Abstract
Authentication technologies using biometrics already play a major role in the context of security systems. Some techniques are used in several services not only to ensure physical access to facilities but also to provide some thoroughness in access control. This study addresses the perception of users regarding the use of biometric authentication technologies. The results derived from a survey indicate a trend of acceptance of such technologies on the access control to health services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ho, G., Stephens, G., Jamieson, R.: Biometric Authentication Adoption Issues. In: ACIS 2003 Proceedings, pp. 1–12 (2003)
Savastano, M.: Biometrics: Modelling the Body. In: Tenth International Conference on Computer Modeling and Simulation uksim 2008, pp. 14–17 (2008)
James, T., Pirim, T., Boswell, K., Reithel, B.J., Barkhi, R.: Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model. Journal of Organizational and End User Computing 18, 1–24 (2006)
Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems: Theory and results (1986), http://hdl.handle.net/1721.1/15192
Jain, A.K., Bolle, R.M., Pankanti, S.: Introduction to biometrics. In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Biometrics, pp. 1–41. Kluwer Academic Publishers (1999)
Liu, S., Silverman, M.: A practical guide to biometric security technology. IT Professional 3, 27–32 (2001)
Fairhurst, M.: Document identity, authentication and ownership: the future of biometric verification. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR 2003), pp. 1108–1116. Citeseer (2003)
Prabhakar, S., Jain, A.K., Pankanti, S.: Biometric recognition: Security and privacy concerns. IEEE Security & Privacy 1, 33–42 (2003)
Yun, Y.: The “123” of Biometric Technology. Synthesis Journal 2002 3, 83–96 (2002)
Zorkadis, V., Donos, P.O.: On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements. Information Management & Computer Security 12, 125–137 (2004)
Bolle, R.M., Connell, J.H., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to biometrics. Springer, New York (2003)
Magalhães, P.S., Santos, H.D.: Biometria e autenticação. Actas da 4 Conferência da Associação Portuguesa de Sistemas de Informação, p. 17. APSI, Porto (2003)
Vashek, M., Řiha, Z.: Security of biometric authentication systems. In: International Conference on Computer Information Systems and IndustrialManagement Applications (CISIM), pp. 19–28 (2010)
Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security 1, 125–143 (2006)
Watson, A.: Biometrics: easy to steal, hard to regain identity. Nature 449, 535–535 (2007)
Alterman, A.: “A piece of yourself”: Ethical issues in biometric identification. Ethics and Information Technology 5, 139–150 (2003)
Rejman-Greene, M.: Privacy Issues in the Application of Biometrics: a European Perspective. In: Wayman, J., Jain, A.K., Maltoni, D., Maio, D. (eds.) Biometric Systems, pp. 335–359. Springer, London (2005)
Delaitre, S.: Risk management approach on identity theft in biometric systems context. In: 1st International Conference on Availability, Reliability and Security, pp. 20–22 (2006)
Dimitriadis, C.K., Polemi, D.: Risk Analysis of Biometric Systems. In: Fernández-Medina, E., Castro, J.C.H., Villalba, L.J.G. (eds.) Proceedings of the 2nd International Workshop on Security in Information Systems, pp. 23–32. INSTICC Press, Porto (2004)
Chan, S.L.: Information technology in business processes. Business Process Management Journal 6, 224–237 (2000)
Lee, Y., Kozar, K., Larsen, K.: The Technology Acceptance Model: Past, Present, and Future. Communications of the Association for Information Systems 12, 752–780 (2003)
Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly 13, 319–340 (1989)
Taylor, S., Todd, P.A.: Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research 6, 144–176 (1995)
Venkatesh, V., Davis, F.D.: A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science 46, 186–204 (2000)
Venkatesh, V., Bala, H.: Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences 39, 273–315 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rodrigues, P., Santos, H. (2013). A Study of Biometric Authentication Adoption in Health Services. In: Rocha, Á., Correia, A., Wilson, T., Stroetmann, K. (eds) Advances in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36981-0_108
Download citation
DOI: https://doi.org/10.1007/978-3-642-36981-0_108
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36980-3
Online ISBN: 978-3-642-36981-0
eBook Packages: EngineeringEngineering (R0)