2018
DOI: 10.18502/keg.v3i7.3075
|View full text |Cite
|
Sign up to set email alerts
|

Users' Acceptance of Using Biometric Authentication System for Bahrain Mobile Banking

Abstract: .

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
5
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 14 publications
(18 reference statements)
1
5
0
Order By: Relevance
“…This study was performed in Spring 2019, while privacy concerns and reluctance to share biometric data might have ICS 30,4 persisted, including among young users. The privacy concerns about providing, storing and using biometric data, and the potential negative effects on biometric methods' adoption, was also seen in prior studies (Mirza et al, 2018). Nevertheless, it would be interesting to explore whether COVID-19, the resulting proliferation of online activities and greater willingness to use cameras and microphones, influenced changes in user perception and prevalence of adoption of biometric authentication schemes.…”
Section: Discussionmentioning
confidence: 97%
See 4 more Smart Citations
“…This study was performed in Spring 2019, while privacy concerns and reluctance to share biometric data might have ICS 30,4 persisted, including among young users. The privacy concerns about providing, storing and using biometric data, and the potential negative effects on biometric methods' adoption, was also seen in prior studies (Mirza et al, 2018). Nevertheless, it would be interesting to explore whether COVID-19, the resulting proliferation of online activities and greater willingness to use cameras and microphones, influenced changes in user perception and prevalence of adoption of biometric authentication schemes.…”
Section: Discussionmentioning
confidence: 97%
“…Authentication methods are classified into: knowledge-based, which employ something a user knows; possession-based, derived from something a user has; and identity-based, i.e., methods that exploit what a user is (Shafique et al, 2017). Commonly, these methods have been evaluated for: deployability (Bonneau et al, 2012); user preferences (Mirza et al, 2018;Zimmermann and Gerber, 2020); and usability and security, from a technical (Bonneau et al, 2012;Ferrag et al, 2020), as well as user perspective (Andriotis et al, 2016;Zimmermann and Gerber, 2020).…”
Section: Related Work Reviewmentioning
confidence: 99%
See 3 more Smart Citations