Total views : 232

A Study on Psychological Conflict Elements Affecting Intention to Use Biometric-Based Non Face-to-Face Authentication System in Financial Transactions

Affiliations

  • Department of Knowledge Service & Consulting, Hansung University, Korea, Republic of
  • Department of Industrial and Management Engineering, Hansung University, Korea, Republic of

Abstract


Objectives: This research tries to discern psychological conflict elements related with biometric-based non face-to-face authentication system in financial transactions, and examine how these elements affect the intention to use the biometric system. Methods/Statistical Analysis: Research data were collected from the survey to users. To test goodness of fit of the research model and hypotheses, structural equation modeling was used. Findings: The analysis found out that perceived risk characteristics like privacy concern and routine seeking personality have significant effects on usage conflict, and, then, usage conflict has negative effect on the intention to use the biometric system. Improvements/Applications: This research implicates that financial institutions should be aware of antecedent variables affecting usage conflict and try to make efforts to reduce such negative perception on the biometric system.

Keywords

Biometrics, Information Privacy Risk, Negative Mass Media, Privacy Concern, Routine Seeking Personality, Usage Conflict.

Full Text:

 |  (PDF views: 179)

References


  • KFTC ‘Biometric Distribution’ Standard. Available from: http://www.dt.co.kr/contents.html?article_no =2016010602101460812001, Date accessed: 01/05/2016.
  • Security cards, OTP abolish duty use, Blooming Fintech Era. Available from: http://news.donga.com/3/all/20160221/76584935/1. Date accessed: 02/21/2016.
  • Miller B. Everything you need to know about biometric identification. Personal Identification News Biometric Industry Directory. Werfel & Miller, Inc. Washington DC. 1989; . p.5-8.
  • Way man J. A definition of biometrics National Biometric Test Center Collected Works 1997–2000.San Jose State University. 2000.
  • Coventry L, Angeli A D, Johnson G. Usability and biometric verification at the ATM interface SIGCHI conference on Human factors in computing systems, USA, 2003, . p.153-60.
  • Lee BY, Kim MY. Factors affecting the continuance usage intention of biometric technology: Comparing dark scenario with bright scenario. Journal of Society for e-Business Studies. 2011; 16(3):1-22.
  • Taha K E, Norrozila S. A survey of multi-biometrics and fusion levels. Indian Journal of Science and Technology. 2015; 8(32): 1-10.
  • Oh DY. Biometric-Based authentication system of financial security. Digital Daily Financial IT Innovation 2015 Seminar Presentations. 2014.
  • KB Financial Group Inc. Status and prospects of utilizing biometric technology in the financial industry. KB Knowledge Vitamin. 2014; 14-42.
  • Park YS, Han MH. The effects of perceived risk and perceived quality on the consumer`s online buying behavior. Journal of Korean Marketing Association. 2001; 16(1): 59-84.
  • Dinev T, Hart P. Internet privacy concern and their antecedents-measurement validity and a regression model. Behavior and Information Technology. 2004; 23(6): 413-22.
  • Jang SH. Privacy risk of social network service and user resistance. Master's thesis. Department of Incheon university management. 2014.
  • Lee YN, Kwon OB. Model based approach to estimating privacy concerns for context-aware services. Journal of Intelligence and Information Systems. 2009; 15(2): 97-111.
  • Gatignon H, Robertson T S.A propositional inventory for new diffusion research. Journal of Consumer Research. 1985;11(1): 849-67.
  • Rogers E M. Diffusion of Innovation, 4th (edn). New York :The Free Press;, 2003.
  • Managing Change in the Workplace. https://www.entrepreneur.com/article/275678. Date Accessed: 2016.
  • Tichy N M. Managing strategic change: Technical, political and cultural dynamics., New York: John Wiley& Sons;, 1983.p.434.
  • Kim JJ, Park KK. A study on the relation between personal characteristics and psychological resistance to change & organization commitment. Korean Journal of Industrial and Organizational Psychology. 2008; 21(3): 429-50.
  • Park KJ. A Study on the avoidance intention of social network service in post adoption context: Focusing on the Facebook user. The Journal of Information Systems. 2015; 24(1): 147-68.
  • Sweeney J C, Soutar G N.Are there cognitive dissonance segment?Australian Journal of Management. 2003; 28(3): 227-49.
  • Krueger N. The cognitive infrastructure of opportunity emergence. Entrepreneurship Theory and Practice. 2000; 25(3): 5-23.
  • Davis FD. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly. 1989; 13(3): 319-40.
  • Davis FD, Bagozzi RP, Warshaw PR. User acceptance of computer technology: A comparison or two theoretical model. Management Science. 1989; 35(8): 982-1002.
  • Venkatesh V, Davis F D. A theoretical extension of the technology acceptance Model: Four longitudinal field studies. Management Science. 2000; 46(2):186-204.
  • Lim J S. A study on the effect of the introduction characteristics of cloud computing services on the performance expectancy and the intention to use: Focusing on the innovation diffusion theory.[ PhD thesis]. Dan Kook University; 2012.
  • Shin MS, Han SS, Kim HJ. The effect of perceived risk, service quality and individual tendency on trust, satisfaction & continuous use intention., Management Education Review., 2012; 27(1): 1-23.
  • Kim J h, Sung B K, Bu S H.The influence of usefulness, convenience & privacy threats on accepting online behavioral advertising: Focused on consumer`s psychological response & perceived controllability. The Korean Journal of Advertising. 2010; 87: 263-302.
  • Lee MN, Sim JW. The moderating effect by gender in the relationship between the perception of online privacy and use of privacy protection dtrategy. Media, Gender & Culture. 2009; 12: 165-90.
  • Liao. Examining the impact of privacy. Trust and risk perceptions beyond monetary transactions: An integrated model. Electronic Commerce Research and Applications. 2011;10(6): 702-15.
  • Ki SJ, Lee SY. Exploring categories of SNS user on the basis of privacy concern and delf-efficacy. Korean Journal of Journalism & Communication Studies. 2013; 57(1): 81-110.
  • Hyuk I, Seong T P, Ko M H.A study of factors that affect the right to be forgotten and self-disclosure intent in SNS. Indian Journal of Science and Technology. 2016; 9(26): 1-8.
  • Hong JP. Conceptual investigation of differential functions of advertising and publicity: Focusing on consumers` motivation, opportunity and sbility to process persuasive messages. Korean Journal of Consumer and Advertising Psychology. 2006; 7(1):47-73.
  • Jeon SR, Park HJ. The influence of information characteristics on word-of-mouth effect. Journal of Consumer Studies. 2003; 14(4):21-44.
  • Kim JH, Bu SH. The effect of scarcity message on purchasing intention in message framing of advertising. Korean Journal of Consumer and Advertising Psychology. 2007; 8(2):183-203.
  • Oreg S. Resistance to change: developing an individual differences measure. Journal of Applied Psychology. 2003; 88(4):680-93.
  • Bartunek JM, Moch MK. First-order, Second-order and third-order change an organization development intervention: A cognitive approach. Journal of Applied Behavioral Science. 1987;28(4):204-23.
  • The theory of Cognitive Dissonance. http://www.simplypsychology.org/cognitive-dissonance.html. Date Accessed: 2008.
  • Suh MS, Ahn JW, Lee EK, Oh DY. Purchasing avoidance of digital convergence products: Focusing on the customer's psychological factors and the innovation resistance. Korean Journal of Contents. 2009; 9(1):270-84.
  • Park KJ, Park S B.A study on the stress of using social networking services and its discontinuance intention. Journal of the Korea Society of Computer and Information. 2014; 19(12):275-86.
  • Dinev T, Hart P. An extended privacy calculus model for E-commerce. Information System Transactions Research. 2006; 17(1):61-80.
  • Lee H S, Lim D W, Jung ZH. Personal information overload and user resistance in the big data age. Journal of Intelligence and Information Systems. 2013;19(1):125-39.
  • Bhattacherjee A. Acceptance of e-commerce services: the case of electronic brokerages. Systems, Man and Cybernetics, Part A: Systems and Humans. IEEE Transactions on., 2000;, 30(4): 411-20.
  • Fornel C, Larcker DF. Structural equation models with unobservable variables and measurement error: Algebra and statics. Journal of Marketing Research., 1981; 25(2): 186-92.
  • Barbara S. The criteria for selecting appropriate fit indices in structural equation modeling and their rationales. Korean Journal of Clinical Psychology. 2000; 19(1):. 161-77.
  • Gefen D, Stuab DW, Boudreau MC. Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems. 2000; 4(7):1-76.
  • Bae B R. AMOS 19 Structural equation modeling - Principles and Practices, 3 rd (edn). New York: THE GUILFORD PRESS; 2011.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.