A Study on the Intention to Use Biometric Authentication When Using Mobile Easy Payment Service : Focusing on the Comparison of Experienced and Non-Experienced Persons

2021 ◽  
Vol 23 (4) ◽  
pp. 1-22
Author(s):  
Jae-Seung Ju ◽  
◽  
Won-Boo Lee
2011 ◽  
Author(s):  
José Manuel Ortega Egea ◽  
María Victoria Román González

2015 ◽  
Vol 5 (3) ◽  
pp. 756-757
Author(s):  
Eun Young Kim ◽  
◽  
So Young Lee ◽  
Tae Youn Kim ◽  
Heewon Sung

2019 ◽  
Vol 118 (10) ◽  
pp. 216-223
Author(s):  
Nguyen Thi Ngan ◽  
Bui Huy Khoi

The purpose of the paper was to investigate the factors that influenced the intention to use coffee by using Adanco software. Survey data was collected from 284 consumers living in Ho Chi Minh City, Vietnam. The research model was proposed from the studies of the behavioral intention. The reliability and validity of the scale were tested by Cronbach's Alpha, Average Variance Extracted (Pvc) and Composite Reliability (Pc). PLS-SEM showed that intention to use coffee was affected by some components of the intention to use coffee.


2020 ◽  
Vol 2020 (8) ◽  
pp. 47-52
Author(s):  
Nataliya Kuznetsova ◽  
Tatyana Karlova ◽  
Aleksandr Bekmeshov

The work purpose consists in the efficiency increase of automated system operation for industrial enterprise resource protection at the expense of the optimization of authentication method application, in particular, biometric one. To achieve the purpose it is necessary to solve the problem of efficient joint use of modern authentication methods, particularly, a static and dynamic biometric authentication. But biometric methods are most expensive from the point of view of their realization. In this connection, within the limits of the paper there is carried out the analysis of modern methods of biological authentication from the point of view of a special order of introduction and joint use. In the paper there is shown a classification of static and dynamic methods for biometric authentication, an example of method combination in the authentication module is presented, there are considered and analyzed the latest methods, in particular, those based on DNA investigations, thermograms of a face and hands (static), gestures (dynamic). The work novelty consists in the presented diagram of authentication module operation. As a conclusion it should be noted that modern authentication systems offer the application of a complex approach: use both biometric methods and other ones for authentication in modules, in particular, based on secret knowledge and material carrier possession. The approach mentioned will allow minimizing the errors of the first and the second kinds, increasing a general level of safety.


Sign in / Sign up

Export Citation Format

Share Document