Issues and opinion on structural equation modeling
MIS Quarterly
Who Knows: Safeguarding Your Privacy in a Networked World
Who Knows: Safeguarding Your Privacy in a Networked World
Generating Scenario Trees for Multistage Decision Problems
Management Science
Biometrics and Network Security
Biometrics and Network Security
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 2 - Volume 02
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
Information and Management
Development of a Measure for the Organizational Learning Construct
Journal of Management Information Systems
Privacy preserving multi-factor authentication with biometrics
Journal of Computer Security - The Second ACM Workshop on Digital Identity Management - DIM 2006
Keeping our network safe: a model of online protection behaviour
Behaviour & Information Technology
Biometric keypads: Improving accuracy through optimal PIN selection
Decision Support Systems
Trust and TAM in online shopping: an integrated model
MIS Quarterly
Hi-index | 0.00 |
Security researchers and managers would like to know the best ways of introducing new innovations and motivating their use. This study applies Protection Motivation Theory to model the coping and threat appraisals that motivate Millennials, who are early technology adopters, to adopt or resist biometric security for system access. One hundred fifty-nine Millennials were given a hypothetical scenario in which system access would be enhanced by biometric security to strengthen user authentication. The authors model the results with PLS and find that Protection Motivation Theory provides a good explanation of the user's perceptions of biometric security. The model suggests that the users' protection motivation is influenced directly by the Perceived System Response Efficacy of the biometric system and indirectly by Perceived Effort Expectancy, Perceived Computer Self-Efficacy, Perceived Privacy Invasion and Perceived System Vulnerability. Implications and limitations of the model are discussed.