Skip to main content

A Study of Biometric Authentication Adoption in Health Services

  • Conference paper
Advances in Information Systems and Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 206))

  • 2125 Accesses

Abstract

Authentication technologies using biometrics already play a major role in the context of security systems. Some techniques are used in several services not only to ensure physical access to facilities but also to provide some thoroughness in access control. This study addresses the perception of users regarding the use of biometric authentication technologies. The results derived from a survey indicate a trend of acceptance of such technologies on the access control to health services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ho, G., Stephens, G., Jamieson, R.: Biometric Authentication Adoption Issues. In: ACIS 2003 Proceedings, pp. 1–12 (2003)

    Google Scholar 

  2. Savastano, M.: Biometrics: Modelling the Body. In: Tenth International Conference on Computer Modeling and Simulation uksim 2008, pp. 14–17 (2008)

    Google Scholar 

  3. James, T., Pirim, T., Boswell, K., Reithel, B.J., Barkhi, R.: Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model. Journal of Organizational and End User Computing 18, 1–24 (2006)

    Article  Google Scholar 

  4. Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems: Theory and results (1986), http://hdl.handle.net/1721.1/15192

  5. Jain, A.K., Bolle, R.M., Pankanti, S.: Introduction to biometrics. In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Biometrics, pp. 1–41. Kluwer Academic Publishers (1999)

    Google Scholar 

  6. Liu, S., Silverman, M.: A practical guide to biometric security technology. IT Professional 3, 27–32 (2001)

    Article  Google Scholar 

  7. Fairhurst, M.: Document identity, authentication and ownership: the future of biometric verification. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR 2003), pp. 1108–1116. Citeseer (2003)

    Google Scholar 

  8. Prabhakar, S., Jain, A.K., Pankanti, S.: Biometric recognition: Security and privacy concerns. IEEE Security & Privacy 1, 33–42 (2003)

    Google Scholar 

  9. Yun, Y.: The “123” of Biometric Technology. Synthesis Journal 2002 3, 83–96 (2002)

    Google Scholar 

  10. Zorkadis, V., Donos, P.O.: On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements. Information Management & Computer Security 12, 125–137 (2004)

    Article  Google Scholar 

  11. Bolle, R.M., Connell, J.H., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to biometrics. Springer, New York (2003)

    Google Scholar 

  12. Magalhães, P.S., Santos, H.D.: Biometria e autenticação. Actas da 4 Conferência da Associação Portuguesa de Sistemas de Informação, p. 17. APSI, Porto (2003)

    Google Scholar 

  13. Vashek, M., Řiha, Z.: Security of biometric authentication systems. In: International Conference on Computer Information Systems and IndustrialManagement Applications (CISIM), pp. 19–28 (2010)

    Google Scholar 

  14. Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security 1, 125–143 (2006)

    Article  Google Scholar 

  15. Watson, A.: Biometrics: easy to steal, hard to regain identity. Nature 449, 535–535 (2007)

    Article  Google Scholar 

  16. Alterman, A.: “A piece of yourself”: Ethical issues in biometric identification. Ethics and Information Technology 5, 139–150 (2003)

    Article  Google Scholar 

  17. Rejman-Greene, M.: Privacy Issues in the Application of Biometrics: a European Perspective. In: Wayman, J., Jain, A.K., Maltoni, D., Maio, D. (eds.) Biometric Systems, pp. 335–359. Springer, London (2005)

    Chapter  Google Scholar 

  18. Delaitre, S.: Risk management approach on identity theft in biometric systems context. In: 1st International Conference on Availability, Reliability and Security, pp. 20–22 (2006)

    Google Scholar 

  19. Dimitriadis, C.K., Polemi, D.: Risk Analysis of Biometric Systems. In: Fernández-Medina, E., Castro, J.C.H., Villalba, L.J.G. (eds.) Proceedings of the 2nd International Workshop on Security in Information Systems, pp. 23–32. INSTICC Press, Porto (2004)

    Google Scholar 

  20. Chan, S.L.: Information technology in business processes. Business Process Management Journal 6, 224–237 (2000)

    Article  Google Scholar 

  21. Lee, Y., Kozar, K., Larsen, K.: The Technology Acceptance Model: Past, Present, and Future. Communications of the Association for Information Systems 12, 752–780 (2003)

    Google Scholar 

  22. Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly 13, 319–340 (1989)

    Article  Google Scholar 

  23. Taylor, S., Todd, P.A.: Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research 6, 144–176 (1995)

    Article  Google Scholar 

  24. Venkatesh, V., Davis, F.D.: A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science 46, 186–204 (2000)

    Article  Google Scholar 

  25. Venkatesh, V., Bala, H.: Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences 39, 273–315 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paulo Rodrigues .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rodrigues, P., Santos, H. (2013). A Study of Biometric Authentication Adoption in Health Services. In: Rocha, Á., Correia, A., Wilson, T., Stroetmann, K. (eds) Advances in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36981-0_108

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36981-0_108

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36980-3

  • Online ISBN: 978-3-642-36981-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics