Intención de uso de la tecnología biométrica en el sector financiero: efecto de la utilidad sobre los riesgos percibidos por el consumidor

Palabras clave

intención de uso
tecnología biométrica
riesgo percibido
sector financiero
comportamiento del consumidor

Cómo citar

Intención de uso de la tecnología biométrica en el sector financiero: efecto de la utilidad sobre los riesgos percibidos por el consumidor. (2016). Working Papers. Maestría En Gerencia estratégica De Mercadeo, 1(1). https://doi.org/10.15765/wpmgem.v1i1.730

Resumen

Mediante un análisis de revisión sistemática de literatura, se evidenció que existen múltiples riesgos percibidos por el consumidor asociados al uso de las tecnologías biométricas, los cuales son la mayor barrera de entrada de esta tecnología, principalmente en los entornos financieros. Dado que no se han realizado estudios que evalúen si la utilidad de la misma y sus beneficios son mayores a los riesgos percibidos por el consumidor, el presente estudio busca medir la intención de uso de las tecnologías biométricas en entornos financieros y evaluar si la utilidad de la tecnología es mayor a los riesgos percibidos, para así y según los resultados obtenidos, realizar las recomendaciones a las entidades que aplicarán estas tecnologías a fin de facilitar su adopción por parte sus clientes o proponer modificaciones a las mismas para adaptarlas a las necesidades del consumidor y de las entidades. 

Referencias

Arigbabu, O. A., Ahmad, S. M. S., Adnan, W. A. W., & Yussof, S. (2015). Integration of multiple soft biometrics for human identification. Pattern Recognition Letters, 68, 278–287. http://doi.org/10.1016/j.patrec.2015.07.014

Blanco-Gonzalo, R., Sanchez-Reillo, R., Miguel-Hurtado, O., & Bella-Pulgarin, E. (2014). Automatic usability and stress analysis in mobile biometrics. Image and Vision Computing, 32(12), 1173–1180. http://doi.org/10.1016/j.imavis.2014.09.003

Byun, S., & Buyn, S.-E. (2011). Exploring perceptions toward biometric technology in service encounters: a comparison of current users and potential adopters. Behaviour & Information Technology, 3001(July 2015), 1–14. http://doi.org/10.1080/0144929X.2011.553741

Clodfelter, R. (2010). Biometric technology in retailing: Will consumers accept fingerprint authentication? Journal of Retailing and Consumer Services, 17(3), 181–188. http://doi.org/10.1016/j.jretconser.2010.03.007

Davis, F. D. (1986). Technology acceptance model for empirically testing new end- user information systems: Theory and results (Unpublished doctoral dissertation). Massachusetts Institute of Technology, Cambridge.

Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human Computer Studies, 59(4), 451–474. http://doi.org/10.1016/S1071-5819(03)00111-3

Fujii, H., & Tsuruoka, Y. (2013). Three-factor user authentication method using biometrics challenge response. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7859 LNCS, 395–396. http://doi.org/10.1007/978-3-642-39884-1_34

Harris, A. J., & Yen, D. C. (2002). Biometric authentication: assuring access to information. Information Management & Computer Security, 10(1), 12–19. http://doi.org/10.1108/09685220210417463

Jebaline, G. R., Xavier, F., College, E., Xavier, F., & College, E. (2015). Biometrics, 2–5.

Jung, E., & Hong, K. (2015). Biometric verification based on facial profile images for mobile security. Journal of Systems and Information Technology, 17(1), 91–100. http://doi.org/10.1108/JSIT-03-2014-0020

Kalotay, K. (2006). The Impact of EU Enlargement on FDI Flows. International Finance Review, 6(September), 473–499. http://doi.org/10.1016/S1569-3767(05)06019-X

Kaplan, L. B., Szybillo, G. J., & Jacoby, J. (1974). Components of perceived risk in product purchase: A cross-validation. Journal of Applied Psychology, 59(3), 287–291. http://doi.org/10.1037/h0036657

Kuisma, T., Laukkanen, T., & Hiltunen, M. (2007). Mapping the reasons for resistance to Internet banking: A means-end approach. International Journal of Information Management, 27(2), 75–85. http://doi.org/10.1016/j.ijinfomgt.2006.08.006

Lee, M. C. (2009). Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130–141. http://doi.org/10.1016/j.elerap.2008.11.006

Libreros, L.L. ( 8 de Mayo de 2016). El País. Recuperado el 21 de Mayo de 2016, de http//www.elpais.com.co/elpais/judicial/noticias/alerta-cali-dispararon-robos-traves-internet

Lin, W. B. (2008). Investigation on the model of consumers’ perceived risk-integrated viewpoint. Expert Systems with Applications, 34(2), 977–988. http://doi.org/10.1016/j.eswa.2006.10.042

Littler, D., & Melanthiou, D. (2006). Consumer perceptions of risk and uncertainty and the implications for behaviour towards innovative retail services: The case of Internet Banking. Journal of Retailing and Consumer Services, 13(6), 431–443. http://doi.org/10.1016/j.jretconser.2006.02.006

McAfee. (Junio de 2014). Net Losses: Estimating the Global Cost of Cybercrime. Recuperado el 29 de Mayo de 2016, de http://www.mcafee.com/ca/resouces/reports/rp-economic-impact-cybercrime2.pdf

Morosan, C. (2012). Theoretical and Empirical Considerations of Guests’ Perceptions of Biometric Systems in Hotels: Extending the Technology Acceptance Model. Journal of Hospitality & Tourism Research, 36(1), 52–84. http://doi.org/10.1177/1096348010380601

Normalini, M. K., & Ramayah, T. (2013). Understanding Security in Consumer Adoption of Internet Banking: Biometrics Technology Implementation. Research and Development in E-Business through Service-Oriented Solutions, 293. http://doi.org/10.4018/978-1-4666-6268-1.ch037

Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2016). Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior, 61(2016), 404–414. http://doi.org/10.1016/j.chb.2016.03.030

Plateaux, A., & Lacharme, P. (2014). One-Time Biometrics for Online Banking, 179–193.

Reavley, N. (2005). Securing online banking. Card Technology Today, 17(10), 12–13. http://doi.org/10.1016/S0965-2590(05)70389-3

Suryadevara, S., Naaz, R., Shweta, S., Kapoor, S., & Sharma, A. (2011). Visual cryptography improvises the security of tongue as a biometric in banking system. 2011 2nd International Conference on Computer and Communication Technology, ICCCT-2011, 412–415. http://doi.org/10.1109/ICCCT.2011.6075146

Tassabehji, R., & Kamala, M. A. (2009). Improving e-banking security with biometrics: Modelling user attitudes and acceptance. 3rd International Conference on New Technologies, Mobility and Security, NTMS 2009. http://doi.org/10.1109/NTMS.2009.5384806

Tassabehji, R., & Kamala, M. A. (2012). Evaluating biometrics for online banking: The case for usability. International Journal of Information Management, 32(5), 489–494. http://doi.org/10.1016/j.ijinfomgt.2012.07.001

Venkatesh, V., & Zhang, X. (2010). Unified theory of acceptance and use of technology: U.S. vs. China. Journal of Global Information Technology Management, 13(1), 5–27. http://doi.org/10.1080/1097198X.2010.10856507

Venkatraman, S., & Delpachitra, I. (2008). Biometrics in banking security: a case study. Information Management & Computer Security, 16(4), 415–430. http://doi.org/10.1108/09685220810908813

Verghese, B. (Enero de 2015). Cyber security a growing CIO priority. Obtenido de http://www.wipro.com/documets/cyber-security-a-growing-CIO-priority.pdf

Yi, M. Y., Jackson, J. D., Park, J. S., & Probst, J. C. (2006). Understanding information technology acceptance by individual professionals: Toward an integrative view. Information and Management, 43(3), 350–363. http://doi.org/10.1016/j.im.2005.08.006

Licencia de Creative Commons
Working Papers by Institución Universitaria Politécnico Grancolombiano is licensed under a Creative Commons Reconocimiento-NoComercial-SinObraDerivada 3.0 Unported License.
Creado a partir de la obra en http://www.poligran.edu.co/wpmgem