A Study of Biometric Authentication Adoption in Health Services

  • Paulo Rodrigues
  • Henrique Santos
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 206)


Authentication technologies using biometrics already play a major role in the context of security systems. Some techniques are used in several services not only to ensure physical access to facilities but also to provide some thoroughness in access control. This study addresses the perception of users regarding the use of biometric authentication technologies. The results derived from a survey indicate a trend of acceptance of such technologies on the access control to health services.


Biometric technology adoption identification authentication 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ho, G., Stephens, G., Jamieson, R.: Biometric Authentication Adoption Issues. In: ACIS 2003 Proceedings, pp. 1–12 (2003)Google Scholar
  2. 2.
    Savastano, M.: Biometrics: Modelling the Body. In: Tenth International Conference on Computer Modeling and Simulation uksim 2008, pp. 14–17 (2008)Google Scholar
  3. 3.
    James, T., Pirim, T., Boswell, K., Reithel, B.J., Barkhi, R.: Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model. Journal of Organizational and End User Computing 18, 1–24 (2006)CrossRefGoogle Scholar
  4. 4.
    Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems: Theory and results (1986),
  5. 5.
    Jain, A.K., Bolle, R.M., Pankanti, S.: Introduction to biometrics. In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Biometrics, pp. 1–41. Kluwer Academic Publishers (1999)Google Scholar
  6. 6.
    Liu, S., Silverman, M.: A practical guide to biometric security technology. IT Professional 3, 27–32 (2001)CrossRefGoogle Scholar
  7. 7.
    Fairhurst, M.: Document identity, authentication and ownership: the future of biometric verification. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR 2003), pp. 1108–1116. Citeseer (2003)Google Scholar
  8. 8.
    Prabhakar, S., Jain, A.K., Pankanti, S.: Biometric recognition: Security and privacy concerns. IEEE Security & Privacy 1, 33–42 (2003)Google Scholar
  9. 9.
    Yun, Y.: The “123” of Biometric Technology. Synthesis Journal 2002 3, 83–96 (2002)Google Scholar
  10. 10.
    Zorkadis, V., Donos, P.O.: On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements. Information Management & Computer Security 12, 125–137 (2004)CrossRefGoogle Scholar
  11. 11.
    Bolle, R.M., Connell, J.H., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to biometrics. Springer, New York (2003)Google Scholar
  12. 12.
    Magalhães, P.S., Santos, H.D.: Biometria e autenticação. Actas da 4 Conferência da Associação Portuguesa de Sistemas de Informação, p. 17. APSI, Porto (2003)Google Scholar
  13. 13.
    Vashek, M., Řiha, Z.: Security of biometric authentication systems. In: International Conference on Computer Information Systems and IndustrialManagement Applications (CISIM), pp. 19–28 (2010)Google Scholar
  14. 14.
    Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security 1, 125–143 (2006)CrossRefGoogle Scholar
  15. 15.
    Watson, A.: Biometrics: easy to steal, hard to regain identity. Nature 449, 535–535 (2007)CrossRefGoogle Scholar
  16. 16.
    Alterman, A.: “A piece of yourself”: Ethical issues in biometric identification. Ethics and Information Technology 5, 139–150 (2003)CrossRefGoogle Scholar
  17. 17.
    Rejman-Greene, M.: Privacy Issues in the Application of Biometrics: a European Perspective. In: Wayman, J., Jain, A.K., Maltoni, D., Maio, D. (eds.) Biometric Systems, pp. 335–359. Springer, London (2005)CrossRefGoogle Scholar
  18. 18.
    Delaitre, S.: Risk management approach on identity theft in biometric systems context. In: 1st International Conference on Availability, Reliability and Security, pp. 20–22 (2006)Google Scholar
  19. 19.
    Dimitriadis, C.K., Polemi, D.: Risk Analysis of Biometric Systems. In: Fernández-Medina, E., Castro, J.C.H., Villalba, L.J.G. (eds.) Proceedings of the 2nd International Workshop on Security in Information Systems, pp. 23–32. INSTICC Press, Porto (2004)Google Scholar
  20. 20.
    Chan, S.L.: Information technology in business processes. Business Process Management Journal 6, 224–237 (2000)CrossRefGoogle Scholar
  21. 21.
    Lee, Y., Kozar, K., Larsen, K.: The Technology Acceptance Model: Past, Present, and Future. Communications of the Association for Information Systems 12, 752–780 (2003)Google Scholar
  22. 22.
    Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly 13, 319–340 (1989)CrossRefGoogle Scholar
  23. 23.
    Taylor, S., Todd, P.A.: Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research 6, 144–176 (1995)CrossRefGoogle Scholar
  24. 24.
    Venkatesh, V., Davis, F.D.: A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science 46, 186–204 (2000)CrossRefGoogle Scholar
  25. 25.
    Venkatesh, V., Bala, H.: Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences 39, 273–315 (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Centro AlgoritmiUniversidade do MinhoBragaPortugal

Personalised recommendations