltby, A. M. Wood, G. Osborne, and R. Hurling, “Measuring happiness: The higher order factor structure of subjective and psychological well-being measures,” Pers. Individ. Dif., vol. 47, no. 8, pp. 878–884, 2009.
J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson, and R. L. Tatham, Multivariate data analysis, 6th Ed. Upper Saddle River, NJ: Pearson Prentice Hall, 2006.
H. F. Kaiser, “A second generation little jiffy,” Psychometrika, vol. 35, no. 4, pp. 401–415, 1970.
T. R. Hinkin, J. B. Tracey, and C. A. Enz, “Scale construction: Developing reliable and valid measurement instruments,” J. Hosp. Tour. Res., vol. 21, no. 1, pp. 100–120, 1997.
Q. Ma and L. Liu, “The role of Internet self-efficacy in the acceptance of web-based electronic medical records,” Contemp. Issues End User Comput., vol. 17, no. 1, pp. 38–57, 2005.
D. Laux, N. G. Street, and A. M. Townsend, “Adoption of Biometric Authentication Systems: Implications for Research and Practice in the Deployment of End-user Security Systems,” J. Organ. Comput. Electron. Commer., vol. 21, no. 3, pp. 221–245, 2011.
C. P. Armstrong and V. Sambamurthy., “Information Technology Assimilation in Firms: The Influence of Senior Leadership and IT Infrastructures.,” Inf. Syst. Res., vol. 10, no. 4, pp. 304–327, 1999.
H. H. Teo, K. K. Wei, and I. Benbasat, “Predicting Intention to Adopt Interorganizational Linkages,” An Institutional Perspect. MIS Q., vol. 27, no. 1, pp. 19–49, 2003.