Вы находитесь на странице: 1из 43

A PROJECT REPORT ON

ADOPTION OF BIO METRIC TECHNOLOGY: USER PERCEPTION


In partial fulfillment of the subject -Business Research Methodology Submitted By: GosaiJaydeepgiri (027) Kher Preshita (040) M Jinesh Jose(043) Modi Shikha (052) Nair Nikhil (055) Submitted To: Mr. Jayesh Patel Lecturer, V.M.Patel Institute of Management, Ganpat University Dated On April 16, 2013

Ganpat University V.M.Patel Institute of Management

INDEX
Preface Acknowledgement Ch. No. 1 2 3 Title INTRODUCTION TO THE STUDY REVIEW OF LITERATURE RESEARCH METHODOLOGY 3.1 Problem statement 3.2 Research Objective 3.3 Research Hypothesis list 3.4 Research design 3.5 Target population defined 3.6 Sample size determination 3.7 Sampling method 3.8 ApproachThe Interviewing Method 3.9 Interviewing Method 3.10 measure reliability of the scale 3.11 Data analysis 4 ANALYSIS OF PRIMARY DATA 4.1 Test the hypothesis 6 7 8 9 RECOMMENDATION CONCLUSION BIBLIOGRAPHY ANNEXURE

PREFACE

As a part of MBA curriculum and in order to gain particular knowledge in the field of no. of family members, we are required to make report on any related topic. The basic objective behind doing this research project is to gain the knowledge about the USERS PERCEPTION TOWARDS BIOMETRIC TECHNOLOGY. We have tried to highlight every segment which is related to this topic. In this project we have included the various concepts, effects and implications regarding to study on Users perception towards biometric technology. Doing this project helped us to enhance our knowledge regarding the beneficial as well the negative part of biometric technology. Throughout the study we did undergo many new experiences related with users perception towards the biometric technology. Through this report we come to know about importance of team work and role of devotion towards the works.

ACKNOWLEDGEMENT

The research report on Adoption of biometric technology: User perception has been given to me as part of the curriculum in 2-Years Masters Degree in Business Administration. We have tried our best to present this information as clearly as possible using basic terms that we hope will be comprehended by the widest spectrum of researchers, analysts and students for further studies. We have completed this research report under the guidance and supervision of Prof. Jayesh D. Patelwe will be failed in my duty if we do not acknowledge the esteemed bookish guidance, assistance and knowledge. We have received from them towards fruitful and timely completion of this work. Our acknowledgement may not redeem the debt we owe to our parents for their direct/indirect support during the entire course of this project. Eventually, we would like to thank all whose has given direct and indirect support inhelping us to complete our report in time.

1. Introduction

Consumers worldwide support biometrics: Nearly 70% of consumers worldwidesupport using biometrics technology, such as fingerprints or voice recognition,administered by a trusted organization (bank, healthcare provider or governmentorganization) as a way to verify an individual's identity, according to new globalresearch from Unisys. In the first worldwide survey of its kind tostudy consumer security preferences, the Unisys research also found 66% of consumersworldwide favored biometrics as the ideal method to combat fraud and identity theft ascompared to other methods such as smart cards and tokens, reports Enterprise Networksand Servers. This finding shows an increase from separate research that Unisysconducted in September 2005, which found 61% of consumers worldwide favoredbiometrics as the preferred method to fight fraud and identity theft. In the future, no one will need pockets. That stuff jingling around in there -- keys, credit cards, checkbooks -- will be replaced by something closer to the body. When you need to opena door or make a purchase, chances are you'll do it with a fingerprint, a voice command, or a computer scan of your eyeball. That is, if companies like Pay By Touch haveanything to say about it. Pay By Touch, a closely held San Francisco outfit, specializesin biometrics, or the technology of identifying people by unique biologic traits notjust fingerprints, but also irises, palms, and voices. And increasingly, those traits arebeing used in place of keys, credit cards, and even computer passwords. Founded in2002, Pay by Touch has signed up more than 2 million people willing to have theirfingerprints used as a surrogate for checks and credit cards at more than 2,000 stores.

3. Types of Biometrics There are several human distinguishable traits that fit the definition of biometrics given above. In order to be used for recognizing a person, the human trait needs to be unique and not subject to change. Fingerprints, for example, have been used for over one hundred years and, therefore, are generally well accepted as a recognition technology. Other technologies such as face, hand geometry, speaker and iris recognition are also generally accepted. A biometric that would require giving a blood sample for frequent personal verification would probably not be very well accepted. Performance considerations are important. No biometrics can guarantee one hundred percent accuracy. A brief introduction of the commonly used biometrics is given below: Face Recognition: Different technologies can be used for face recognition. One approach consists on capturing a no. of family member of the face using an inexpensive camera(visible spectrum). This method typically models key features from the central portion of a facial no. of family member extracting these features from the captured no. of family member(s) that do not change over time while avoiding superficial features such as facial expressions or hair. Major benefits of facial recognition are that it is nonintrusive, hands-free, provides for continuous authentication and is accepted by most users. Enrollment sample sizes (e.g.,5 face samples) may range from 1 KB-2KB/sample). Smaller template sizes are also used (e.g., less than 100 bytes). Fingerprints: Fingerprints are important. By 1998, fingerprint recognition products accounted for 78% of the total sales of biometric technology. These products look at the friction ridges that cover the fingertips and classify patterns of minutiae, such as branches and end points of the ridges. Some also look at the pores in the skin of the ridges. Fingerprint recognition devices for desktop and laptop access are widely available from many different vendors at a low cost. The relatively small size allows the sensor to be integrated in other devices (e.g., mice, keyboards). Retinal Scanning: This method of personal authentication uses the vascular patterns of the retina of the eye. In healthy individuals, the vascular pattern in the retina does not change over the course of an individuals life. The patterns are scanned using allowintensity (e.g., near-infrared) light source. It requires the user to look into a device and

focus on a given point. The no. of family member acquisition involves cooperation of the subject, entails contact with the eyepiece. Signature Verification: The way a person signs her name is known to be characteristic of that individual. Signatures of some people vary substantially: even successive impressions of their signature are significantly different. It is based on measuring dynamic signature features such as speed, pressure and angle used when a person signs a standard, recorded pattern (e.g., autograph). One focus for this technology has been ebusiness applications. Voice Recognition: Voice recognition or speaker recognition is the problem of identifying a speaker from a short utterance. This biometric technology uses the acoustic features of speech that have been found to differ between individuals. These acoustic patterns reflect both anatomy (e.g., size and shape of the throat and mouth) and learned behavioral patterns (e.g., voice pitch, speaking style)

2. Literature review
LITERATURE REVIEW 2.1 Introduction This chapter consists of the literature review for this study. It starts with a description on biometric technology, followed by the explanation of various models on adoption of a new technology. The next two sections will explain the comparisons of the models and the past research done on the extensions of the technology adoption model. The review of literature leads to the development of the theoretical framework and hypotheses for this study. 2.2 Biometric Technology The term biometrics is derived from the Greek words bio (life) and metric (to measure)(Scherer, 2005). Biometric identification exploits the universally recognized fact that certain physiological or behavioral characteristics reliably distinguish one person from another. In short, biometric is the process of automatically recognizing a person using distinguishing traits not shared by any other individuals. Physical characteristics include fingerprints, hand geometry, retina, iris and facial characteristics, DNA, ear and lip motion recognition (Ahmed and Siyal, 2005; Jain et al.,1999; Scherer, 2005; Langenderfer and Linn off, 2005). Behavioral characteristics include signature, voice, keystroke patterns and gait. (Jain et al., 1999; Scherer, 2005).10Biometric has been used throughout history. Biometrics has been applied in a variety of ways since the time of Egyptian Pharaohs who used height measurement (Davies, 1994). Babylonian kings used handprints to identify different things such as engraving (Harris and Yen, 2002). The Chinese merchants stamped childrens palm prints and footprints on paper with ink to distinguish the young children from one another (Scherer, 2005).Electronic readers have been available since the early 1970s and access is usually granted through the use of a Personal Identity Number (PIN), card or token at any entry point(Harris and Yen, 2002). However, there are many problems associated with these technologies, for example, people forget their PINs and cards get stolen by people to gain authorized access. Biometric technology has its distinct features to remedy these problems. The basic aim of using biometrics is to devise a mechanism that is more secure in protecting the Cryptographic key of a

user as compared to the conventional method of password-based encryption (Ahmed and Siyal, 2005). Biometrics offers an increasingly attractive solution like a key that the user cannot lose or forget (Gifford et al., 1999). Gifford et al (1999) noted that the following development suggests that biometrics may experience wider spread acceptance among users: Greater use and more elusive computer networks - where users are now required to remember and maintain ever more PINs and passwords. Emerging e-commerce internet shopping and trust service offerings require secure user verification procedures that prevent fraud and are sufficiently robust to stand up in a court of law. There is now a growing trend of biometric technology in computer especially based on fingerprint. Nowadays, there are many laptop ships with built-in finger scanners from most PC manufacturers like Fujitsu, Samsung and Sony (Stellitano, 2004; Fischer, 2007). The cost of the chips that do the fingerprint recognition has decreased considerably, driven by an increase in production volumes. As a result, it is now practical to incorporate fingerprint recognition into everyday devices (Fischer, 2007). Fingerprint readers are commercially available on laptops for about $10, and these can and have been incorporated into electronic transaction systems. For online transactions, a fingerprint reader is a reasonable and inexpensive choice for establishing security (Kleist, 2007). In Malaysia, the early adoption of biometrics can be seen to be used in a large scaleespecially in airport for immigration clearance for travelers at entry and exit points for bordercontrol. The new E-passport launched in Malaysia in December 2002 is the worlds firstbiometrics enabled Epassport that is based on IRIS smart card technologies, combiningmicrochip, RFID, and biometrics to secure travels documents. Table 2.1 below listed out various biometric technologies that are used in the worldtoday Table 2.1 Various Biometric Technologies Used Around the World

Malaysia

Fingerprint

Airport

Immigration clearance for travelers

USA

Iris

Prisons Convicts

identity verification before release

USA

Voice

USA Department of Corrections Curfew

enforcement tool for juvenile offenders

3. Research methodology
3.1 Problem Statement:Marketing decision problem: Should biometric technology accepted as secure means for maintaining privacy? Should biometric technology be used to reduce fraudulent activity? Should biometric technology used instead of passwords? Marketing research problem: To determine the users in market who give preference to biometric technology

To determine the users in the market who daily use biometric technology To determine the satisfaction level after using biometric technology. 3.2 Research Objective: To identify the knowledge of biometric technology among users To identify the perception regarding biometric technology To identify the problem face by using biometric technology 3.3 Research Hypothesis list:H0: There is no relationship between gender and adaption of biometric technology. H0: There is no relationship between age and of biometric technology. H0: There is no relationship between occupation and of biometric technology. H0: There is no relationship between no. of family member and of biometric technology. H1: There is relationship between gender and of biometric technology. H1: There is relationship between age and of biometric technology. H1: There is relationship between occupation and of biometric technology. H1: There is relationship between no. of family member and of biometric technology.

3.4 Research Design:

The attitude towards biometric technology study is considered with a sample of elements from a population and it is dealing with users of the same technology. The cross sectional study is the most frequently used descriptive design in research. Cross sectional design involves collection of information from sample of population element only once.

In order to compute attitude towards biometric study only one sample is drawn from target population and information is obtain from the sample only once that is why we use the single cross sectional design.

3.5 Target Population definition: Element-male of the retailer satisfaction Sampling units-users of biometric technology Extent-mehsana, ahmedabad, gandhinagar Time 2012-2013

3.6 Sample Size Calculation:400 sample size in our project report.

3.7 Sampling Method:We are making the survey of users of biometric technology and they have already convinced and we have done survey of those users who were convinced by us. So that is why we opted for the convenience sampling.

3.8 Approach:Allocate the 4 members in questionnaire and go to the retailer than convenience retailer and

fillips the all data. 3.9 Interview Method:Our users knowledge of biometric technology is done by personal interview method use by all members.

3.10 Measure Reliability of the Scale:To test the reliability of various constructs of the questionnaire, the Cronbach coefficient alpha (equivalent to the aver no. of family member of all the split half correlation coefficients) is used. In this study, it was found 0.687. That is the above of 0.6 that is set by the researcher. So we can say that the data is consistent in nature and we can rely on it.

Reliability Statistics Cronbach's Alpha N of Items .687 17

3.11 Data Analysis:AGE [1] Ho: There is no significant difference between age and reducing identity theft. H1: There is significant difference between age and reducing identity theft. [2] Ho: there is no significant difference between age and elimination of password use. H1: There is significant difference between age and elimination of password use. [3] Ho: There is no significant difference between age and fraudulent activity. H1: There is significant difference between age and fraudulent activity. [4] Ho: There is no significant difference between age and improve security. H1: There is significant difference between age and improve security. [5] Ho: There is no significant difference between age and secure than password. H1: There is significant difference between age and secure than password. [6] Ho: There is no significant difference between age and health concern. H1: There is significant difference between age and health concern. [7] Ho: There is no significant difference between age and difficult to capture. H1: There is significant difference between age and difficult to capture. [8] Ho: There is no significant difference between age and face changes over time. H1: There is significant difference between age and face changes over time. [9] Ho: There is no significant difference between age and constraint for sensor difficulty. H1: There is significant difference between no age and constraint for sensor difficulty

Descriptives Std. Deviation 3.84 3.42 3.94 3.92 4.86 3.65 3.03 2.64 3.22 3.16 2.14 2.85 3.47 3.21 4.01 3.58 2.86 3.44 3.32 3.33 4.26 3.80 3.43 3.58 3.24 3.51 3.91 4.08 1.346 1.161 1.382 .986 .378 1.229 1.533 1.220 1.313 1.557 1.952 1.352 1.428 1.163 .887 1.263 1.069 1.192 1.141 1.144 .877 1.245 .535 1.158 1.515 1.187 1.015 .944

Does it become a standard part of modern life

Age below 20

N 38

Mean

Reduces identity theft

21-30 31-40 41-50 51&above Total below 20 21-30 31-40 41-50 51&above Total below 20 21-30 31-40 41-50 51&above Total below 20

224 81 50 7 400 38 224 81 50 7 400 38 224 81 50 7 400 38

Eliminates use of password

Reduces fraudulent activities

Improves security privacy

21-30 31-40 41-50 51&above Total below 20 21-30 31-40 41-50

224 81 50 7 400 38 224 81 50

More secure than password

51&above Total below 20 21-30 31-40 41-50 51&above Total below 20 21-30 31-40 41-50 51&above Total below 20 21-30 31-40 41-50 51&above Total below 20 21-30 31-40 41-50 51&above Total below 20

7 400 38 224 81 50 7 400 38 224 81 50 7 400 38 224 81 50 7 400 38 224 81 50 7 400 38

4.14 3.65 3.97 3.67 4.27 4.10 5.00 3.90 2.74 2.74 2.98 3.32 2.57 2.86 3.47 3.15 4.01 3.72 2.57 3.42 3.47 3.21 4.01 3.58 2.86 3.44 3.32 3.33 4.26 3.80 3.43 3.58 3.24

.690 1.179 1.385 1.461 1.061 1.298 .000 1.374 1.554 1.240 1.351 1.347 1.813 1.327 1.224 1.150 .901 1.230 1.134 1.175 1.428 1.163 .887 1.263 1.069 1.192 1.141 1.144 .877 1.245 .535 1.158 1.515

Health related problems

Hard to capture Iris

Eliminates use of password

Reduces fraudulent activities

Improves

21-30 31-40 41-50 51&above Total below 20

224 81 50 7 400 38

security privacy 21-30 31-40 41-50 51&above Total below 20 21-30 31-40 41-50 51&above Total below 20 21-30 31-40 41-50 51&above Total below 20 21-30 31-40 41-50 51&above 224 81 50 7 400 38 224 81 50 7 400 38 224 81 50 7 400 38 224 81 50 7 3.51 3.91 4.08 4.14 3.65 3.97 3.67 4.27 4.10 5.00 3.90 2.74 2.74 2.98 3.32 2.57 2.86 3.47 3.15 4.01 3.72 2.57 1.187 1.015 .944 .690 1.179 1.385 1.461 1.061 1.298 .000 1.374 1.554 1.240 1.351 1.347 1.813 1.327 1.224 1.150 .901 1.230 1.134

More secure than password

Health related problems

Hard to capture Iris

Std. Mean Deviation

Reduces identity below theft 20 21-30 31-40 41-50 51&ab ove Total

38 224 81 50 7 400

3.03 2.64 3.22 3.16 2.14 2.85

1.533 1.220 1.313 1.557 1.952 1.352

.429 Total Face changes over time passage below 20 21-30 31-40 41-50 400 38 224 81 50 3.42 3.71 3.41 5.53 4.08 1.175 1.505 1.271 7.839 1.104 .059 .244 .085 .871 .156

1.52 3.30 3.22 3.24 3.80 3.77

3.62 3.53 4.21 3.58 7.26 4.39

2 1 1 1 1 2

5 5 5 5 45 5

51&ab ove Total Age becomes a constraint below 20 21-30 31-40 41-50 51&ab ove Total

7 400 38 224 81 50 7 400

3.43 3.95 4.03 3.75 4.46 3.94 4.29 3.95

1.134 3.780 1.305 1.299 .742 1.168 .756 1.211

.429 .189 .212 .087 .082 .165 .286 .061

2.38 3.58 3.60 3.57 4.29 3.61 3.59 3.83

4.48 4.32 4.46 3.92 4.62 4.27 4.98 4.07

2 1 1 1 3 1 3 1

5 45 5 5 5 5 5 5

Test of Homogeneity of Variances Levene Statistic Does it become a standard part of modern life Reduces identity theft Eliminates use of password Reduces fraudulent activities Improves security privacy More secure than password Health related problems Hard to capture Iris Face changes over time passage Age becomes a constraint 4.871 4.879 8.626 3.422 7.012 9.870 4.165 5.299 5.112 5.409 df1 4 4 4 4 4 4 4 4 4 4 df2 395 395 395 395 395 395 395 395 395 395 Sig. .001 .001 .000 .009 .000 .000 .003 .000 .001 .000

ANOVA Sum of Squares Does it become a Between Groups standard part of modern Within Groups life Total Reduces identity theft Between Groups Within Groups Total Eliminates use of password Between Groups Within Groups Total Reduces fraudulent activities Between Groups Within Groups Total Improves security privacy Between Groups Within Groups Total More secure than password Between Groups Within Groups Total Health related problems Between Groups Within Groups Total Hard to capture Iris Between Groups Within Groups 34.330 568.670 603.000 30.739 698.261 729.000 41.347 525.213 566.560 56.071 479.369 535.440 27.240 527.760 555.000 34.203 719.387 753.590 15.982 686.895 702.877 54.183 497.095 Df 4 395 399 4 395 399 4 395 399 4 395 399 4 395 399 4 395 399 4 395 399 4 395 13.546 1.258 10.764 .000 3.996 1.739 2.298 .058 8.551 1.821 4.695 .001 6.810 1.336 5.097 .001 14.018 1.214 11.551 .000 10.337 1.330 7.774 .000 7.685 1.768 4.347 .002 Mean Square 8.583 1.440 F 5.962 Sig. .000

Total Face changes over time Between Groups passage Within Groups Total Age becomes a constraint Between Groups Within Groups Total

551.278 272.500 5427.597 5700.097 31.183 553.817 585.000

399 4 395 399 4 395 399 7.796 1.402 5.560 .000 68.125 13.741 4.958 .001

INTREPRETATION: 1)Here the significance level is 0.000 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between age and standard part of modern life. 2) Here the significance level is 0.002 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between age and reducing theft. 3) Here the significance level is 0.000 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between age and elimination of password used. 4) Here the significance level is 0.000 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between age and fraudulent activity. 5) Here the significance level is 0.001which is less than 0.05

Therefore, 0.001 < 0.05 so H1 is accepted. So there is significance difference between age and improve security. 6) Here the significance level is 0.001which is less than 0.05 Therefore, 0.001 < 0.05 so H1 is accepted. So there is significance difference between age and secure than password. 7) Here the significance level is 0.058 which is greater than 0.05 Therefore, 0.058 >0.05 so H1 is rejected. So there is no significance difference between age and health concern. 8) Here the significance level is 0.000 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between age and difficult to capture. 9) Here the significance level is 0.001 which is less than 0.05 Therefore, 0.001 < 0.05 so H1 is accepted So there is significance difference between age and face change over time. 10) Here the significance level is 0.000 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between age and constraint for sensor difficulty.

NO OF FAMILY MEMBER: [1] Ho: There is no significant difference between no. of family member and a standard part of modern life. H1: There is significant difference between no. of family member and a standard part of modern life. [2] Ho: There is no significant difference between no. of family member and reducing identity theft. H1: There is significant difference between no. of family member and reducing identity theft. [3] Ho: there is no significant difference between no. of family member and elimination of password use. H1: There is significant difference between no. of family member and elimination of password use. [4] Ho: There is no significant difference between no. of family member and fraudulent activity. H1: There is significant difference between no. of family member and fraudulent activity.

[5] Ho: There is no significant difference between no. of family member and improve security. H1: There is significant difference between no. of family member and improve security. [6] Ho: There is no significant difference between no. of family member and secure than password. H1: There is significant difference between no. of family member and secure than password. [7] Ho: There is no significant difference between no. of family member and health concern. H1: There is significant difference between no. of family member and health concern. [8] Ho: There is no significant difference between no. of family member and difficult to capture. H1: There is significant difference between no. of family member and difficult to capture.

[9] Ho: There is no significant difference between no. of family member and face changes over time. 0H1: There is significant difference between no. of family member and face changes over time. [10] Ho: There is no significant difference between no. of family member and constraint for sensor difficulty. H1: There is significant difference between no. of family member and constraint for sensor difficulty.

Descriptives 95% Confidence Interval for Mean Lower Bound 3.55 2.91 3.55 3.69 3.53 2.13 2.15 2.86 2.71 2.72 2.99 2.69 3.49 3.33 3.32 3.70 2.98 3.50 Upper Minim Bound um Maximum 4.25 3.41 3.92 4.12 3.77 3.02 2.72 3.24 3.29 2.98 3.71 3.20 3.83 3.77 3.56 4.35 3.40 3.83 1 1 1 2 1 1 1 1 1 1 1 1 1 1 1 2 1 1 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5

N 40 94 190 76 400 40 94 190 76 400 40 94 190 76 400 40 94 190

Mean 3.90 3.16 3.74 3.91 3.65 2.58 2.44 3.05 3.00 2.85 3.35 2.95 3.66 3.55 3.44 4.02 3.19 3.66

Std. Deviati on Std. Error 1.105 1.221 1.299 .941 1.229 1.394 1.396 1.312 1.254 1.352 1.122 1.256 1.188 .972 1.192 1.025 1.008 1.174 .175 .126 .094 .108 .061 .220 .144 .095 .144 .068 .177 .130 .086 .111 .060 .162 .104 .085

76 400 40 94 190 76 400 40 94 190 76 400 40 94 190 76 400 40 94 190 76 400 40 94 190 76 400 40 94 190 76 400

3.62 3.58 4.05 3.38 3.77 3.46 3.65 4.10 3.82 3.85 3.99 3.90 2.28 2.67 3.09 2.82 2.86 3.45 3.44 3.41 3.41 3.42 3.80 3.36 4.28 3.93 3.95 4.05 3.41 4.18 3.99 3.95

1.243 1.158 .932 1.137 1.224 1.148 1.179 1.429 1.510 1.337 1.270 1.374 1.261 1.363 1.229 1.440 1.327 1.061 1.249 1.168 1.180 1.175 1.091 1.286 5.320 1.135 3.780 1.108 1.534 1.002 1.101 1.211

.143 .058 .147 .117 .089 .132 .059 .226 .156 .097 .146 .069 .199 .141 .089 .165 .066 .168 .129 .085 .135 .059 .172 .133 .386 .130 .189 .175 .158 .073 .126 .061

3.33 3.47 3.75 3.15 3.60 3.20 3.53 3.64 3.51 3.66 3.70 3.76 1.87 2.39 2.91 2.49 2.73 3.11 3.18 3.24 3.14 3.30 3.45 3.10 3.52 3.67 3.58 3.70 3.10 4.04 3.74 3.83

3.90 3.69 4.35 3.62 3.95 3.72 3.77 4.56 4.13 4.04 4.28 4.03 2.68 2.95 3.27 3.14 2.99 3.79 3.69 3.57 3.68 3.53 4.15 3.63 5.05 4.19 4.32 4.40 3.73 4.32 4.24 4.07

1 1 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 45 5 45 5 5 5 5 5

Test of Homogeneity of Variances Levene Statistic Does it become a standard part of modern life Reduces identity theft Eliminates use of password Reduces fraudulent activities Improves security privacy More secure than password Health related problems Hard to capture Iris Face changes over time passage Age becomes a constraint 3.494 2.458 2.120 2.694 3.511 3.726 3.182 1.314 1.567 15.435 df1 3 3 3 3 3 3 3 3 3 3 df2 396 396 396 396 396 396 396 396 396 396 Sig. .016 .062 .097 .046 .015 .012 .024 .269 .197 .000

ANOVA Sum of Squares Does it become a Between Groups 31.596 df 3 Mean Square 10.532 F 7.299 Sig. .000

standard part of modern Within Groups life Total Reduces identity theft Between Groups Within Groups Total Eliminates use of password Between Groups Within Groups Total Reduces fraudulent activities Between Groups Within Groups Total Improves security privacy Between Groups Within Groups Total More secure than password Between Groups Within Groups Total Health related problems Between Groups Within Groups Total Hard to capture Iris Between Groups Within Groups Total Face changes over time Between Groups passage Within Groups Total Age becomes a constraint Between Groups Within Groups Total

571.404 603.000 28.634 700.366 729.000 33.173 533.387 566.560 23.535 511.905 535.440 18.737 536.263 555.000 3.204 750.386 753.590 27.226 675.652 702.877 .110 551.167 551.278 54.672 5645.426 5700.098 37.378 547.622 585.000

396 399 3 396 399 3 396 399 3 396 399 3 396 399 3 396 399 3 396 399 3 396 399 3 396 399 3 396 399

1.443

9.545 1.769 11.058 1.347 7.845 1.293 6.246 1.354 1.068 1.895 9.075 1.706 .037 1.392 18.224 14.256 12.459 1.383

5.397

.001

8.210

.000

6.069

.000

4.612

.003

.564

.639

5.319

.001

.026

.994

1.278

.281

9.010

.000

INTREPRETATION: 1)Here the significance level is 0.000 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between no. of family member and standard part of modern life. 2) Here the significance level is 0.001 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between no. of family member and reducing theft. 3) Here the significance level is 0.000 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between no.of family member and elimination of password used. 4) Here the significance level is 0.000 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between no. of family member and fraudutent activity. 5) Here the significance level is 0.003 which is less than 0.05 Therefore, 0.003 < 0.05 so H1 is accepted. So there is significance difference between no. of family member and improve security. 6) Here the significance level is 0.639 which is greater than 0.05 Therefore, 0.639 > 0.05 so H1 is rejected. So there is no significance difference between no .of family member and secure than password. 7) Here the significance level is 0.001 which is less than 0.05

Therefore, 0.001 < 0.05 so H1 is accepted. So there is significance difference between no. of family member and health concern. 8) Here the significance level is 0.994 which is greater than 0.05 Therefore, 0.994 > 0.05 so H1 is rejected. So there is no significance difference between no. of family member and difficult to capture. 9) Here the significance level is 0.281 which is greater than 0.05 Therefore, 0.281 > 0.05 so H1 is rejected. So there is no significance difference between no .of family member and face change over time.

10) Here the significance level is 0.000 which is less than 0.05 Therefore, 0.000 < 0.05 so H1 is accepted. So there is significance difference between no. of family member and constraint for sensor difficulty.

REDUCES IDENTITY THEFT

[1] Ho: There is no significant difference between use of bio metric technology and reducing identity theft. H1: There is significant difference between use of bio metric technology and reducing identity theft.

Descriptives Reduces identity theft 95% Confidence Interval for Mean N Workplace Bank Hospital Other Total 102 130 52 116 400 Mean 3.13 2.80 2.71 2.72 2.85 Std. Deviation Std. Error Lower Bound Upper Bound Minimum Maximum 1.369 1.366 1.226 1.355 1.352 .136 .120 .170 .126 .068 2.86 2.56 2.37 2.47 2.72 3.40 3.04 3.05 2.97 2.98 1 1 1 1 1 5 5 5 5 5

Test of Homogeneity of Variances Reduces identity theft Levene Statistic .984 df1 3 df2 396 Sig. .400

ANOVA Reduces identity theft

Sum of Squares Between Groups Within Groups Total 11.011 717.989 729.000

df 3 396 399

Mean Square 3.670 1.813

F 2.024

Sig. .110

INTREPRETATION: Here the significance level is 0.110 which is greater than 0.05 Therefore, 0.110< 0.05 so H1 is rejected. So there is no significance difference between bio metric technology and reducing identity theft.

OCCUPATION

[1] Ho: There is no significant difference between use bio metric technology and occupation. H1: There is significant difference between use bio metric technology and occupation.

Descriptives Bio-metric used 95% Confidence Interval for Mean N Student 181 Mean 2.49

Std. Deviation Std. Error Lower Bound Upper Bound Minimum Maxim 1.205 .090 2.31 2.66 1

Business Professional Service Total

81 58 80 400

2.30 1.76 3.05 2.46

1.018 1.031 .953 1.158

.113 .135 .107 .058

2.07 1.49 2.84 2.34

2.52 2.03 3.26 2.57

1 1 1 1

Test of Homogeneity of Variances Bio-metric used Levene Statistic 7.902 df1 3 df2 396 Sig. .000

ANOVA Bio-metric used Sum of Squares Between Groups Within Groups Total 58.665 476.525 535.190 df 3 396 399 Mean Square 19.555 1.203 F 16.251 Sig. .000

INTREPRETATION: Accordingly if the significance level is 0.05then it is accepted. So here the significance level is 0.162 which is greater than 0.05 Therefore, 0162 < 0.05 so H1 is accepted.

GENDER [1] Ho: There is no significant difference between bio metric technology and gender. H1: There is significant difference between bio metric technology and gender.

Descriptives Bio-metric used 95% Confidence Interval for Mean N Male Female Total 212 188 400 Mean 2.59 2.30 2.46 Std. Deviation Std. Error Lower Bound Upper Bound Minimum Maximum 1.150 1.150 1.158 .079 .084 .058 2.44 2.13 2.34 2.75 2.46 2.57 1 1 1 4 4 4

Test of Homogeneity of Variances Bio-metric used Levene Statistic .902 df1 1 df2 398 Sig. .343

ANOVA Bio-metric used Sum of Squares Between Groups Within Groups Total 8.758 526.432 535.190 df 1 398 399 Mean Square 8.758 1.323 F 6.621 Sig. .010

INTREPRETATION: Accordingly if the significance level is 0.05then it is accepted. So here the significance level is 0.11 which is greater than 0.05 Therefore, 011 < 0.05 so H1 is accepted.

(5) RECOMMENDENDATION By examining the sample size from near by cities we come to a conclusion that a proper awareness regarding the usage of the particular technology should be given to the users.

There should be solution for the problems which users face while using the bio metric technology.Many studies have considered using finger prints as an additional security measure but since the development of mobile banking there is an emphasis on the voice enabled security

which is an added advantage. According to a study by Mercator Advisory Group on payment authentication points out that "biometrics has been long on promise and short on delivery. The study has contributed both theoretically and academically, the paper brides the gaps in the existing literature and also recommends to implement voice enabled biometric authentication for better banking operations.

(6) CONCLUSION

The study was conducted to know theknowledge and perception of the user of biometric technology. The different factors that influence the perception regarding the user was security, password and privacy. Most of the users prefer bio metric technology due to ease of its use and many other relevant beneficiaries factors.

7.BIBLIOGRAPHY

Proquest www.wikipedia.org www.publicserviceeurope.com www.aabri.com/manuscripts/10512.pdf www.scribd.com www.slideshare.com www.google.com www.decisionsciences.org

ANNEXURE Dear sir/madam. We are the student of VM patel institute of management, GANPAT UNIVERSITY, Kherva. We are conducting survey under our research project of biometric technology user perception for the fulfillment of our MBA.Hence data provided by you will be kept confidential and exclusively used for academic purpose only

Q-1 Gender 1) Male [ Q-2 Age 1) Below 20[ 3)31-40 [ ] ] ] 2) 21-30[ ] 4)41-50[ ] ] 2) Female [ ]

5)51&Above [ Q-3. Occupation 1) Student[ ]

2) Business [] 4) Service[]

3) Professional [ ] Q-4 No. of family member 1) Below 2[ 3)4-5[ ] ]

2)2-3[

] ]

4) Above 5[

Q-5 Where is bio-metric technology currently being used? 1) Work Place [] 3) Hospital [ ] 2) Bank [ ] 4) Other []

Q-6 Pleaseindicate which one or more of the following bio-metric technology you have used before. 1) Fingerprint [ 3) Retina [ 5) Palm [ ] ] ] 2) Face [ 4) Signature [ ] ] ]

6) Voice [

Q-7 How often do you use bio-metric technology? 1) Always [ ] 2) Often [ ]

3) Sometimes [

4) Seldom [

Q-8 Does the bio- metric technology is becoming a standard part of modern life in commercial and government sectors? 1) Strongly Disagree [ ] 3) Neutral[ ] ] 2) Disagree [ ] 4) Agree [ ]

5) Strongly Agree [

Q.9 Belief towards biometric technology. Statement (1) Bio Metric technology is likely to reduce the identity theft. Strongly Disagree Disagree Neutral Agree Strongly Agree

(2) Bio Metric technology Is useful in eliminating the password use.

(3) Bio Metric technology Is useful to reduce the fraudulent activities.

(4) Bio Metric technology has the potential to improve security without compromising individuals privacy.

(5) Bio Metric technology is more secure than password.

Q.10 Problems of bio-metric technology. Statement Strongly Disagree Disagree Neutral Agree Strongly Agree

(1) Health concern with touching a sensor used by many individual.

(2) Difficult to capture iris for some individual (3) Face changes over time passage.

(4) Age becomes a constraint for sensor difficulty.

Вам также может понравиться