Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ABSTRACT
This study is part of a larger study focusing on the feasibility of biometric authentication systems in e-
commerce and their user acceptance in Saudi Arabia. Additionally, it will explore whether Saudis practically
and culturally are willing to accept the biometric authentication technology. For this work, three hundred and
four Saudi participants, consisting of men and women between the ages of 18 and 55, were participated. The
survey revealed that the vast majority of the participants who were familiar with the concept of biometrics
perceived the fingerprint biometric would be willing to buy and begin using fingerprint sensors as part of their
daily lives. Saudi consumers are ready to use fingerprint sensors daily and believe the technology would add
additional value to existing devices by offering greater security, convenience, and personalisation.
KEYWORDS
Authentication, Biometrics, e-commerce, Saudi Arabia, user acceptance.
1. INTRODUCTION
Although a biometric authentication system appears to be the best method to secure online businesses, some
obstacles exist to their widespread adoption. Not all biometric systems are popular, due to privacy issues and
other sociological factors. Furthermore, some individuals prefer fingerprints and others face recognition.
However, the major obstacle is that of acceptance and trust, because it matters little how secure or efficient a
system is if nobody is willing to use it. This study will look at making the identification system requirements
as flexible as possible in order to solve the problem of adopting this technology in Saudi society. Security is
now becoming a more important issue for business, and the need for authentication has therefore become
more important than ever. The use of biometric systems for personal authentication is a response to the rising
issue of authentication and security. The most widely used method of biometric authentication is fingerprint
recognition. Generally, a fingerprint is known to be unique for each person, and for that reason is considered
a secure method for authentication (Jain, 2004). This study will give an indication about the feasibility of
adopting the use of biometric identification systems for online services, and its user acceptance in Saudi
Arabia. This paper is organised as follows: by now, the reader is already familiar with the content of section
one which consisted of an introduction followed by the concepts of Biometrics in section two, the study
objectives and the hypothesis in section three, followed by the investigation methods and the survey in
section four. Finding and results in section five. In the final section the conclusions and recommendations
will be proposed as well as suggestions for further research in section six.
2. BIOMETRICS
The term biometrics comes from the Greek words bios, meaning life, and metron, meaning measure.
Biometrics can be defined as measurable physiological or behavioural characteristics, or both, that can be
utilized to verify the identity of individuals, and include fingerprint verification, hand geometry, retinal
scanning, iris scanning, facial recognition, and signature verification (Ashbourn, 2000). Biometric
527
ISBN: 978-972-8924-68-3 © 2008 IADIS
authentication is considered the automatic identification, or identity verification, of an individual using either
a biological feature they possess (physiological characteristic like a fingerprint) or something they do
(behavioural characteristic, such as a signature) (Wayman and Alyea, 2000). For authentication purposes, an
individual must first be enrolled in a biometric system and the system must verify the claimed identity by
comparison with a reference template. (Newton and Woodward, 2005).
528
IADIS International Conference WWW/Internet 2008
They commented that the language used had to be suitable for the population tested, and this resulted in an
effort to make the questions understandable and answerable.
0.00%
Male Female
1
www.surveymethods.com
529
ISBN: 978-972-8924-68-3 © 2008 IADIS
of a fingerprint authentication method. 51.7% of them were female. Additionally, 50.4% of those who would
prefer to a use fingerprint authentication method held a postgraduate diploma. On the other hand, the survey
shed some light upon some other important issues. The most significant of these was the recognition of some
major obstacles and barriers to the adoption of biometric authentication in Saudi Arabia. Overall, the
respondents perceived a lack of appropriate legislation and regulation, the lagging of security and privacy
reservations, and cultural influences to be the three greatest obstacles facing Saudi consumers in
implementing biometric authentication. Table 1 provides further details on these and other types of barriers,
and makes it easier to evaluate their relative strengths. Another important survey question involved the
perceived benefits and advantages of adopting biometric authentication in Saudi Arabia. It presented the
respondents with four significant benefits for rating. The question was phrased: ‘In the case of the
implementation of biometric authentication, how beneficial would it be for you and for Saudi society?’ In
brief, the majority of the respondents had the same strong opinions. about these four benefits, agreeing that
Saudi society would acquire the advantage of all four benefits should biometric authentication be
implemented. Table 2 provides further details on these four benefits.
Table 1: Obstacles to the adoption of biometric authentication in Saudi Arabia.
530
IADIS International Conference WWW/Internet 2008
REFERENCES
Ashbourn, J. (2000) Biometrics: Advanced Identity Verification: The Complete Guide, London, Springer-Verlag, London.
Albrecht, A. (2002b) Understanding The Issues Behind User Acceptance Biometric Technology Today. 9(1): P. 7-8.
Almogbil, A. (2005) Security. Perceptions And Practices: Challenges Facing Adoption Of Online Banking In Saudi
Arabia. The George Washington University.
Christensen, E. H., Coombes-Betz, K. M. & Stein, M. S. (2007) The Certified Quality Process Analyst Handbook
Milwaukee, William A. Tony.
Churchill, A. G. J. (1999) Marketing Research: Methodological Foundation, Hinsdale, Il, The Dryden Press.
Creative Research Systems. 2001 [Cited 2008 Feb 12]; Available From:Http://Www.Surveysystem.Com/Ssformu.Htm.
Dugelay, J. L., J. C. Junqua, Et Al. (2002). Recent Advantages In Biometric Person Authentication. Icassp International
Conference On Acoustics, Speech And Signal Processing. Orlando, Usa.
Furnell, S., P. Dowland, Et Al. (2000). "Authentication And Supervision: A Survey Of User Attitudes Authors."
Computers And Security 19(6): 529-539(11).
Jain, A. K. (2004) Biometric Recognition: How Do I Know Who You Are? Signal Processing And Communications
Applications Conference. Proceedings Of The Ieee 12th: 3-5.
Klosterman, A. J. And G. R. Ganger (2000). Secure Continuous Biometric-Enhanced Authentication Pittsburgh, Pa
Carnegie Mellon University: 16.
Laurie, A., I. Annie, Et Al. (2007). Towards Understanding User Perceptions Of Authentication Technologies. . Acm
Workshop On Privacy In Electronic Society, Alexandria, Virginia, Usa.
Morris, M. G. And A. Dillon (1997). "How User Perceptions Influence Software Use, Decision Support Systems." Ieee
Software July-August: 58-65.
Likert, R. (1932) A Technique For The Measurement Of Attitudes. Archives Of Psychology, 140, 1-55.
Newton, E. M. & Woodward, J. D. (2005) Biometrics: A Technical Primer. Digital Government Civic Scenario
Workshop.
Prabhakar, S., S. Pankanti, Et Al. (2003). "Biometrics Recognition: Security And Privacy Concerns." Ieee Security &
Privacy 1(2):33-42.
Shankar, V., G. L. Urban, Et Al. (2002). "Online Trust: A Stakeholder Perspective, Concepts, Implications, And Future
Directions." Journal Of Strategic Information Systems 11: 325-344.
The Central Depatment Of Statistic & Information (Csi). 2008 [Cited 2008 Feb 12];Available
From:Http://Www.Citc.Gov.Sa/Nr/Rdonlyres/722d574c-F670-48d1-A9fd-4ff6c53aaf91/0/Atlascensus1425h.Pdf.
The Central Intelligence Agenct (Cia). 2008 [Cited 2008 Feb 12]; Available From:
Https://Www.Cia.Gov/Library/Publications/The-World-Factbook/Print/Sa.Html.
Wayman, J. L. & Alyea, L. (2000) Picking The Best Biometric For Your Applications. National Biometric Test Center
Collected Works, 1, 269-275.
531