The problem addressed was the losses incurred by organizations and individuals that resulted from computer and/or network security incidents originating from within or outside an organization. Although research has shown biometrics to be a reliable mechanism in the protection of data through authorization access, critics in opposition of biometric use profess that increased personal and financial security increases the loss of individual privacy. The acceptance and adoption of biometric based security devices has created a dichotomy between those individuals that demand increased security measures with those that fear the collection of personal data could cause them personal harm. This study extends the technology acceptance model (TAM) to include the demographic variables age, gender, and geographic residence to investigate if individual differences determine if a relationship exists between those characteristics and their perceived need for personal security and individual privacy. Previous research has shown that an individual with a strong need for security and privacy is more willing to adopt biometric technology in the protection of their personal data or self. The knowledge gained from this study addresses the challenges for a successful deployment of biometrics in the prevention of unauthorized access and the future marketing of security devices. The results from the study indicated that there is a relationship between an individual's age and their perceived need of security and perceived need for privacy. The addition of different demographic variables is recommended for future research. The addition of the demographic attributes as extended variables to TAM provides acumen in the study of end-user adoption of biometric technology and its diffusion into the marketplace.
|Commitee:||Butler, Clifford, Clayton, Phyllis|
|Department:||Business and Technology|
|School Location:||United States -- Minnesota|
|Source:||DAI-B 76/01(E), Dissertation Abstracts International|
|Subjects:||Marketing, Information Technology|
|Keywords:||Biometric security device, Biometric technology, Privacy, Technology acceptance, Technology acceptance model|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be