5,031 research outputs found
Factors Influencing Usage Intentions Towards a Self-service Kiosk with Biometric Authentication.
Self-service technologies have developed as helpful tools in our everyday lives while constantly being adapted to meet new challenges and requirements in today’s world. This study explores the factors influencing usage intentions towards a self-service kiosk with biometric authentication in a retail context. A quantitative study with 28 participants was conducted in a laboratory environment. Participants were asked to purchase a SIM card at a self-service kiosk. The findings revealed that convenience and relative advantage had a strong impact on usage intention. In contrast, functionality and security concerns towards biometric authentication showed no significant effects. In addition, the results indicate that usage intention affected positive word of mouth. Further analysis revealed that usage intention mediated the relationship between the significant influence factors (i.e., convenience, relative advantage) and word of mouth
Responding to Cross Border Child Trafficking in South Asia: An Analysis of the Feasibility of a Technologically Enabled Missing Child Alert System
This report examines the feasibility of a technologically enabled system to help respond to the phenomenon of cross-border child trafficking in South Asia, and makes recommendations on how to proceed with a pilot project in the selected areas of Bangladesh, Nepal and India. The study was commissioned by the Missing Child Alert (MCA) programme which is an initiative led by Plan. MCA is an initiative to address cross-border child trafficking in South Asia, led by Plan. The aim of the programme is to link existing institutions, mechanisms and resources in order to tackle the phenomenon from a regional perspective. To achieve this, Plan propose to implement a technologically equipped, institutionalised system of alert that can assist in the rescue, rehabilitation, repatriation and reintegration of children who are at risk of, or are victims of, cross-border trafficking
Saudi Citizens’ Perceptions on Mobile Government (mGov) Adoption Factors
The Saudi government has recently paid serious attention towards utilising mobile technology in order to deliver government services electronically to its citizens. This study attempts to explore citizens’ (potential users) perceptions on a number of factors that may be important for encouraging the widespread adoption of mobile government (mGov) services in the context of Saudi Arabia. The factors descriptively explored in this research include: perceived risk, innovativeness; performance expectancy, effort expectancy, social influence, facilitating conditions, perceived value, hedonic motivation and behavioural intension. The survey data utilised in this research was collected through a self-administered questionnaire to 600 participants (with a response rate of 66%) within a convenience sample. The results obtained through a descriptive analysis demonstrated that the aforementioned factors are perceived as important by Saudi citizens and they have strong behavioural intention to adopt mGov services
Adopting An Extended UTAUT2 To Predict Consumer Adoption Of M-Technologies In Saudi Arabia
Mobile Data Services (MDS) such as the Mobile Internet and Mobile Government influence various life aspects in the Kingdom of Saudi Arabia (KSA); yet, few empirical studies have been considered in order to expand these applications in the KSA context. This study targets and then analyses the existing knowledge in M-Internet and M-Government fields, then the study will provide future suggestions for adopting factors that will radically increase the use of the aforementioned services. Through detecting the most relevant 57 empirical studies out of 287 relevant researches, various relations are impeded in different IT models and they have been examined in order to investigate theoretical gaps that may require further research. The author’s research shows that adopting an extended model of UTAUT2 with two new variables, i.e. Risk and Trust will arouse and substantially spread M-Internet and M-Government. Moreover, this paper will assert on the importance of the interrelationship among the main variables of UTAUT2, i.e. the influence of Effort Expectancy (EE) over Performance Expectancy (PE)
Recommended from our members
Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia.
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords.
This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems.
As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study.
From an economist¿s point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology.
For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the
iv
research framework, the model has proven its efficiency as a good predictor for the biometric authentication system.
Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users¿ acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant.
This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia.
Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products
E-Learning Security Challenges, Implementation and Improvement in Developing Countries: A Review
The application of e-learning technology in teaching and learning environment in developing countries has created a significant impact especially to students and staff. Despite the fact that it attended a high level of acceptability, there are various security threats and implementation challenges militating against effective utilization of the e-learning platform. This paper, reviewed the impact associated with security vulnerabilities and implementation issues that impede successful e-learning implementation. Specifically, the review examined the effect of security challenges in e-learning and viability of e-learning implementation. This review found that there is need to develop a viable and holistic approach model that combines both biometric fingerprint and cryptography authentication techniques for the e-learning platform. It is recommended that there is need for adequate and uninterruptable bandwidth and power supply for e-learning sustainability. Keywords: security challenges, implementation, e-learning, ICT and trustworthiness
Immigration Control in an Era of Globalization: Deflecting Foreigners, Weakening Citizens, Strengthening the State
In stark contrast to the field of legislation on the rights of third country nationals or to the requirements and conditions for access to the territory of states, the field of the enforcement of immigration control has been increasingly subject to legal harmonization: either by the adoption of global law on immigration control or by the convergence of domestic law and policy in the field. This convergence is particularly marked when one compares legal responses to immigration control in the United States and the European Union, where globalization has been used to justify the extension of state power-by proclaiming state action necessary in order to address perceived global security threats-and the use of key features of globalization that may facilitate free movement such as the use of technology-in order to enhance immigration control. Globalization has led to the strengthening, rather than the weakening, of the state. This strengthening of the state has significant consequences not only for immigration but also for citizenship as expressed by both relations between individuals and between citizens and the state. By examining the global and transatlantic policy and legislative consensus on immigration control, this Article will cast light on the challenges the extension of state power that globalized immigration control entails for fundamental rights and the rule of law.
Globalization and Migration Symposium, Indiana University Maurer School of Law, Bloomington, Indiana, April 7-8, 201
The Factors Affected m-Services Adoption in Airports
This research focus on the factors which affected m-Services utilization in airport from airport’s functionaries point of view. Also, the background of this research is related to some former researches which defined some models that may increase the exertion of electronic mobile based service application (m-Services) such as: TAM, UTAUT, and UTAUT2. However, the former literature reviews only elucidate the factors which affect the increasing of m-Services or mobile technologies/ self service technology exertion from customer point of view. While, there are less of them apprising the factors affected m-Services adoption from airport’s functionaries point of view. The purpose of this study is fulfilling the lack in the literature review by apprising the study towards airport’s functionaries point of view. To reach the purpose of the study, this study applies literature review method. The literature review’s source of this study is originated from some international journals which discuss the factors of airport’s functionaries side. The result of this study are the Explanation of the factors affected m-Service adoption or mobile technologies/ self-services technology from airport’s functionaries point of view and the development of conceptual model related to the factors affected m-Services adoption from airport’s function perspective
- …