Return to search

User perceptions related to identification through biometrics within electronic business

Concerns over Information Technology security, including theft, fraud and abuse have forced organizations to take a cautious approach to Electronic Commerce. This research study suggests that organizations can keep secure their resources by implementing an effective and accurate identification system, which will enable them to provide a better service to their customers and to prevent individuals from misrepresenting themselves to the organization. Various means of identification are available, but the key focus should be to establish accurate identity. The research study addresses biometric identification methods as a means of improving the security of on-line transactions. The specific focus is an investigation of user perceptions with regard to biometric identification methods. The research study, through a theoretical understanding of the concepts found within the research problem statement, compiles a Technology Adoption Model for understanding why individuals accept or reject Information Technology innovations, which has proved to be one of the most challenging issues in Information Technology research. The exploratory field study section of the research study makes use of interpretive research as a basis to identify various themes related to user perceptions of biometrics. The themes identified are discussed during a focus group session with research participants. The main focus of the exploratory field study section is on user perceptions related to biometric identification methods and to enhance the Technology Adoption Model compiled by gathering user perceptions regarding the Internet, Electronic Business, biometrics and user adoption via a questionnaire to provide a possible solution for the research study problem statement. From the exploratory field study, it was concluded that user perceptions will play a role with regard to identification through biometrics within Electronic Business and that the social factors trust, security, and privacy considerations will also have to be taken into account. / Dissertation (MCom Informatics)--University of Pretoria, 2005. / Informatics / unrestricted

Identiferoai:union.ndltd.org:netd.ac.za/oai:union.ndltd.org:up/oai:repository.up.ac.za:2263/29139
Date09 January 2004
CreatorsGiesing, Ilse
ContributorsDr H Lotriet, ilseg@dex.co.za
Source SetsSouth African National ETD Portal
Detected LanguageEnglish
TypeDissertation
Rights© 2003, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria.

Page generated in 0.0068 seconds