Resumen
Mediante un análisis de revisión sistemática de literatura, se evidenció que existen múltiples riesgos percibidos por el consumidor asociados al uso de las tecnologías biométricas, los cuales son la mayor barrera de entrada de esta tecnología, principalmente en los entornos financieros. Dado que no se han realizado estudios que evalúen si la utilidad de la misma y sus beneficios son mayores a los riesgos percibidos por el consumidor, el presente estudio busca medir la intención de uso de las tecnologías biométricas en entornos financieros y evaluar si la utilidad de la tecnología es mayor a los riesgos percibidos, para así y según los resultados obtenidos, realizar las recomendaciones a las entidades que aplicarán estas tecnologías a fin de facilitar su adopción por parte sus clientes o proponer modificaciones a las mismas para adaptarlas a las necesidades del consumidor y de las entidades.
Referencias
Arigbabu, O. A., Ahmad, S. M. S., Adnan, W. A. W., & Yussof, S. (2015). Integration of multiple soft biometrics for human identification. Pattern Recognition Letters, 68, 278–287. http://doi.org/10.1016/j.patrec.2015.07.014
Blanco-Gonzalo, R., Sanchez-Reillo, R., Miguel-Hurtado, O., & Bella-Pulgarin, E. (2014). Automatic usability and stress analysis in mobile biometrics. Image and Vision Computing, 32(12), 1173–1180. http://doi.org/10.1016/j.imavis.2014.09.003
Byun, S., & Buyn, S.-E. (2011). Exploring perceptions toward biometric technology in service encounters: a comparison of current users and potential adopters. Behaviour & Information Technology, 3001(July 2015), 1–14. http://doi.org/10.1080/0144929X.2011.553741
Clodfelter, R. (2010). Biometric technology in retailing: Will consumers accept fingerprint authentication? Journal of Retailing and Consumer Services, 17(3), 181–188. http://doi.org/10.1016/j.jretconser.2010.03.007
Davis, F. D. (1986). Technology acceptance model for empirically testing new end- user information systems: Theory and results (Unpublished doctoral dissertation). Massachusetts Institute of Technology, Cambridge.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human Computer Studies, 59(4), 451–474. http://doi.org/10.1016/S1071-5819(03)00111-3
Fujii, H., & Tsuruoka, Y. (2013). Three-factor user authentication method using biometrics challenge response. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7859 LNCS, 395–396. http://doi.org/10.1007/978-3-642-39884-1_34
Harris, A. J., & Yen, D. C. (2002). Biometric authentication: assuring access to information. Information Management & Computer Security, 10(1), 12–19. http://doi.org/10.1108/09685220210417463
Jebaline, G. R., Xavier, F., College, E., Xavier, F., & College, E. (2015). Biometrics, 2–5.
Jung, E., & Hong, K. (2015). Biometric verification based on facial profile images for mobile security. Journal of Systems and Information Technology, 17(1), 91–100. http://doi.org/10.1108/JSIT-03-2014-0020
Kalotay, K. (2006). The Impact of EU Enlargement on FDI Flows. International Finance Review, 6(September), 473–499. http://doi.org/10.1016/S1569-3767(05)06019-X
Kaplan, L. B., Szybillo, G. J., & Jacoby, J. (1974). Components of perceived risk in product purchase: A cross-validation. Journal of Applied Psychology, 59(3), 287–291. http://doi.org/10.1037/h0036657
Kuisma, T., Laukkanen, T., & Hiltunen, M. (2007). Mapping the reasons for resistance to Internet banking: A means-end approach. International Journal of Information Management, 27(2), 75–85. http://doi.org/10.1016/j.ijinfomgt.2006.08.006
Lee, M. C. (2009). Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130–141. http://doi.org/10.1016/j.elerap.2008.11.006
Libreros, L.L. ( 8 de Mayo de 2016). El País. Recuperado el 21 de Mayo de 2016, de http//www.elpais.com.co/elpais/judicial/noticias/alerta-cali-dispararon-robos-traves-internet
Lin, W. B. (2008). Investigation on the model of consumers’ perceived risk-integrated viewpoint. Expert Systems with Applications, 34(2), 977–988. http://doi.org/10.1016/j.eswa.2006.10.042
Littler, D., & Melanthiou, D. (2006). Consumer perceptions of risk and uncertainty and the implications for behaviour towards innovative retail services: The case of Internet Banking. Journal of Retailing and Consumer Services, 13(6), 431–443. http://doi.org/10.1016/j.jretconser.2006.02.006
McAfee. (Junio de 2014). Net Losses: Estimating the Global Cost of Cybercrime. Recuperado el 29 de Mayo de 2016, de http://www.mcafee.com/ca/resouces/reports/rp-economic-impact-cybercrime2.pdf
Morosan, C. (2012). Theoretical and Empirical Considerations of Guests’ Perceptions of Biometric Systems in Hotels: Extending the Technology Acceptance Model. Journal of Hospitality & Tourism Research, 36(1), 52–84. http://doi.org/10.1177/1096348010380601
Normalini, M. K., & Ramayah, T. (2013). Understanding Security in Consumer Adoption of Internet Banking: Biometrics Technology Implementation. Research and Development in E-Business through Service-Oriented Solutions, 293. http://doi.org/10.4018/978-1-4666-6268-1.ch037
Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2016). Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior, 61(2016), 404–414. http://doi.org/10.1016/j.chb.2016.03.030
Plateaux, A., & Lacharme, P. (2014). One-Time Biometrics for Online Banking, 179–193.
Reavley, N. (2005). Securing online banking. Card Technology Today, 17(10), 12–13. http://doi.org/10.1016/S0965-2590(05)70389-3
Suryadevara, S., Naaz, R., Shweta, S., Kapoor, S., & Sharma, A. (2011). Visual cryptography improvises the security of tongue as a biometric in banking system. 2011 2nd International Conference on Computer and Communication Technology, ICCCT-2011, 412–415. http://doi.org/10.1109/ICCCT.2011.6075146
Tassabehji, R., & Kamala, M. A. (2009). Improving e-banking security with biometrics: Modelling user attitudes and acceptance. 3rd International Conference on New Technologies, Mobility and Security, NTMS 2009. http://doi.org/10.1109/NTMS.2009.5384806
Tassabehji, R., & Kamala, M. A. (2012). Evaluating biometrics for online banking: The case for usability. International Journal of Information Management, 32(5), 489–494. http://doi.org/10.1016/j.ijinfomgt.2012.07.001
Venkatesh, V., & Zhang, X. (2010). Unified theory of acceptance and use of technology: U.S. vs. China. Journal of Global Information Technology Management, 13(1), 5–27. http://doi.org/10.1080/1097198X.2010.10856507
Venkatraman, S., & Delpachitra, I. (2008). Biometrics in banking security: a case study. Information Management & Computer Security, 16(4), 415–430. http://doi.org/10.1108/09685220810908813
Verghese, B. (Enero de 2015). Cyber security a growing CIO priority. Obtenido de http://www.wipro.com/documets/cyber-security-a-growing-CIO-priority.pdf
Yi, M. Y., Jackson, J. D., Park, J. S., & Probst, J. C. (2006). Understanding information technology acceptance by individual professionals: Toward an integrative view. Information and Management, 43(3), 350–363. http://doi.org/10.1016/j.im.2005.08.006
Working Papers by Institución Universitaria Politécnico Grancolombiano is licensed under a Creative Commons Reconocimiento-NoComercial-SinObraDerivada 3.0 Unported License.
Creado a partir de la obra en http://www.poligran.edu.co/wpmgem