V. Zorkadis and P. Donos
Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements…
Abstract
Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements of authentication and identification systems. However, any human physiological or behavioural traits serving as biometric characteristics are personal data protected by privacy protection legislation. To address related issues, this paper examines these classes of biometrics according to data protection principles, purpose, proportionality and security, provided in international legislation. This analysis leads to the desired properties of biometric systems in the form of functional and non‐functional requirements, in order to support developers minimising the risk of being non‐compliant to privacy protection legislation, and to increase user acceptance.
Details
Keywords
Hilary C. Murphy and Damien Rottet
This paper aims to review the determinants that influence adoption of biometric technologies, with particular emphasis on both devices and hotel processes.
Abstract
Purpose
This paper aims to review the determinants that influence adoption of biometric technologies, with particular emphasis on both devices and hotel processes.
Design/methodology/approach
The overall objective was to identify the critical hotel processes and devices. This was achieved by a quantitative survey of 300 hotel customers which focused on the key dimensions of technology behaviour, holiday characteristics, hotel processes, biometric technologies and the “willingness” to adopt.
Findings
The findings show that 87.3 per cent of hotel customers may be “willing to use” biometric devices and that there is some correlation between the different processes as well as the different biometric technologies.
Practical implications
Conclusions and recommendations are made as to which specific hotel processes might benefit from biometrics and also how hoteliers might anticipate the rollout of biometric technologies.
Originality/value
This paper provides a first, empirical study into customer adoption of biometrics. It reveals opportunities for hotels to profit from emerging biometric technologies.
Details
Keywords
Many information systems involve data about people. In order reliably toassociate data with particular individuals, it is necessary that aneffective and efficient identification…
Abstract
Many information systems involve data about people. In order reliably to associate data with particular individuals, it is necessary that an effective and efficient identification scheme be established and maintained. There is remarkably little in the information technology literature concerning human identification. Seeks to overcome that deficiency by undertaking a survey of human identity and human identification. Discusses techniques including names, codes, knowledge‐based and token‐based identification, and biometrics. Identifies the key challenge to management as being to devise a scheme which is practicable and economic, and of sufficiently high integrity to address the risks the organization confronts in its dealings with people. Proposes that much greater use be made of schemes which are designed to afford people anonymity, or which enable them to use multiple identities or pseudonyms, while at the same time protecting the organization′s own interest. Describes multi‐purpose and inhabitant registration schemes, and notes the recurrence of proposals to implement and extend them. Identifies public policy issues. Of especial concern is the threat to personal privacy that the general‐purpose use of an inhabitant registrant scheme represents. Speculates that, where such schemes are pursued energetically, the reaction may be strong enough to threaten the social fabric.
Details
Keywords
The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers…
Abstract
Purpose
The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers the issue of personal identity management in terms of a framework, which distinguishes between the related processes of authentication, identification and enrolment.
Design/methodology/approach
The conceptual model described in this paper is reflected against an important recent case in which issues of personal identity management are being enacted: the introduction of a UK national identity card. Both this issue and case are particularly examined in the light of the growth of e‐Government in the UK.
Findings
The paper relates issues associated with the technical infrastructure of e‐Government with some of the costs and benefits associated with the social infrastructure of e‐Government. This device offers a useful framing for a whole range of issues surrounding individual‐organisation interaction in the Information Society that rely on elements of personal identity management.
Research limitations/implications
In the paper the issue of personal identity management is under‐represented in the Information Systems and Information Management literature. The conceptual approach adopted in the paper is used to identify areas of further research in terms of issues relevant to the technical infrastructure of e‐Government.
Practical implications
The paper identifies a number of personal identity management issues embedded in the technical infrastructure required for effective e‐Government.
Originality/value
This paper raises the importance of personal identity management to the success of the e‐Government agenda. It also links classic information management issues to the issue of personal identity management and identifies the challenges for e‐Government within this.
Details
Keywords
George Okello Candiya Bongomin, Charles Akol Malinga, Alain Manzi Amani and Rebecca Balinda
The main purpose of this study is to test for the interaction effect of digital literacy in the relationship between financial technologies (FinTechs) of biometrics and mobile…
Abstract
Purpose
The main purpose of this study is to test for the interaction effect of digital literacy in the relationship between financial technologies (FinTechs) of biometrics and mobile money and digital financial inclusion among the unbanked poor women, youth and persons with disabilities (PWDs) in rural Uganda.
Design/methodology/approach
Covariance-based structural equation modeling was used to construct the interaction effect using data collected from the unbanked poor women, youth and PWDs located in the four regions in Uganda as prescribed by Hair et al. (2022).
Findings
The findings from this study are threefold: first; the results revealed a positive interaction effect of digital literacy between FinTechs of biometrics and mobile money and digital financial inclusion. Second; the results also confirmed that biometrics identification positively promotes digital financial inclusion. Lastly; the results showed that mobile money positively promotes digital financial inclusion. A combination of FinTechs of biometrics and mobile money together with digital literacy explain 29% variation in digital financial inclusion among the unbanked poor women, youth and PWDs in rural Uganda.
Research limitations/implications
The data for this study were collected mainly from the unbanked poor women, youth and PWDs. Further studies may look at data from other sections of the vulnerable population in under developed financial markets. Additionally, the data for this study were collected only from Uganda as a developing country. Thus, more data may be obtained from other developing countries to draw conclusive and generalized empirical evidence. Besides, the current study used cross sectional design to collect the data. Therefore, future studies may adopt longitudinal research design to investigate the impact of FinTechs on digital financial inclusion in the presence of digital literacy across different time range.
Practical implications
The governments in developing countries like Uganda should support women, youth, PWDs and other equally vulnerable groups, especially in the rural communities to understand and use FinTechs. This can be achieved through digital literacy that can help them to embrace digital financial services and competently navigate and perform digital transactions over digital platforms like mobile money without making errors. Besides, governments in developing countries like Uganda can use this finding to advocate for the design of appropriate digital infrastructures to reach remote areas and ensure “last mile connectivity for digital financial services' users.” The use of off-line solutions can complement the absence or loss of on-line network connectivity for biometrics and mobile money to close the huge digital divide gap in rural areas. This can scale-up access to and use of financial services by the unbanked rural population.
Originality/value
This paper sheds more light on the importance of digital literacy in the ever complex and dynamic global FinTech ecosystem in the presence of rampant cyber risks. To the best of the authors' knowledge, limited studies currently exist that integrate digital literacy as a moderator in the relationship between FinTechs and digital financial inclusion, especially among vulnerable groups in under-developed digital financial markets in developing countries. This is the novelty of the paper with data obtained from the unbanked poor women, youth and PWDs in rural Uganda.
Details
Keywords
Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper and Matthieu Brinkhuis
This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected…
Abstract
Purpose
This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected 119.810 publications and over 3 million references to perform a bibliometric domain analysis as a quantitative approach to uncover the structures within the privacy research field.
Design/methodology/approach
The bibliometric domain analysis consists of a combined directed network and topic model of published privacy research. The network contains 83,159 publications and 462,633 internal references. A Latent Dirichlet allocation (LDA) topic model from the same dataset offers an additional lens on structure by classifying each publication on 36 topics with the network data. The combined outcomes of these methods are used to investigate the structural position and topical make-up of the privacy research communities.
Findings
The authors identified the research communities as well as categorised their structural positioning. Four communities form the core of privacy research: individual privacy and law, cloud computing, location data and privacy-preserving data publishing. The latter is a macro-community of data mining, anonymity metrics and differential privacy. Surrounding the core are applied communities. Further removed are communities with little influence, most notably the medical communities that make up 14.4% of the network. The topic model shows system design as a potentially latent community. Noteworthy is the absence of a centralised body of knowledge on organisational privacy management.
Originality/value
This is the first in-depth, quantitative mapping study of all privacy research.
Details
Keywords
One day seminar held in London by the IEE and the Association for Biometrics presented recent progress in the development and application of biometrics. Speakers told the audience…
Abstract
One day seminar held in London by the IEE and the Association for Biometrics presented recent progress in the development and application of biometrics. Speakers told the audience how the terrorist attacks in the USA in September 2001 have created new opportunities for biometrics due to new initiatives to introduce biometric‐enabled passports. Papers presented at the seminar covered standards development and biometric implementation guidance. New organisations for promoting the application of biometrics both in the UK and Europe were outlined.
Details
Keywords
This research project focuses on developing techniques and technologies for automatically identifying human faces from images in the situations where face sample collections in…
Abstract
Purpose
This research project focuses on developing techniques and technologies for automatically identifying human faces from images in the situations where face sample collections in the database as well as in the input query images are “as is”, i.e. no standard data collection environment is available. The developed method can also be used in other biometric applications.
Design/methodology/approach
The specific method presented in this paper is called scale independent identification (SII). SII allows direct “comparison” between two images in terms of whether the two objects (e.g. faces) in the two images are the same object (i.e. the same individual). SII is developed by extensively using the matrix computation theory and in particular, the singular value decomposition theory.
Findings
It is found that almost all the existing methods in the literature or technologies in the market require that a normalization in scale be done before any identification processing. However, it is also found that normalization in scale not only adds additional processing complexity, but also may reduce the identification accuracy. In addition, it is difficult to anticipate an “optimal” scale in advance. The developed SII complements the existing methods in all these aspects.
Research limitations/implications
The only limitation which is also the limitation for many other biometric identification methods is that each object (e.g. individual in human face identification) must have a sufficient number of training samples collected before the method works well.
Practical implications
SII is particularly suitable in law enforcement and/or intelligence applications in which it is difficult or impossible to collect data in a standard, “clean” environment.
Originality/value
The SII method is new, and the paper should be interesting to researchers or engineers in this area, and should also be interesting to companies developing any biometrics‐based identification technologies as well as government agencies.
Details
Keywords
Abstract
Details
Keywords
Peter Jones, Peter Williams, David Hillier and Daphne Comfort
The purpose of this paper is to offer a preliminary assessment of the potential role for biometrics within the retail sector of the economy.
Abstract
Purpose
The purpose of this paper is to offer a preliminary assessment of the potential role for biometrics within the retail sector of the economy.
Design/methodology/approach
The paper begins with an outline of the origin and characteristics of biometrics and this is followed by a review of the possible retail applications and an outline of the current barriers to widespread adoption. The paper draws its empirical material from trade sources available on the internet.
Findings
The findings reveal that biometrics has a number of potential applications within retailing including combating identity theft, increasing transaction speed at the point of sale, reducing transaction processing costs for retailers and the development of more individually tailored marketing and customer loyalty systems. However, a number of major barriers need to be overcome if biometrics are to become an integral part of the retail scene. These include acquisition and installation costs, doubts about the accuracy and performance of biometric technologies and public concerns about personal privacy and civil liberties.
Originality/value
The paper offers an accessible review of the potential application of biometrics within retailing, which will interest academics working in retail, business and management and information technology departments in universities and colleges and students studying in these disciplines.