1 |
Factors affecting the adoption of Internet banking in the Kingdom of BahrainJanahi, Yusuf M. A. M. January 2016 (has links)
The emergence of the Internet in business as a marketing tool and as a communication medium is one of the existing challenges for the banking industry. Because of this evolution, the banking industry has adopted Internet banking both for financial transactions and for the provision of information about products and services. Based on the ideas mentioned, this study aimed to examine the factors which may affect the intention to use Internet banking in the Kingdom of Bahrain with the following research objectives to be achieved: first, to identify the factors which affect the intention to use and adopt Internet banking in the Kingdom of Bahrain; second, to develop a model based on the identified factors that affect the intention to use Internet banking in the Kingdom of Bahrain; and third, to test the reliability and validity of the proposed model and find its implications on the intention to use and adopt Internet banking. In this study, five variables were initially chosen, namely, perceived privacy protection, perceived security protection, perceived trust, perceived information quality and perceived risks/benefits that may affect the intention to use Internet banking. Besides the five variables, two more variables were included: cultural dimension and biometric technology to measure a significant relationship with any of the five variables that might affect the intention of bank customers to use Internet banking in Bahrain. As a quantitative method of research, the study focused on assessing the co-variation among naturally occurring variables with the goal of identifying predictive relationships by using correlations or more sophisticated statistical techniques. In analysing the data, the descriptive statistics were used. In addition, construct reliability and discriminant validity tests were conducted and structural equation modelling were used to test the research model and verify the hypotheses. The cultural context has rarely been commented on in previous research, but as a result of taking this factor into account in addition to the more technical issues, a number of practical implications became evident for banking in Bahrain that may have applicability elsewhere in the Arab world. These include both a focus on relationship management as well as the need for additional levels of security through biometric fingerprinting to be implemented by banks wishing to increase the adoption of Internet banking amongst existing customers. These strategies also have potential to attract new market segments.
|
2 |
Airport Security: Examining The Current State Of Acceptance Of Biometrics And The Propensity Of Adopting Biometric Technology FoSumner, Kristine 01 January 2007 (has links)
The terrorist attacks of September 11, 2001 propelled the issue of aviation security to the forefront of the U.S. domestic agenda. Although hundreds of individual airports exist in the U.S., the travel activities at each of these airports combine to holistically comprise an aviation system that represents a significant portion of the U.S. social and economic infrastructure. Disruption at one airport resulting from a criminal act, such as terrorism, could exert detrimental effects upon the aviation system and U.S national security (9/11 Commission, 2004). Each U.S. airport is individually responsible for various aspects of security including the control of physical access to sensitive and secure areas and facilities (9/11 Commission, 2004). Biometric technology has been examined as one method of enhancing airport access control to mitigate the possibility of criminal acts against airports. However, successful implementation of biometric technology depends largely on how individual security directors at each airport perceive, understand, and accept that technology. Backgrounds, attitudes, and personal characteristics influence individual decisions about technology implementation (Rogers, 1995; Tornatzky and Fleischer, 1990). This study examines the problem of airport access control, as well as, the current trends in biometric technology. Utilizing a survey of airport security directors and security managers, this study draws upon innovation diffusion theory and organizational theories to determine what personal, organizational, and technical variables contribute to the propensity of airport security directors and managers to adopt biometric technology for airport access control.
|
3 |
Factors affecting the adoption of internet banking in the Kingdom of BahrainJanahi, Yusuf M.A.M. January 2016 (has links)
The emergence of the Internet in business as a marketing tool and as a communication medium is one of the existing challenges for the banking industry. Because of this evolution, the banking industry has adopted Internet banking both for financial transactions and for the provision of information about products and services. Based on the ideas mentioned, this study aimed to examine the factors which may affect the intention to use Internet banking in the Kingdom of Bahrain with the following research objectives to be achieved: first, to identify the factors which affect the intention to use and adopt Internet banking in the Kingdom of Bahrain; second, to develop a model based on the identified factors that affect the intention to use Internet banking in the Kingdom of Bahrain; and third, to test the reliability and validity of the proposed model and find its implications on the intention to use and adopt Internet banking. In this study, five variables were initially chosen, namely, perceived privacy protection, perceived security protection, perceived trust, perceived information quality and perceived risks/benefits that may affect the intention to use Internet banking. Besides the five variables, two more variables were included: cultural dimension and biometric technology to measure a significant relationship with any of the five variables that might affect the intention of bank customers to use Internet banking in Bahrain. As a quantitative method of research, the study focused on assessing the co-variation among naturally occurring variables with the goal of identifying predictive relationships by using correlations or more sophisticated statistical techniques. In analysing the data, the descriptive statistics were used. In addition, construct reliability and discriminant validity tests were conducted and structural equation modelling were used to test the research model and verify the hypotheses. The cultural context has rarely been commented on in previous research, but as a result of taking this factor into account in addition to the more technical issues, a number of practical implications became evident for banking in Bahrain that may have applicability elsewhere in the Arab world. These include both a focus on relationship management as well as the need for additional levels of security through biometric fingerprinting to be implemented by banks wishing to increase the adoption of Internet banking amongst existing customers. These strategies also have potential to attract new market segments.
|
4 |
Intelligent online risk-based authentication using Bayesian network modelLai, Dao Yu 12 May 2011 (has links)
Risk-based authentication is an increasingly popular component in the security architecture deployed by many organizations in mitigating online identity threat. Risk-based authentication uses contextual and historical information extracted from online communications to build a risk profile for the user that can be used to make accordingly authentication and authorization decisions. Existing risk-based authentication systems rely on basic web communication information such as the source IP address or the velocity of transactions performed by a specific account, or originating from a certain IP address. Such information can easily be spoofed and as such put in question the robustness and reliability of the proposed systems. In this thesis, we propose in this work an online risk-based authentication system which provides more robust user identity information by combining mouse dynamics, keystroke dynamics biometrics, and user site actions in a multimodal framework. We propose a Bayesian network model for analyzing free keystrokes and mouse movements involved in web sessions. Experimental evaluation of our proposed model with 24 participants yields an Equal Error Rate of 6.91%. This is encouraging considering that we are dealing with free text and mouse movements and the fact that many web sessions tend to be short. / Graduate
|
5 |
No Person DetectedRiley, Holly Jane 27 July 2023 (has links)
The collection of Victorian-themed wearables and accessories of "No Person Detected" serves as an innovative solution to the issues surrounding biometric technology and the invasion of privacy. This wearable technology was designed to counteract the involuntary recording of an individual's unique biometric data through the use of body cameras and CCTV, which can be accessed by law enforcement and marketing companies. The technology represents a democratization of design ideas and collaboration that allows individuals to create adversarial fashion and provides a level of biometric protection. This thesis explores the potential of technological innovation and collaboration to result in a more privacy-conscious society, one where individuals can take control of their personal data and protect themselves against the dangers of biometric tracking. The convergence of fashion, technology, and design has the potential to revolutionize how we approach privacy in a digital age, and "No Person Detected" represents an exciting step towards that future. / Master of Fine Arts / As technology becomes a larger component of our daily lives, our digital footprint continues to expand, leaving behind sensitive identifying information. From this data, law enforcement agencies such as the FBI and ICE derive insights and conclusions about our lives. Due to unreliable data, facial recognition technology (FRT) has demonstrated implicit bias, particularly toward racialized bodies. This highlights the need for public education and responsible online behavior and raises questions about the privacy and security of personal data. At the intersection of fashion, history, and technology, "No Person Detected" aims to fight against the involuntary collection of biometric data in an adversarial way. With the proliferation of FRT and the accumulation of personal data from a variety of sources, it is crucial that both businesses and individuals establish transparent policies to protect user data. This thesis highlights both the historical context of racism in policing and the significance of privacy in the digital age.
|
6 |
Biometrics: A New Mean of Surveillance and Migration ControlKajevic, Belhira January 2006 (has links)
We live in an era of advanced technological innovations and it is therefore difficult to acquire a proper overview of the different surveillance techniques deployed for the purpose of enhancing and administrating migration control. The intent of this paper is to disseminate one of the new technologies on the market: the biometric technology that is an identification and verification system based on measurements of biological traits. Different approaches are used to explore and investigate the technological functions, social structures and political justifications for their validity and their role in the implementation of the biometric technology. The paper also provides an overview of the different areas of political and social management that are affected by the implementation of the biometric techniques.The principal aim of this work is to examine how the implementation of the biometric techniques will affect privacy for all people, taking both information privacy and personal integrity into consideration. The second question deals with migration management, as the current implementation mainly involves travel documents. It focuses on the consequences of the so-called war on terror and its call for prevention of terrorism and irregular migration. The dilemma between national security and the right to privacy, public good and private interests, and the realms of state and individual rights are also discussed and analysed.Hence, the framework and the fundamental structure of this thesis are based on three core issues pertinent to the implementation of biometrics in the EU: threats posed on the right to privacy, securitization of migration, and intensification of surveillance and state control. The findings are used to identify the threats posed on right to privacy and the way this right is compromised, and the consequences of practices and policies in the field of migration that are discriminatory and exclusory. Lastly, by employing different theories, this paper examines why state seeks technological control over citizens and why individuals comply with state control and surveillance.
|
Page generated in 0.0561 seconds