Culture & biometrics: regional differences in the perception of biometric authentication technologies

Abstract

Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of research that has investigated attitudes towards biometric technology in other cultures. To address this issue, data from India, South Africa and the United Kingdom were collected and compared. Cross-cultural attitudinal differences were seen, with Indian respondents viewing biometrics most positively while respondents from the United Kingdom were the least likely to have a positive opinion about biometrics. Multiple barriers to the acceptance of biometric technology were identified with data security and health and safety fears having the greatest overall impact on respondents’ attitudes towards biometrics. The results of this investigation are discussed with reference to Hofstede’s cultural dimensions and theories of technology acceptance. It is argued that contextual issues specific to each country provide a better explanation of the results than existing theories based on Hofstede’s model. We conclude that cultural differences have an impact on the way biometric systems will be used and argue that these factors should be taken into account during the design and implementation of biometric systems.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

References

  1. Acuity (2007) The future of biometrics. Acuity Market Intelligence

  2. Al-Gahtani S (2002) Extending the technology acceptance model beyond its country of origin: a cultural test in Western Europe. In: Khosrowpour M (ed) Advanced topics in information resources management. Idea Group Inc

  3. Alterman A (2003) “A piece of yourself”: ethical issues in biometric identification. Ethics Inf Technol 5:139–150

    Article  Google Scholar 

  4. Ashbourn J (2000) Biometrics: advanced identity management. Springer

  5. Aziz M, Riley C, Johnson GI (2008) Usability challenges in emerging markets. Paper presented at the international conference on enterprise and information systems, Barcelona

  6. BBC (2007) Hackers target TK Maxx customers. http://news.bbc.co.uk/1/hi/business/6508983.stm. Accessed 12 Sep 2008

  7. Benyon D, Turner P, Turner S (2005) Designing interactive systems. Pearson Education

  8. BioSec (2004) Report on results of first phase usability testing and guidelines for developers. BioSec Consortium

  9. Chandra A, Calderon T (2005) Challenges and constraints to the diffusion of biometrics in information systems. Commun ACM 34(12):101–106

    Article  Google Scholar 

  10. CNN Money (2007) T.J. Maxx owner: 46M card numbers stolen. http://money.cnn.com/2007/03/29/news/companies/tjx/index.htm?cnn=yes. Accessed 12 Sept 2008

  11. Coventry L, DeAngeli A, Johnson G (2003) Honest it’s me! Self service verification. Paper presented at the ACM CHI conference 2003, Workshop on Human-Computer Interaction and Security Systems

  12. Coventry L, DeAngeli A, Johnson G (2003) Biometric verification at a self service interface. Paper presented at the British Ergonomics Society Conference, Edinburgh

  13. Davis F (1989) Perceived usefulness, perceived ease of use, and end user acceptance of information technology. MIS Q 13(3):318–339

    Article  Google Scholar 

  14. Deane F, Barrelle K, Henderson R, Mahar D (1995) Perceived acceptability of biometric security systems. Comput Secur 14:225–231

    Article  Google Scholar 

  15. DeAngeli A, Kyriakoullis L (2006) Globalisation vs. localisation in e-commerce: cultural-aware interaction design. Paper presented at the Advanced Visual Interfaces Conference, Venezia, Italy

  16. Erumban AA, Jong SB (2006) Cross-country differences in ICT adoption: a consequence of culture? J World Bus 41:302–314

    Article  Google Scholar 

  17. Everdingen Y Mv, Waarts E (2004) The effect of national culture on the adoption of innovations. Mark Lett 14(3):217–232

    Article  Google Scholar 

  18. Frick A, Bächtiger M, Reips U-D (1999) Financial incentives, personal information, and dropout in online studies. In: Reips U-D, Bosnjak M (eds) Dimensions of internet science. Pabst Science, pp 209–219

  19. Han S (2006) Effects of alphanumerical display formatting on search time among Chinese and American users. Paper presented at the SIGCHI conference on human factors in computing systems, Montreal, Canada

  20. Hofstede G (1984) Culture’s consequences: comparing values, behaviours, institutions, and organizations across nations, 1st edn. Sage Publications

  21. Hofstede G (2001) Culture’s consequences: comparing values, behaviours, institutions, and organizations across nations, 2nd edn. Sage Publications

  22. IBG (2007) biometrics market and industry report 2007-2012. International Biometrics Group

  23. Jain A, Hong L, Pankanti S (2000) Biometric identification. Commun ACM 43(2):91–98

    Article  Google Scholar 

  24. Jhangiani I, Smith-Jackson T (2006) Comparison of mobile phone user interface design preferences: perspectives from nationality and disability culture. Paper presented at the mobile technology, applications and systems conference (Mobility 2007), Singapore

  25. Joinson AN, Paine C, Buchanan T, Reips U-D (2006) Watching me, watching you: privacy attitudes and reactions to identity card implementation scenarios in the United Kingdom. J Inf Sci 32(4):334–343

    Google Scholar 

  26. Jones M, Alony I (2007) The cultural impact of information systems—through the eyes of Hofstede—a critical journey. Issues Inf Sci Inf Technol 9:407–419

    Google Scholar 

  27. Kamppuri M, Bednarik R, Tukiainen M (2006) The expanding focus of HCI: case culture. Paper presented at the NordiCHI, Oslo

  28. Langenderfer J, Linnhoff S (2005) The emergence of biometrics and its effect on consumers. J Consum Aff 39(2):314

    Article  Google Scholar 

  29. McSweeney B (2002) Hofstede’s model of national cultural differences and their consequences: a triumph of faith—a failure of analysis. Hum Relat 55(2):89–118

    Google Scholar 

  30. Michaels L (2008) Biometric security for mobile banking. World Resources Institute

  31. NASSCOM (2008) Indian IT/ITES industry: impacting economy and society 2007-08. National Association of Software and Service Companies

  32. Renaud K (2005) Evaluating authentication mechanisms. In: Cranor LF, Garfinkel S (eds) Security and usability. O’Reilly

  33. Roberts P-J, Roberts C, Sibbald B, Torgerson DJ (2000) The effect of a direct payment or a lottery on questionnaire response rates: a randomised controlled trial. J Epidemiol Community Health 54:71–72

    Article  Google Scholar 

  34. Royal Society (2006) A degree of concern? UK first degrees in science, technology and mathematics. Royal Society

  35. Ruttenburg B, Jones A (2006) Biometrics: industry overview for the investment community. Morgan Keegan

  36. Sasse A (2004) Usability and trust in information systems, University College London

  37. Shukla R (2001) Peoples’ perception towards science and technology. National Council of Applied Economic Research (NCAER)

  38. Simon SJ (2001) The impact of culture and gender on web sites: an empirical study. DATA BASE Adv Inf Syst 32(1):18–38

    Google Scholar 

  39. Sondergaard M (1994) Hofstede’s consequences: a study of reviews, citations and replications. Organ Stud 15(3):447–456

    Article  Google Scholar 

  40. Stewart OT, Chakraborty J (2008) Did Hofstede get it right? Enculturating automatic speech recognition systems. Paper presented at the enculturating interfaces workshop on IUI, Canary Islands

  41. Straub D, Keil M, Brenner W (1997) Testing the technology acceptance model across cultures: a three country study. Inf Manag 33:1–11

    Article  Google Scholar 

  42. Sun H (2002) Exploring cultural usability. Paper presented at the professional communication conference, New York

  43. Sundqvist S, Frank L, Puumalainen K (2005) The effects of country characteristics, cultural similarity and adoption timing on the diffusion of wireless communications. J Bus Res 58:107–110

    Article  Google Scholar 

  44. Toledano DT, Pozo RF, Trapote AH, Gomez LH (2006) Usability evaluation of multi-modal biometric verification systems. Interact Comput 18:1101–1122

    Article  Google Scholar 

  45. Tractinsky N (1997) Aesthetics and apparent usability: empirically assessing cultural and methodological issues. Paper presented at the AMC CHI conference, 1997

  46. UKPS (2005) UK passport service biometrics enrolment trial. Atos Origin

  47. United Nations (2002) The Eighth United Nations survey on crime trends and the operations of criminal justice systems (2001–2002). United Nations

  48. United Nations (2006) Human development report 2006. Beyond scarcity: power, poverty and the global water crisis. United Nations Development Programme

  49. Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425–478

    Google Scholar 

  50. Yeo A (2001) Global-software development lifecycle: an exploratory study. Paper presented at the CHI, Seattle

Download references

Acknowledgments

We would like to thank Grant Cheyne and Kevin McDonald at Edinburgh Napier University for their invaluable help in the administration and data collection of this project. We would also like to thank NCR Financial Solutions Ltd. for their support of this research. Finally, we are indebted to the Scottish Executive and Technology Strategy Board UK for their sponsorship of this project through the Knowledge Transfer Partnership scheme.

Author information

Affiliations

Authors

Corresponding author

Correspondence to Chris Riley.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Riley, C., Buckner, K., Johnson, G. et al. Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & Soc 24, 295–306 (2009). https://doi.org/10.1007/s00146-009-0218-1

Download citation

Keywords

  • Power Distance
  • Uncertainty Avoidance
  • Biometric System
  • Biometric Authentication
  • Authentication Mechanism