06 Chapter 6
06 Chapter 6
06 Chapter 6
“Information work is thinking work. And, when thinking and collaboration are
significantly assisted by computer technology, you have a digital nervous system. It
consists of the advanced digital processes that knowledge workers use to make better
decisions. To think, act, react, and adapt.”
Bill Gates, Microsoft
___________________________________________________________________________________ 77
Compiled by: Ilse Giesing
Submitted in fulfilment of the requirements for the degree MAGISTER COMMERCII (Informatics) in
the Faculty of Economic and Management Sciences at the University of Pretoria.
6.1 Introduction
This chapter provides a theoretical understanding of “Adoption of
technology”, addressing the research question: “How does a technology
adoption process work?” This chapter has the following sections:
q Discussing the impact of technology adoption, specifically user
perceptions related to biometric identification methods.
q Discussing a technology adoption model.
q Developing a specific Technology Adoption Model for the research study
problem stateme nt before moving on to the chapter’s summary and
conclusion sections.
___________________________________________________________________________________ 78
Compiled by: Ilse Giesing
Submitted in fulfilment of the requirements for the degree MAGISTER COMMERCII (Informatics) in
the Faculty of Economic and Management Sciences at the University of Pretoria.
potential for abuse has been limited, they may simply refuse to use it. Users
must perceive the biometric identification system as being usable, reliable and
not embarrassing to use (Torbet et al. 1995). Albrecht (2002b and 2003),
based on the findings of her study conducted in 2002 and 2003, lists a number
of criteria that could contribute to higher acceptance rates for biometric
implementations amongst users, which include:
1. Need for certain information – as mentioned before, users need to know
the following on the biometric methodology that is going to be used: how
the technology works, where the data is stored, which data is registered,
how the data is protected, who has access to the data and who is operating
the system.
2. Personal service and assistance – the way that users are given assistance
during their first contact with a biometric identification system is relevant
to its acceptance and their willingness to use it in future. A comprehensive
explanation of the system and good operating instructions will have a
positive influence on a user’s evaluation of the new technology.
3. Ergonomics of user facilities – the actual design of the biometric
identification system plays an important role. In addition to user
friendliness, the manner in which the biometric verification is initiated or
how the machine is operated is important. Natural and everyday motions
that need not be learned are most readily accepted.
4. Simplicity, convenience and speed – the actual operation must be as
intuitive and as simple as possible. The convenience, ease of use and the
actual duration of the verification are important to users.
___________________________________________________________________________________ 79
Compiled by: Ilse Giesing
Submitted in fulfilment of the requirements for the degree MAGISTER COMMERCII (Informatics) in
the Faculty of Economic and Management Sciences at the University of Pretoria.
Tatnall and Lepa (2003) conclude by stating that user adoption decisions of users have
little to do with any supposedly innate characteristics of new innovations, but rather in
specific uses of the innovation that relate to their social interactions and environment.
The golden rule to remember is that biometric identification methods should not be
forced upon users (Albrecht 2002b).
___________________________________________________________________________________ 80
Compiled by: Ilse Giesing
Submitted in fulfilment of the requirements for the degree MAGISTER COMMERCII (Informatics) in
the Faculty of Economic and Management Sciences at the University of Pretoria.
This section investigates a technology adoption model that deals with the
adoption and diffusion of technology in society and assesses its suitability for
the purposes of this research study. Many different models exist, e.g.:
1. Adopter-centered process oriented model
This technology adoption model deals with individual perceptions and
attitudes that form part of an adoption process (Pereira 2002) that could
have an impact on the user adoption of biometrics as an identification
method within Electronic Business.
2. Rogers model of diffusion of innovations
Rogers model of diffusion of innovations technology adoption model
deals with individual perceptions and attitudes and highlights that user
adoption is nothing more than a communication process, an information
seeking and processing activity (Rogers 1983).
But for the purpose of the research study Davis’s (1989) technology
acceptance model (TAM) has been selected, as it divides individual
perceptions and attitudes into perceived usefulness (PU) and perceived ease of
___________________________________________________________________________________ 81
Compiled by: Ilse Giesing
Submitted in fulfilment of the requirements for the degree MAGISTER COMMERCII (Informatics) in
the Faculty of Economic and Management Sciences at the University of Pretoria.
use (PEOU) and it is also one of the most widely used technology adoption
research models predicting Information Technology adoption.
Davis (1989) asks the question: “What causes people to accept or reject
Information Technology?” and answers the question by stating that individuals
tend to use or not use an application to the extent they believe it will help them
perform their job better; in other words, perceived usefulness (PU). He further
states that even if individuals believe that a given application is useful, they
may, at the same time, believe that the application is too difficult to use and
that performance of usage is outweighed by the effort of using the application;
in other words, perceived ease of use (PEOU).
___________________________________________________________________________________ 82
Compiled by: Ilse Giesing
Submitted in fulfilment of the requirements for the degree MAGISTER COMMERCII (Informatics) in
the Faculty of Economic and Management Sciences at the University of Pretoria.
Incorporating the above factors from the technology model selected for the
research study with the theoretical contribution sections in previous chapters
(Chapter’s 2-5) of the research study, leads to the Technology Adoption
Model below for the research study problem statement:
6.4 Summary
This chapter discussed Davis’s (1989) technology acceptance model (TAM)
that deals with the adoption and diffusion of technology in society, as it
continues to be of value for researchers trying to unlock the relationship
___________________________________________________________________________________ 83
Compiled by: Ilse Giesing
Submitted in fulfilment of the requirements for the degree MAGISTER COMMERCII (Informatics) in
the Faculty of Economic and Management Sciences at the University of Pretoria.
between human kind and technology. The model focuses on user perceptions,
which include perceived usefulness (PU) and perceived ease of use (PEOU),
which are two important factors that guide the adoption of unknown
technologies by users. This is due to the fact that these perceptions will either
create a favourable or unfavourable disposition in the user toward using the
innovation or not (Davis 1989). Davis (1989) postulates that individual
perceptions about “how-useful- is-this- for- me?” and “how-easy-is-it-to-use?”
are two important perceptions that influence the adoption of technology.
Incorporating the factors from the technology model selected for the research
study with the theoretical contribution sections in previous chapters (Chapter’s
2-5) of the research study, led to the compilation of a specific Technology
Adoption Model for the research study problem statement.
6.5 Conclusion
It was concluded in this chapter, the last chapter that formed part of the
theoretical understanding section, Chapter 6 – Adoption of Technology, that
user adoption decisions have little to do with any supposedly innate
characteristics of new innovations, but rather with specific uses of the
innovation that relates to their social interactions and environment. The above
factors from the technology model selected for the research study were
incorporated with the theoretical contribution sections found within previous
chapters (Chapter’s 2-5) of the research study to create the initial Technology
Adoption Model compiled for the research study problem statement.
This chapter has therefore, addressed the research question: “How does a technology
adoption process work?”
Before moving on to the exploratory field study section of the research study, it is
important to revisit what has been discussed so far as part of the theoretical
understanding section of the research study’s theoretical contribution process
(Eisenhardt 1998). The theoretical understanding was obtained from:
___________________________________________________________________________________ 84
Compiled by: Ilse Giesing
Submitted in fulfilment of the requirements for the degree MAGISTER COMMERCII (Informatics) in
the Faculty of Economic and Management Sciences at the University of Pretoria.
It was concluded that information provision (Rogerson and Fidler 1994) within an
organization has evolved through advances in Information Technology and the use of
computer-based Information Systems. Information Technology has had a radical
impact on Information Technology users, their work and their work environments. In
fact, Information Technology plays a role in many, if not most, of the everyday
operations of today’s organizations and has an underlying social nature (Chan 2002).
Technology creates new opportunities for organizations and people within an
organization, and it is developed by people for people; in other words, rooted within
human nature (Roode 1993).
Electronic Business, on the other hand, is open to the same social factors and user
perception obstacles as Information Technology, including the security of on-line
transactions, privacy considerations, trust amongst participants, legal implications,
etc. Electronic Business will only survive if the users feel that their privacy and
safety (Udo 2001) are protected and if trust (So and Sculli 2002) exist. For this to
occur, both security and privacy concerns have to be addressed simultaneously. Can a
foolproof identification system then perhaps provide a possible solution?
It was established that identification was always social rather than economical in
nature, but as the complexity of economic transactions developed the need arose for
accurate identification (Clarke 1994). A variety of means for identification are
available, but the key focus should be on establishing accurate identity. Therefore, for
the purpose of the research study, biometric identification methods were discussed as
the preferred means of identification, keeping in mind that the identity of an
individual and the use of biometric methods provokes many debates relating to social
___________________________________________________________________________________ 85
Compiled by: Ilse Giesing
Submitted in fulfilment of the requirements for the degree MAGISTER COMMERCII (Informatics) in
the Faculty of Economic and Management Sciences at the University of Pretoria.
factors such as privacy invasion, human rights etc (Soutar 2002). In essence, user
adoption decisions have little to do with any supposedly innate characteristics of new
innovations, but rather with specific uses of the innovation that relates to their social
interactions and environment; in other words, user perceptions. Therefore, a
technology adoption framework, as defined in this chapter, needs to be followed that
addresses user perceptions related to biometrics as an identification method within
Electronic Business.
The main focus of the exploratory field study section of the research study will be on
user perceptions related to biometric identification methods and on enhancing the
Technology Adoption Model compiled within this chapter. This will be done by
gathering user perceptions regarding the Internet, Electronic Business, biometrics and
user adoption via a questionnaire. In the next two chapters (Chapter 8 and 9) the
exploratory field study that has been undertaken will be reported on. These chapters
(Chapter 8 and 9) will attempt to address the following research questions as
identified through Roode’s (1993) process-based research framework for Information
Systems:
q What concepts do users have of what biometrics can do?
q How do users respond to biometrics?
q Do users respond differently to different kinds of biometrics?
q Why do users respond to biometrics in the way they do?
q Why would users adopt biometrics?
q How user perceptions, related to biometrics, should be taken into consideration to
ensure success with the implementation of identification through biometrics in
Electronic Business?
However, before moving on to the exploratory field study section of the research
study, it is necessary to first discuss interpretive research in more detail in Chapter 7 –
Research method.
___________________________________________________________________________________ 86
Compiled by: Ilse Giesing
Submitted in fulfilment of the requirements for the degree MAGISTER COMMERCII (Informatics) in
the Faculty of Economic and Management Sciences at the University of Pretoria.