Factors Influencing Smartphone Owners' Acceptance of Biometric Authentication Methods


La Ode Abdul Wahid(1); Ahmad R Pratama(2*);

(1) Program Studi Informatika – Program Magister, Universitas Islam Indonesia
(2) Jurusan Informatika, Universitas Islam Indonesia
(*) Corresponding Author

  

Abstract


Smartphones are the world's most widely used personal computing devices. PINs and passcodes have long been the most popular methods of authentication in smartphones, and even in the pre-smartphone era. Due to the inconvenient nature of PINs and passcodes, a new biometric authentication method for smartphones was developed and has been gaining traction in terms of adoption, beginning with flagship devices, and progressing to some mid-range devices. The purpose of this article is to investigate the factors that influence smartphone owners' acceptance of biometric authentication methods by developing a new model based on the Technology Acceptance Model (TAM) and validating it against survey data collected from 233 Indonesian smartphone owners via an online survey and analyzed using Structural Equation Modeling (SEM). The findings indicate that the majority of Indonesian smartphone owners have a favorable attitude toward biometric authentication, which is the primary reason for their willingness to adopt it. Additionally, it is discovered that the perceived usefulness of a biometric authentication method on a smartphone outweighs its perceived ease of use, and that the internal user motivation of perceived enjoyment has a greater impact on biometric authentication adoption on a smartphone than both the external user motivation of social influence and the intrinsic value of perceived security of a biometric authentication method.

Keywords


authentication method; biometrics; smartphone; technology acceptance; structural equation modeling

  
     

Article Metrics

Abstract view: 68 times
     

Digital Object Identifier

  

Cite

References


M. R. Ramadhani and A. R. Pratama, “Analisis Kesadaran Cybersecurity Pada Pengguna Media Sosial Di Indonesia,” journal.uii.ac.id, vol. 1, no. 2, pp. 1–8, 2020.

A. Hadid, J. Y. Heikkild, and M. Pietikdinen, “MOBILE PHONES A. Hadid, J.,” Environment, pp. 101–108, 2007.

Y. Yang, B. Guo, Z. Wang, M. Li, Z. Yu, and X. Zhou, “BehaveSense: Continuous authentication for security-sensitive mobile apps using behavioral biometrics,” Ad Hoc Networks, vol. 84, pp. 9–18, 2019.

A. Rattani and R. Derakhshani, “A Survey Of mobile face biometrics,” Comput. Electr. Eng., vol. 72, no. 2018, pp. 39–52, 2018.

M. Conti, I. Zachia-Zlatea, and B. Crispo, “Mind how you answer me!: (Transparently authenticating the user of a smartphone when answering or placing a call),” Proc. 6th Int. Symp. Information, Comput. Commun. Secur. ASIACCS 2011, pp. 249–260, 2011.

H. Bojinov, Y. Michalevsky, G. Nakibly, and D. Boneh, “Mobile Device Identification via Sensor Fingerprinting,” Aug. 2014.

A. K. Jain, P. Flynn, and A. A. Ross, Handbook of Biometrics Handbook of Biometrics. 2007.

F. D. Davis, R. P. Bagozzi, and P. R. Warshaw, “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models,” Manage. Sci., vol. 35, no. 8, pp. 982–1003, 1989.

RStudio Team(2015), “RStudio: Integrated Development for R,” RStudio, Inc., Boston, MA, p. http://www.rstudio.com/., 2015.

Y. Rosseel, “lavaan : An R Package for Structural Equation Modeling,” J. Stat. Softw., vol. 48, no. 2, pp. 1–36, 2012.

M. Abad, I. Díaz, and M. Vigo, “Acceptance of Mobile Technology in Hedonic Scenarios,” in Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, BCS-HCI 2010, 2010, pp. 250–258.

A. R. Pratama, “Fun first, useful later: Mobile learning acceptance among secondary school students in Indonesia,” Educ. Inf. Technol., vol. 26, no. 2, pp. 1737–1753, Mar. 2021.

S.-C. Chang, C.-C. Sun, L.-Y. Pan, and M.-Y. Wang, “An Extended TAM to Explore Behavioural Intention of Consumers to Use M-Commerce,” J. Inf. Knowl. Manag., vol. 14, no. 02, p. 1550014, Jun. 2015.

Y. Sarwono, “Pengertian Dasar Structural Equation Modeling (SEM),” J. Ilm. Manaj. Bisnis Ukrida, vol. 10, no. 3, p. 98528, 2010.

P. G. Schierz, O. Schilke, and B. W. Wirtz, “Understanding consumer acceptance of mobile payment services: An empirical analysis,” Electron. Commer. Res. Appl., vol. 9, no. 3, pp. 209–216, 2010.

W. Widiyanti, “Pengaruh Kemanfaatan, Kemudahan Penggunaan dan Promosi terhadap Keputusan Penggunaan E-Wallet OVO di Depok,” Monet. - J. Akunt. dan Keuang., vol. 7, no. 1, pp. 54–68, 2020.

H. M. Jogiyanto, Sistem Informasi Keperilakuan. Yogyakarta: Andi Offset, 2007.

C. Fornell and D. F. Larcker, “Fornell, C. and Larcker, D.F. (1981), “Evaluating structural equation models with unobservable variables and.pdf,” J. Mark. Res., vol. XVIII, no. February, pp. 39–50, 1981.

J. Henseler, C. M. Ringle, and M. Sarstedt, “A new criterion for assessing discriminant validity in variance-based structural equation modeling,” J. Acad. Mark. Sci., vol. 43, no. 1, pp. 115–135, Jan. 2015.

G. Franke and M. Sarstedt, “Heuristics versus statistics in discriminant validity testing: a comparison of four procedures,” Internet Res., vol. 29, no. 3, pp. 430–447, 2019.

R. Kline, “Principles and practice of structural equation modeling,” 2015.

L. T. Hu and P. M. Bentler, “Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives,” Struct. Equ. Model., vol. 6, no. 1, pp. 1–55, 1999.

R. C. MacCallum, M. W. Browne, and H. M. Sugawara, “Power analysis and determination of sample size for covariance structure modeling,” Psychol. Methods, vol. 1, no. 2, pp. 130–149, 1996.

D. Hooper, J. Coughlan, M. R. Mullen, and E. AL., “Evaluating Model Fit : a Synthesis of the Structural Equation Modelling Literature,” Electron. J. Bus. Res. Methods, vol. 6, no. 1, pp. 53–60, 2008.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 La Ode Abdul Wahid, Ahmad R Pratama

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 ILKOM Jurnal Ilmiah indexed by

doaj_logoDimensions_logoCROSSREF_logoROAD_logoPKP_Index_logoGoogle_Scholar_logosinta_logogaruda_logoonesearch_logoBASE_logoWordcat_logo

___________________________________________________________
ILKOM Jurnal Ilmiah
ISSN 2548-7779
Published by Teknik Informatika Fakultas Ilmu Komputer Universitas Muslim Indonesia
W : https://fikom.umi.ac.id/
E : jurnal.ilkom@umi.ac.id

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0