Next Article in Journal
Development of Eco-Friendly Cutting Fluid for Machining of AISI 1010 Steel in Automotive Industry
Next Article in Special Issue
360° Retail Business Analytics by Adopting Hybrid Machine Learning and a Business Intelligence Approach
Previous Article in Journal
Care Task Division in Familialistic Care Regimes: A Comparative Analysis of Gender and Socio-Economic Inequalities in Austria and Slovenia
Previous Article in Special Issue
Exploration of Lean Management Methods Used in Shared Services Centers, Drivers and Barriers to Process Selection for Improvements in the Light of Risk Management and ESG Reporting
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Biometrics Innovation and Payment Sector Perception

by
Barbara Mróz-Gorgoń
1,*,
Wojciech Wodo
2,
Anna Andrych
1,
Katarzyna Caban-Piaskowska
3 and
Cyprian Kozyra
4
1
Faculty of Management, Wroclaw University of Economics and Business, 53-345 Wroclaw, Poland
2
Department of Fundamentals of Computer Science, Wroclaw University of Science and Technology, 50-370 Wroclaw, Poland
3
Faculty of Design, Strzemiński Academy of Art Łódź, 91-726 Lodz, Poland
4
Department of Statistics, Wroclaw University of Economics and Business, 53-345 Wroclaw, Poland
*
Author to whom correspondence should be addressed.
Sustainability 2022, 14(15), 9424; https://doi.org/10.3390/su14159424
Submission received: 15 April 2022 / Revised: 9 July 2022 / Accepted: 13 July 2022 / Published: 1 August 2022

Abstract

:
This paper presents an analysis of innovations in the biometrics market, which have started to play a very important role in personal identification and identification systems. The aim of the study was to analyze current customs and opinions regarding payment methods, as well as to identify threats and opportunities for new biometric solutions in this area. First, the history of the biometrics market is presented. Acceptance patterns of new technologies are explored and modified. The authors used literature reviews, qualitative research (focus groups), and quantitative research (questionnaire survey) as methods. The main value and importance of biometrics is the uniqueness of biometric patterns (e.g., face, fingerprint, iris, etc.), which takes the security of these systems to a new level. The results of the quantitative study based on the qualitative survey show positive verification of the hypothesized reasons; e.g., importantly, that the age of potential users of biometric payments influences the fear about personal data. Fear of losing personal data affects the perceived safety of biometric payments. Perceived security has a very strong influence on attitudes towards biometric payments, which is the strongest predictor of behavioral intention to use biometric payments.

1. Introduction

1.1. Introduction to Biometrics

Biometrics is the field that deals with measuring the characteristics of living organisms, including humans of course, but also animals and plants. At the basis of the application of biometrics in the field of authentication and identification lies a number of characteristics of living organisms, which allow the unambiguous distinction of an individual against the population. When choosing a particular biometric trait, we should be guided by the following criteria:
-
Universality (almost every individual in the population has the trait);
-
Unambiguity/uniqueness (the feature is highly distinguishable in the group);
-
Persistence/variation over time (the trait does not degenerate over time);
-
Technical feasibility of acquiring (the trait can be read fairly easily);
-
Acceptability (cultural, religious concerns, sense of comfort and hygiene).
Biometric traits can be divided into physical/physiological and behavioral ones. Relating to the structure of individual parts of the body, e.g., iris patterns of the eye, the shape of a hand or ear, a fingerprint, face geometry or the shape of our veins, are the physiological features. Behavioral traits are developed and established during the maturation process of the individual and are related to their behavior, e.g., the way they walk, brain wave P300 (since brain waves have been proved to be unique enough across individuals to be used as biometrics), their handwritten signature (keystroking), or the characteristics of their voice (although sometimes the dual nature of this biometric is referred to). An example of a combination of both types of traits can be found in Figure 1.
Biometric security in the modern sense was born in the 19th century, thanks to the innovations of administrators, anthropologists, and French detectives [2]. The first known research publication on automated biometric recognition was Mitchell Trauring’s 1963 paper [3] in the journal Nature on fingerprint matching. The development of automated biometric systems based on other features, such as voice, face, and signature, also began in the 1960s. Subsequently, biometric systems based on features such as hand geometry and iris were developed. In this sense, almost 70 years have passed since the first paper on automated biometric recognition was published [4]. In Figure 2 there is a timeline of the development of the fingerprint; other biometric traits were investigated in quite similar timeframes in the 19th century.
Each biometric trait has its advantages, disadvantages, and limitations and these should be considered while selecting it for a given usage scenario. Due to the aforementioned characteristics of biometric traits, especially uniqueness, time invariability, and unambiguity, they should be considered as sensitive data and protected on multiple levels. The theft of raw biometric data can be used by an adversary to impersonate the victim and consequently gain unauthorized access or commit theft. The European Union, in its General Data Protection Regulation (GDPR), has addressed this issue and defined biometric data as particularly sensitive and has assigned to it the need for special protection [5]. Keeping the above in mind, raw biometric data should be treated with special care, which means primarily reducing its processing to a minimum. A fundamental solution to this issue is the use of so-called one-way processing [6], which generates from a sample of raw biometric data a template/profile/code that is an imprint of that data. Such a code still has individual properties and can be compared with others, so the idea of using biometrics is preserved. However, it is not possible to reconstruct the original biometric data only on its basis. This approach also protects the user in case the code database is leaked, because its use in a transformed form is negligible—similar to the case of password hashes. An example of iris encoding according to Daugman’s solution [7] can be found in Figure 3.
Referring to palmprints, biometric template protection methods, such as cancelable biometrics and a biometric cryptosystem, are essential to avoid direct disclosure of original palmprint features [8]. To strengthen user security, an approach based on so-called cancelable biometrics can also be used [9] in different types of biometrics. This solution is based on the ability to create multiple biometric identities from a single source data and to manage these identities. In a particular case, we can delete a given biometric identity and create another one based on its raw data. Such an application can be particularly useful when the database of the system in which the identity was used has been leaked or when we have a reasonable suspicion that someone is trying to impersonate that identity. When using the approach of cancelable biometrics, we usually need an additional source of external information beyond the biometrics itself so that we can modify the identity accordingly and combine it with biometric data. Such information can be, for example, a string of characters entered by the user, such as a password or PIN. Another existing method of template protection (used in palmprint biometrics) is a palmprint cryptosystem, which is the merging of biometrics and cryptography, which attempts to deploy biometrics as the authenticator of cryptographic applications, in which biometric features are claimed to be protected [8].
No matter how much effort is put into securing biometric data, at some point an adversary will manage to gain possession of it and try to use it to impersonate a legitimate user. This type of action is called a presentation attack, and the defense is presentation attack detection (PAD).
To counter such forgery attempts, liveness tests [10] are used, which are the basis of biometrics applications. A general scheme of how a biometrics-based security system works is shown in Figure 4. Liveness tests are designed to detect attempts to replace artificial objects—simulating real biometric features, including stolen biometrics converted into fake samples—photos, masks, recordings, etc. Any security system based on biometrics should place great emphasis on liveness testing and enforce high detection of substitution attacks. However, this is not an easy task as adversaries have increasingly more modern methods of defrauding at their disposal and are often extremely determined in demonstrating system weaknesses.
Applications of biometric solutions can be found in many fields, the most noteworthy being:
  • Authentication (1:1);
  • Identification (1:N);
  • Access control (entry/exit registration);
  • Continuous verification (real-time monitoring of biometric parameters);
  • Biometric link (e.g., link between a person and an identity document).
Some of the abovementioned applications have already been addressed earlier and will be described in more detail later in this article. However, now we would like to focus on the last two applications that undeniably distinguish biometrics from other security solutions.
Biometrics, in contrast to standard authentication or authorization mechanisms (e.g., based on the knowledge factor–password or PIN or based on the possession factor–hardware token) allows the introduction of continuous verification of the identity of the person using the system [11]. Thanks to the transparent collection of such biometric data as in the rhythm of typing (keystroking), the way a touch screen is used, or the continuous analysis of the image from a camera, the system is able to verify, on an ongoing basis, whether an authorized person is still using its resources [12]. None of the standard mechanisms based on passwords or hardware keys provides such ease and efficiency of real-time verification while maintaining a high level of usability.
The second specific application of biometrics mentioned is the ability to create a biometric link between the person to whom the identity document has been issued and the person who is currently using it [13]. This is another layer of security that allows us to link an individual to a specific identity document through biometric characteristics. Without the biometric layer, we would only be able to verify that the data inside the chip of the identity document is consistent with the printed data or manually confirm the similarity of the photo with the person who holds the identity document. By using biometrics, we can not only verify the integrity of the data in the physical and electronic layers, but also apply an algorithm that authenticates biometric features and compares the biometrics of the person holding the document with the pattern recorded inside the electronic layer of the document. This solution will significantly reduce the effectiveness of counterfeiting identity documents and the use of documents by people to whom the documents have not been issued. Finally, let us look at iris biometry. The first smartphone with an LED, which allows for the scanning of the iris of the eye, has appeared on the market (so far only in Japan) as a form of camera protection. The Arrows NX F-04G phone by Fujitsu is sold by the Japanese telecommunication operator DOCOMO. The innovative LED is manufactured by OSRAM [14].

1.2. Market of Biometrics

Market forecasts indicate that the biometric systems market will be worth nearly USD 33 billion by 2022 [15]. The global biometrics market value will rise from USD 33 billion in 2019 to USD 65.3 billion in 2024 [16]. According to analyst firm Global Markets In-sights, the biometrics-based security solutions market will be worth USD 50 billion by 2024 [17]. From a total value of USD 23.4 billion in 2018, the global biometrics technology market is expected to reach USD 71.6 billion by 2024 [18]. By 2024, healthcare applications will register a compound annual growth rate (CAGR) of 26.3%, airport and seaport applications 25.8%, financial services 25.1%, and government services 23.3%. Retail, gaming, and hospitality applications will also see CAGR growth of 23% and 22.8%, respectively [18]. For information on stocks of companies using biometrics, see [19] (p. 3). Figure 5 represents the rise of worldwide biometric technologies market (Figure 5) [20].
The prominent key players in the biometric system industry are: SA (France), NEC Corporation (Japan), Fujitsu Ltd. (Japan), BIO-Key International, Inc. (U.S.), Precise Biometrics AB (Sweden), Secunet Security Networks AG (Germany), Thales SA (France), Aware, Inc. (U.S.), Cognitec Systems GmbH (Germany), and Cross Match Technologies (U.S.), among others [21].
Nearly six in ten people polled in the United States cited some hesitation or concern with biometric authentication. The top concerns among those polled by Statista included concerns about data and that the technology is too easy to fool. Biometric authentication includes fingerprints, face recognition, iris scanners, and any voice recognition. The government end-user sector is currently leading the market. It captured a significant market share of around 48% in 2018 [22]. North America leads the global biometrics market in 2018 with a market share of around 30%, which is followed by Asia-Pacific and Europe. In North America, the requirements of biometrics are higher because of the rise in the demand for developed security precautions and tourist administration after the 9/11 attacks. In North America, the biometrics market has witnessed strong growth over the years, especially in law enforcement, forensics, and government activities. Biometric passports became compulsory for issuance of foreign passports as of 2016 in the U.S. One of the strongest laws regarding biometrics exists in Illinois, named the Biometric Information Privacy Act (BIPA), which forbids companies from collecting information without prior consent from an individual. The Asia-Pacific is also a speedily evolving region. The existence of developing economies such as India, China, South Korea, Japan, Malaysia, Singapore, and Australia, which are displaying increased acceptance of biometrics, is no doubt driving market growth [23]. Compound annual growth rate (CAGR) of the global biometric market is shown in Figure 6.

1.3. Biometrics in Poland

The development of biometric technologies and popularization of their use in Poland has been very dynamic, as shown by numerous studies and reports. Poland is a receptive market for technological innovations, where large numbers of companies implement and experiment with the latest applications of biometrics.
A study by Visa [25] shows that as much as 62% of the surveyed Polish consumers declared their willingness to use biometrics instead of a password to verify payments. Consumers in Poland appreciate that thanks to biometrics, they do not have to remember passwords or codes: 73% of the surveyed consumers thought that using biometric data was faster than passwords and 76% thought it was easier, while 92% of Polish consumers who took part in the survey believed that fingerprint recognition was the safest form of payment authentication. According to the report Global TMT Predictions 2018 [15] prepared by Deloitte, by the end of the year 29% of smartphone users will verify their identity by fingerprint, and 42% of all mobile devices will be equipped with a fingerprint reader. Currently, one in four (25%) participants of the Mastercard 2019 survey [26] uses biometrics (not only for authentication and payment), but if they had the option, they would use it every second (50%). Forty-seven percent of Polish e-consumers would prefer biometric authentication for card payments, both online and in physical stores. Those who indicated preference for this method would most willingly use the technology of fingerprint recognition, iris scan, voice recognition, or facial features analysis. Confirmation of a transaction with a fingerprint was considered safe by every fourth respondent (75%) in the Mastercard study. This was a higher result than in the case of one-time codes (66%). More than half of the respondents considered the technology of facial features recognition (54%) or other kinds of biometrics (53%) was safe.
The Polish payment market is developing very dynamically and is one of the most modern in Europe. In general, it is a society that relies on cashless payments [27].
A survey conducted by Ping Identity [17] shows that 92% of companies believe that the use of biometric methods is a very effective way to authenticate people and increase the security of data stored in company resources. It found 86% of the respondents thought that biometrics allowed for good security as access to information is stored in the cloud. However, currently only 28% of companies use biometric systems in their local infrastructure and 22% use them to secure access to applications and data stored in the cloud.
In 2019 MasterCard conducted research in the context of Polish consumers’ attitudes towards online shopping, taking into account upcoming changes in e-commerce payments. The result of this work was a report called “Safe e-commerce”. The authors prove that biometrics will become a standard for confirming identity in payments. Moreover, more than 75% of the respondents believed that strong online card payment authentication, which came into force in mid-September 2019, was needed, which clearly sets a new trend in banking [28].
Therefore, there is a need to popularize authorization mechanisms such as biometrics, which are a convenient and effective way to confirm identity [28]. Similar conclusions were drawn in the results of research conducted by MasterCard in 2019.
At the same time, the authors of [28] observed that technologies such as biometrics, e-identity services or cashless payments are not something extraordinary for the respondents, but rather a desirable direction of development and providing greater convenience and usability of digital banking systems. The respondents showed great confidence in financial institutions and entrusted their data and money to them, so it is up to them to ensure the highest possible protection of consumers’ identity and accumulated assets.
PayEye (https://payeye.com/, accessed on 2 October 2020) is a Polish fintech that introduced the world’s first such secure, convenient, and complete payment based system, for both payment acceptance and user identification, using iris biometrics. By combining technology with science, PayEye has created a whole, independent, and secure ecosystem, which consists of proprietary, innovative eyePOS terminals, an electronic wallet for users, algorithms which convert the iris into a biometric pattern and, in the future, also solutions for e-commerce.

1.4. Literature Review of Technology Acceptance Models

As mentioned previously in the paper, biometrics play a crucial role in many innovative systems. Each innovation is subject to the implementation process and as a result is or is not accepted by market participants. Many researchers emphasize that diffusion is a social process that occurs among people in response to learning about an innovation such as a new evidence-based approach for extending or improving health care. In its classical formulation, diffusion involves an innovation that is communicated through certain channels over time among the members of a social system [29,30]. Market practice aspects and research paradigms known as the diffusion of innovation (DOI) [31] can be applicable into the complex context of biometrics identification processes and its usage in payment systems.
Innovative biometric systems that incorporate biometric payments are rapidly becoming an important part of information technology (IT) and information systems (IS). The literature indicates that biometrics is becoming the standard of modern life, as commercial and governmental entities are rapidly adopting technology that promises increased security and better identification [32] (p. 314). Theoretical frameworks for technology acceptance are IS theories that model how users accept and use a particular technology. These theories suggest that when users are introduced to a new technology, many factors influence their decision about how and when they will use it [33].
It has been noted in the literature that the acceptance and use of information technology has been one of the priority issues in the research of information systems and practice since the late 1980s [34,35]. Building on the theory of reasoned action (TRA) formulated earlier by Fishbein and Ajzen [36], Davis [37] developed the technology acceptance model (TAM) and introduced it to the IS field. TRA has its roots in social psychology and attempts to explain why individuals engage in consciously intended behavior. In TAM, a user’s motivation to adopt a new technology can be explained by three constructs: perceived ease of use (PEU), perceived usefulness (PU), and attitude towards using the system [38].
IS and IT are becoming increasingly complex and crucial for business operations, thus making the issue of acceptance an important challenge in IT implementation [33]. Many models and theories have been introduced that examine the acceptance and use of information systems from past to present. The unified theory of acceptance and use of technology (UTAUT) is a model that explains the use of technology by 70% of society. It is also used to estimate the probability of success of a new technology and to evaluate the adoption of various technologies [39,40].
In the study of Venkatesh et al. [39], UTAUT comprises of four main factors. These are performance expectancy, social influence, effort expectancy, and facilitating conditions. In addition, UTAUT includes four intermediate individual variables, gender, age, experience, and voluntariness of use, which predict the relationship between primary factors and behavioral intention and use behavior. According to UTAUT, there are determining factors that directly affect intention or use in models combined within the UTAUT framework. These determining factors are called performance expectancy (PE), social influence (SI), effort expectancy (EE), and facilitating conditions (FC). According to the literature review, the FC are empirically identified as the direct determinant of adopting the behavior. These factors play a prominent role as direct determinants of user acceptance and usage behavior [40].
Part of this complexity of the acceptance issue in biometrics, especially in the con-text of payments, is the issue of security and privacy. Langenderfer and Linnhoff [32] in their work analyze the costs and shed light on how biometrics can negatively affect consumers. The authors point out that the rapid development of biometric authentication technology represents a double-edged sword for consumers. On the one hand, increased use of biometrics is likely to reduce identity theft, improve consumer convenience by eliminating or reducing the use of passwords, and lower prices by reducing fraud costs for retailers. On the other hand, while overall security is likely to be enhanced, security breaches will be more costly and require significantly more effort to remedy.
The level of security perception in the context of biometrics, as a matter of the individual characteristics, is strongly connected with the privacy issue. A wealth of existing theoretical work has suggested that privacy levels, along with privacy perceptions, regulation behaviors, and information disclosure, are inherently context-dependent and vary across situations [41,42]. As Masur [41] (p. 312) points out, “privacy is a subjective perception resulting from the characteristics of the environment in which an individual happens to be at a given time”.
It is also important to emphasize that research in IS has investigated the differences in levels of privacy concerns and their impact on a number of dependent variables such as willingness to provide information and intention to transact online [42,43,44]. Smith et al. [45], in their interdisciplinary review of privacy research, summarized existing privacy research into the antecedent–privacy concern–outcome (APCO) framework of information privacy, with privacy concerns as the central element, accompanied by antecedents and outcomes. Scientists also suggest that further research on the identification of the factors that contribute to privacy concerns is essential.
Several antecedents of privacy concerns have been found by Li [46] in the process of systematically reviewing existing empirical studies on privacy. The list of factors contains: (a) individual factors (demographics, personality traits, knowledge and experience, self-efficacy), (b) social factors (e.g., social norms), (c) organizational factors (privacy policies, website informativeness, company reputation), (d) macro-environmental factors (culture, regulatory structures), and (e) information contingencies (information sensitivity, type of information) [43,46,47]. Li [46] points out that for some factors (e.g., privacy experiences having a positive impact on privacy concerns), results have been cross-validated across studies, while for others (e.g., internet use and fluency and the big five personality traits), results have been inconsistent. Therefore, the researchers indicate that it is essential to conduct further research to examine the impact of different antecedents on privacy concerns [42].
Drawing on elements of DOI, the technology acceptance model (TAM), and a unified theory of acceptance and use of technology (UTAUT) along with the trust−privacy research field, Miltgen et al. [33] proposed an integrated approach that is both theoretically and empirically grounded. Their study examines individual acceptance of biometric identification techniques in a voluntary environment, measuring the intention to accept and further recommend the technology resulting from a carefully selected set of variables (Figure 7).
Research [33] confirms that the influence of known technology acceptance variables, such as compatibility, perceived usefulness, and facilitating conditions, on the acceptance of biometric systems and subsequent recommendations. Second, antecedent factors such as privacy concerns, trust in technology, and innovation also prove to be influential. Third, if not innovation, the most important factors explaining the acceptance and recommendation of biometric systems do not come from traditional adoption models (TAM, DOI, and UTAUT) but from the trust and privacy literature (trust in technology and perceived risk).
Miltgen et al. [33] in their paper pointed out that there are many other external factors that may influence responses that should be considered and investigated in the future, such as: ‘security perceptions of users of biometric systems’, ‘consumer characteristics’, ‘situational factors’, ‘product characteristics’, and ‘previous experiences’. The authors suggest that additional future research should investigate these ‘other’ factors and their impact on consumers’ behavioral intentions to accept new technologies in general and biometrics in particular.
On the basis of literature studies (both scientific literature and a review of journals, magazines, market reports), a research gap was identified. This gap concerns the need for further exploration of consumer attitudes towards biometrics, with particular emphasis on the use of iris biometrics in payment systems.

2. Materials and Methods

2.1. Methodology of the Qualitative Research

After reviewing the literature, we decided to use a qualitative research method to explore the research topic from the perspective of a defined scientific gap.
The aim of the study was to analyze current customs and opinions regarding payment methods, as well as to identify threats and opportunities for new biometric solutions in this area. Based on the process of studying literature, as well as the author’s own observations regarding the biometric market and its participants, we were able to formulate research questions:
  • What is the current situation referring to payment solutions and its image in the minds of customers?
  • What is the image and opinion of biometrics from the perspective of its usage in payment systems?
As a method of qualitative studies, we chose the FGI (focus group interview)—a well-known technique for collecting data in social sciences, which consists of conducting collective in-depth (semi-structured) intelligence in groups of 4–9 people (depending on the research area and organizational capabilities). We decided to focus on the newest form of biometric usage, which is iris-based biometrics (for now only available in Poland as a pilot project). We decided to choose this particular case because of its innovative nature and the effect of fresh opinions. A total of 4 focus groups meetings were conducted (November−December 2019), the shortest of which lasted 2.5 h and the longest almost 4 h. The participants were of different age groups, from different localities (both residents of small towns and big cities), and of different ages (the youngest was 17 and the oldest 74).
  • Focus I—4 women and 5 men predominate in focus groups;
  • Focus II—3 women and 3 men;
  • Focus III—5 women;
  • Focus IV—4 women and 3 men.
In conclusion, the gender differences in the focus studies conducted were as follows: 16 women and 11 men, for a total of 27 people. They were from different professions and lifestyles—high school students, housewives, secretarial managers, accountants, office workers (4 participants), sales, lawyers, entrepreneurs (3 participants were from businesses). All groups were surveyed without showing any type of biometric devices (no biometric payment tools).
According to the focus group participants, there were no apparent flaws in the current payment system (notably, this generation uses a card and a smartphone). There was enthusiasm about using smartphones as a payment option, especially among the younger generation. All participants stressed that biometric solutions are associated with risks of data leakage, health risks, “data hacking”, etc. The visualization of the most frequent word used in relation to eye biometrics during the focus research, marked by emotion, was definitely the word “fear”.
After the focus study, without the demonstration of a biometric device (iris-based), two focus studies with the demonstration of an identification device were conducted. After observing the first set of focus groups, we decided to divide the subsequent groups according to gender categories, as we noticed that due to the stereotype of a wider knowledge of technological issues in the male group, women kept their opinions to themselves and were not very open to sharing their thoughts. Due to this, the first meeting was a women-only meeting. These women represented different ages and professional categories:
-
Economics student—master’s degree;
-
Employee of a creative agency;
-
So-called housewife, however, conducting business;
-
Accountant;
-
Cashier;
-
Management student;
-
Bachelor’s degree/at the same time waitress;
-
Administrative employee of a small company (staff).
The age gap of the participants of the study (focus group) was 21–56 years old.
The first phase of the study looked similar to previous audio meetings: the issues of making payments, stressors, annoying and unpleasant payments were discussed (mainly queue times, breathing on the back of other customers, and lack of hygiene, whether using cash or card, “system jams”, “internet crashes”, and similar problems).
Participants declared that they mostly paid by card (plastic or smartphone) or cash. Another element of discussion was biometrics and their approaches to the use of biometric solutions in payments. In this area, there was a fairly strong element of doubt about biometric solutions, with survey participants associating them with gaining access to their accounts, and therefore lack of security surveillance, the possibility of copying fingerprints, and more than half of the survey participants stated (which was also important in this part) that they did not use biometric features at all and usually paid by card or cash, and used a code to identify themselves on their laptop or smartphone.
In the next part of the study, biometric equipment was presented. After a brief presentation, participants were encouraged to “encode” their eye on the device, which they were rather reluctant to do and even stressed about whether something could happen to their eyes.
In the next round, participants were able to check how the equipment recognized their iris. This step was welcomed more positively, although it must be said it was not met with great enthusiasm.
The final element was a discussion of other possible uses of the equipment. It is worth noting that participants strongly emphasized the health aspect—concerns were raised about the impact of eye scanning on health.
After the study, which took place with a female group, only male participants were intentionally invited to the second meeting. The format of the second focus group (except for different participants) was identical to the format of the stages (including the presentation of the device) in the female group. A total of eight participants, aged 21–54, representing different professions and industries took part in the second study:
-
Aviation/own business;
-
Film production;
-
Economics student;
-
Management student/bank employee;
-
Management representative;
-
Marketing director in a large international production and trading company;
-
Construction worker;
-
Rock musician.
There were noticeable differences in the observations in this male group compared to the female group, the most important being:
-
No strong emphasis on health and hygiene aspects;
-
No problem with searching for their wallet, phone, card in their pockets (for objective reasons) as aspects of everyday life.

2.2. Methodology of the Quantitative Research

A survey was conducted in order to verify and extend the main results of the qualitative research and the observed dependencies. A questionnaire was prepared during a brainstorming session based on the results of qualitative research and the authors’ own observations. A pilot survey was used to verify this model. The sample size was planned for a minimum of two hundred respondents, and social platforms were selected as the distribution channel for the questionnaire. For the pilot study, the respondents were not selected randomly, but the aim was to find representatives of working age for the sample. A list of analyzed items in the questionnaire is presented in the Appendix A of Table A1.
The statistical analysis was based on measures of dependence between the variables: mainly on the correlation matrix, and also on cross tables, e.g., for binary variables. Exploratory factor analysis (EFA) and confirmatory factor analysis (CFA) were used for the groups of questionnaire items, and for the variables grouped by EFA, a reliability analysis was performed using the Cronbach’s alpha coefficient. Dependencies between constructs based on a linear correlation matrix were analyzed using path analysis within a structural equation model (SEM) to verify the significance of direct and indirect causality.
Due to the indicated research area, on which the research presented in this article focuses (biometric innovations in the payment sector), the model of hypothetical dependencies was based on the analysis of literature studies, including the presented UTAUT model, as well as qualitative research conducted by researchers. Such research procedures made it possible to derive and consequently define a new, proprietary model of hypothetical dependencies, which is presented in Figure 8. Our own observations and conducted qualitative research on the perception of biometric payments using the iris of the eye (BP) allowed us to prepare a set of hypotheses that lead to the acceptance model of BP verified in this study. The observation about the strong influence of consumer age on BP acceptance is due to the fact that age is the main exogenous variable in the first stages of diffusion of this type of innovation. Thus, age is not only an impact moderator, but also a primary predictor. The main target variable is the behavioral intention to accept and use BP (but not yet recommend BP due to the novelty of the technology), as described in the literature models.
During the process of discussion, we formulated direct causes between variables, marked with arrows in Figure 8. The directions of the relationships between the variables of the model are presented in Table 1 together with the content of the hypotheses.
The measurements of variables were constructed from questions presented in the Appendix A of Table A1. Predicted behavioral intention to accept and to use BP was measured as the sum of binary items numbered 18 and 19a–19d from Table A1. Three variables are measured with only one question:
(1)
Self-reported perceived safety (item 9) was understood as the inverse of perceived risks from the model shown in Figure 7;
(2)
Self-reported attitude towards BP (item 8) was understood as one of the main mediators predicting behavioral intention to accept and to use BP, rather shaped by other predictors and not initially trust (component of the model) presented in Figure 7;
(3)
Replacement in future (item 20) was a stated belief about payments that may also be shaped by unmeasured science fiction in literature and films.
The three variables from the UTAUT model (perceived ease of use, perceived usefulness, and facilitating conditions) were considered during the preparation of the questionnaire as combining into a single latent variable called perceived use and facilitating conditions, measured as the sum of items 21–26 from Table A1. Importance of innovative payments was measured by the sum of items 3 and 4; not only biometric payments in their initial use in society (in real shops), but also mobile payments (e.g., codes generated in banking applications used mainly online in online shops), contrasting with traditional cash payments and the very popular card payments. Fear about personal data was measured as the sum of items 10–12 from Table A1 and is understood as concern about data privacy from Figure 7. Fear of barriers in life was measured as the sum of items 13–17, understood as social problems (the inverse of social influence from the UTAUT model or social incompatibility used as inverse in the DOI theory shown in Figure 7). Knowledge and experience was measured as the sum of binary items 5 and 7a–7d and shows respondents’ acquired knowledge of BP. By constructing the model shown in Figure 8, discussing what is cause and what is effect, the direction of the hypotheses shown in Table 1 was decided. Comparing Figure 8 with the model shown in Figure 7, the only thing missing from the model in Figure 8 is the perceived innovativeness of biometrics, but this was evident for payments. Statistical software Statistica 13.3 [48] was used to analyze the collected survey data to assess the measurement of latent variables and to verify the hypotheses.

3. Results

3.1. Qualitative Research

From a consumer’s perspective, biometric authentication offers many advantages. Once enrolled in a biometric system, the customer is instantly untroubled by the fraudulent use of their credit cards. Payments can be easily made without carrying any cash or other forms of identifiers and in this case the only thing required is their fingerprints. They can be certain that if their car or computer is stolen, it will be worthless to all except the most sophisticated thieves since access is biometrically controlled; in consequence this leads to a decrease in the impetus for theft. The bothersome task of remembering passwords could be considered a thing of the past.
As the general conclusions of the preliminary qualitative studies carried out, we point out the skeptical approach to biometric solutions in payment systems.
It is necessary in the future to indicate market concerns about novelties, but to seek innovation to assuage numerous consumer concerns about the introduction of biometric applications with important implications for marketing communication associations with nature, simplicity, and naturalness. There is a need to promote biometric solutions in the educational form.

3.2. Quantitative Research

Continuing with the qualitative research, results were collected from the questionnaire. Most analyses (EFA, CFA, reliability analysis, SEM) were based on a linear correlation matrix where most values are significantly different from zero (hard to publish because of matrix size, but available upon request from the corresponding author). The number of observations was 200, which is not a very large number to verify such complex hypothesis models. The age of the respondents was the only objective variable analyzed, the others being subjective or behavioral variables. The mean age was 28.7 years, and the standard deviation was 9.2. The respondents were rather young people: the minimum age was 17 years, and the maximum was 61 years, so the sample included representatives of almost the entire working age range.
Factor analysis of variables with Likert-type response scales confirmed the three measurement scales for fear concerning personal data, fear of barriers in life, and perceived use and facilitating conditions developed from the questionnaire items in Table A1; e.g., the EFA scree plot reduced the dimensions to three and the CFA fit was rather good.
Following the strict methodology of Song et al. [49,50,51,52], before proceeding to testing the hypotheses H1–H9, we checked the reliability of scales and measurement items.

3.3. Reliability and Validity

As a measure of reliability, that is, the internal consistency of the measurement items of the survey, we used Cronbach’s alphas, as given in Table 2. All the values were above the threshold 0.7 (the minimum value was 0.830); that is, the scale may be regarded as reliable.
We also investigated the correspondence between the constructs and their operationalization. This constitutes four components: analysis of unidimensionality, convergent validity, discriminant validity, and nomological validity.
To investigate the unidimensionality of the scale, we performed CFA to examine whether the indicators were assigned to the constructs adequately. Using the maximum likelihood method of estimation, we obtained a satisfactory result, including fit indices, presented in Table 3. As chi-square/d.f., it should range between 1 and 5, so our result fitted well within that. GFI and AGFI should exceed 0.9; the latter in our research was a bit below this threshold. RMSEA should range between 0.05 and 0.08, and the value for our research fitted well. SRMR, which should be below 0.08, equaled 0.054 and was below the threshold. Incremental fit indices, NFI (normed fit index), IFI (incremental fit index), TLI (Tucker–Lewis index), and CFI (comparative fit index) were above the threshold of 0.9 apart from NFI, which is slightly below. Overall, we regard the result of this investigation as satisfactory to accept the unidimensionality of the scale.
As for convergent validity, which we present in Table 4, standardized factor loadings should be above a 0.5 threshold, and all were well above this (the minimum was equal to 0.678), while AVE (average variance expected) should also be above 0.5, and within our research all values were above this. Thus, we may conclude that the convergent validity is acceptable.
For discriminant validity, we calculated the correlation coefficients between constructs (presented in Table 4). Squares of those values should not exceed the minimum AVE. The only statistically significant coefficient of correlation, 0.456, was low enough and its square (0.208) was much lower than the minimum AVE (0.569). Thus, discriminant validity is satisfactory.
Nomological validity refers to possible collinearity and mutual dependencies of constructs. As the highest correlation coefficient was not too high, we did not expect this effect; still, we calculated variance inflation factors (VIF) to check whether they were below the commonly used threshold of 10. All values were well below it (between 1 and 2); thus, we conclude that the nomological validity of our research is acceptable.
The reliability coefficient for behavioral intention to accept and to use BP was 0.719 and was sufficient—the Kuder-Richardson Formula 20 (KR-20) for binary variables is equivalent to Cronbach’s alpha). However, the reliability of the knowledge and experience measure was insufficient as the KR-20 was equal to 0.419 for the sum of items 5 and 7a–7d from Table A1 and 0.489 for the sum of items 5–6 (overall experience with BP). A new research question arises: is it possible to combine two characteristics (1) knowledge and (2) experience into one variable? Inferences about knowledge and experience may be distorted by random measurement error; also, the reliability of importance of innovative payments measurement was insufficient: KR-20 was equal to 0.448, so conclusions about this variable may be biased by random error.
The hypotheses in Table 1 were verified in a structural equation model, and its parameters together with the conclusions regarding the hypotheses are presented in Table 5. The fit of this model was not sufficient (SRMR = 0.176, RMSEA = 0.175, GFI = 0.843, AGFI = 0.668, NFI = 0.650, CFI = 0.670), so this complex model should be improved or simplified. However, the estimated parameters and their p-values when tested equal to zero are reason to make preliminary inferences about the hypotheses that make up the model shown in Figure 8.
Most of the hypotheses have been positively verified (p-value less than 0.05), some of them forming a cause and effect sequence: e.g., age had a positive effect on fear about personal data. Fear about personal data had a negative effect on perceived safety. Perceived safety had a very strong positive effect on attitude towards BP, which was the strongest predictor having a positive effect on behavioral intention to accept and to use BP. Hypotheses in which the p-value of the estimated parameter was very close to the significance level of 0.05 were classified as “almost verified”. Three hypotheses were rejected due to the insignificance of the parameter estimate (not significantly different from zero). The rejection of H3a is very interesting because the sign of the estimated parameter was opposite to the hypothesized one—a reason to investigate the relationship between the measured variables. Positive verification of the hypotheses can also provide a basis for recommendations on how to manage BP to gain greater acceptance and use in society, alleviating various concerns and balancing them with utility and facilitating conditions.

4. Discussion and Conclusions

Respondents have begun to understand the need to use biometrics, trust it more, and appreciate the benefits it brings. It can be inferred from the responses that users feel the need to increase the level of security. The most common indications were greater use of biometrics, such as fingerprints and iris scans. Such solutions inspire confidence in respondents, regardless of their age and experience in e-banking. This was indicated by both younger and older people. Based on some of the interviews, there is also an image of a person for whom convenience is definitely more important than security. Such a person would gladly give up, for example, confirming actions with SMS codes. This opens the path for the popularization of biometric solutions [53]. However, the connection to new emotional aspects of BP is similar to the connection of psychological aspects to TAM and UTAUT, as presented in work of Koufaris [54] on online shopping.
Reading the results of recent studies in the BP sector shows a similar importance of the attitude variable, shaped by other predictor variables, such as in the study of behavioral intention to use BP reviewed by Moriuchi [55]. Such an important role is played by the attitude variable in the presentation of the research conducted by Rosén et al. [56]. In the research model used by Zhang and Kang [57], perceived usefulness plays a similar role as a mediator in predicting intention to use BP, but also safety is very important, as are concern for personal information and perceived safety in the research model reviewed in this article. The inverse of safety (perceived risk) also plays an important role in the BP model verified by Liu and Tu [58]. In the work of Hizam et al. [59], social influence and perceived system quality are added to TAM as predictors—good functioning of BP systems is also measured by perceived user conditions and facilitation, as well as fear of barriers in the model verified in this paper.
Our study has many limitations to generalize the results—the sample is only from Poland and is rather too small to verify such a complex model of behavioral intention to use BP. New analyses could be conducted on the basis of this data, e.g., investigating the influence of gender on emotional variables such as fear about personal data or perceived safety, or their moderating role in predicting intention to use BP. Future research is planned on a more representative random sample of working-age members of the public (average age is likely to be much higher), with a minimum number of respondents of one thousand. The complex model will also be simplified, and some analysis should be applied so that the model with direct and indirect causes is better suited to predicting intention to use BP. The main results of this pilot study should be verified in new analyses. The measurement of some constructs (especially without sufficient reliability) could be improved by using measurement scales tested in the literature. Biometric data is so important that consumers are very often unsure whether they can terminate their agreed use of BP and remove their own data from the consumer database. Compared to other technologies, biometrics combines technological innovation with biology and is even similar to medical technologies. Fear about personal data as one of the important variables can be the basis of a cluster analysis of potential consumers using BP, carried out to place the BP market in the BP-open part of society. Conspiracy mentality [60] should also be measured as one of the reasons for avoiding BP. Well measured general openness (or curiosity) to new and innovative technologies could also be added to the models. The research procedure made it possible to derive and define a new, proprietary model of hypothetical dependencies, which is presented in the paper, that along with the analysis and systematization of knowledge of the biometric market, as well as undertaking innovative research in the field of the payments market using biometrics, should be considered the main contribution of this article.

Author Contributions

Conceptualization, B.M.-G., C.K. and W.W.; methodology, C.K. and B.M.-G.; software, C.K.; validation, C.K.; formal analysis, C.K. and B.M.-G.; investigation, B.M.-G., A.A. and W.W.; resources, B.M.-G., W.W. and A.A.; data curation, B.M.-G., A.A. and C.K.; writing—original draft preparation, W.W., B.M.-G. and C.K.; writing—review and editing, B.M.-G., W.W., A.A., K.C.-P. and C.K.; visualization, B.M.-G., A.A. and C.K.; supervision, B.M.-G.; project administration, K.C.-P. and B.M.-G.; funding acquisition, B.M.-G. All authors have read and agreed to the published version of the manuscript.

Funding

The APC was subsidized by the Ministry of Science and Higher Education.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The dataset presented in the study is available upon request from the corresponding author.

Acknowledgments

The authors would like to thank cooperating students at the University of Wrocław for their help in the process of quantitative research procedure and members of “proMOTION”-students marketing association at the Faculty of Management, Wroclaw University of Economics and Business, for their technical support in organizing the qualitative research.

Conflicts of Interest

Although B.M.-G., A.A. and W.W. cooperate with PayEye, they are not employed by PayEye, nor do they have any shares in the company. In addition, care has been taken to ensure that all data and information contained in the text do not raise conflicts either on legal or ethical grounds.

Appendix A

Table A1. Questionnaire items used in quantitative analysis.
Table A1. Questionnaire items used in quantitative analysis.
No. QuestionAnswering
  • How important are these payment methods in your daily purchases? [cash]
5 point Likert-type scale
2.
How important are these payment methods in your daily purchases? [card]
5 point Likert-type scale
3.
How important are these payment methods in your daily purchases? [mobile]
5 point Likert-type scale
4.
How important are these payment methods in your daily purchases? [biometric]
5 point Likert-type scale
5.
Do you what biometric payment is?
yes/no
6.
Have you ever used biometric payments?
yes/no
7.
What kind of biometric payments have you used [a: finger, b: face, c: eye, d: voice]?
selection
8.
What is your attitude towards biometric payments?
5 point Likert-type scale
9.
Do you think biometric payments are safe?
5 point Likert-type scale
10.
What are your main concerns about biometric payments? [how data is stored]
5 point Likert-type scale
11.
What are your main concerns about biometric payments? [how data is used]
5 point Likert-type scale
12.
What are your main concerns about biometric payments? [possibility of personal data theft]
5 point Likert-type scale
13.
What are your main concerns about biometric payments? [lack of legal regulations]
5 point Likert-type scale
14.
What are your main concerns about biometric payments? [technological errors (e.g., data not detected)]
5 point Likert-type scale
15.
What are your main concerns about biometric payments? [low number of sites accepting biometric payments]
5 point Likert-type scale
16.
What are your main concerns about biometric payments? [lack of knowledge about biometric payments]
5 point Likert-type scale
17.
What are your main concerns about biometric payments? [discomfort with using biometric data in public]
5 point Likert-type scale
18.
Would you like to use biometric payments on a daily basis?
yes/no
19.
What kind of biometric payment system would you like to use? [a: finger, b: face, c: eye, d: voice]?
selection
20.
Do you think biometric payments will replace current payment methods?
4 point Likert-type scale
21.
Which of these factors do you think are driving the use of biometric payments? [security]
5 point Likert-type scale
22.
Which of these factors do you think are driving the use of biometric payments? [ease of use]
5 point Likert-type scale
23.
Which of these factors do you think are driving the use of biometric payments? [no need to remember passwords and pin numbers/no]
5 point Likert-type scale
24.
Which of these factors do you think are driving the use of biometric payments? [it is not possible to lose the identification method]
5 point Likert-type scale
25.
Which of these factors do you think are driving the use of biometric payments? [environmental friendliness]
5 point Likert-type scale
26.
Which of these factors do you think are driving the use of biometric payments? [speed of service]
5 point Likert-type scale
Demographics
27.
Age
number
28.
Gender [female, male, other, not to show]
selection
29.
Education [primary, secondary, vocational, tertiary, higher]
selection
30.
Occupational status [working, jobless, student, retired]
selection
31.
Monthly household income per person (approximate net amount)
number

References

  1. Kodituwakku, S. Biometric authentication: A review. Int. J. Trend Res. Dev. 2015, 2, 113–123. [Google Scholar]
  2. Maguire, M. The birth of biometric security. Anthr. Today 2009, 25, 9–14. [Google Scholar] [CrossRef] [Green Version]
  3. Trauring, M. Automatic Comparison of Finger-Ridge Patterns. Nature 1963, 197, 938–940. [Google Scholar] [CrossRef] [PubMed]
  4. Jain, A.K.; Nandakumar, K.; Ross, A. 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognit. Lett. 2016, 79, 80–105. [Google Scholar] [CrossRef]
  5. European Parliament, Council of the European Union. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation). Available online: https://eur-lex.europa.eu/eli/reg/2016/679/oj (accessed on 14 April 2022).
  6. Sutcu, Y.; Sencar, H.T.; Memon, N. A secure biometric authentication scheme based on robust hashing. In Proceedings of the 7th Workshop on Multimedia and Security, MM & Sec ‘05, New York, NY, USA, 1 August 2005; Eskicioglu, A., Fridrich, J., Dittmann, J., Eds.; ACM Press: New York, NY, USA, 2005; pp. 111–116, ISBN 1-59593-032-9. [Google Scholar]
  7. Daugman, J.G. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell. 1993, 15, 1148–1161. [Google Scholar] [CrossRef] [Green Version]
  8. Leng, L.; Teoh, A.B.J. Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault. Pattern Recognit. 2015, 48, 2290–2303. [Google Scholar] [CrossRef]
  9. Manisha; Kumar, N. Cancelable Biometrics: A comprehensive survey. Artif. Intell. Rev. 2020, 53, 3403–3446. [Google Scholar] [CrossRef]
  10. Akhtar, Z.; Micheloni, C.; Foresti, G.L. Biometric Liveness Detection: Challenges and Research Opportunities. IEEE Secur. Priv. 2015, 13, 63–72. [Google Scholar] [CrossRef]
  11. Stylios, I.C.; Thanou, O.; Androulidakis, I.; Zaitseva, E. A Review of Continuous Authentication Using Behavioral Biometrics. In Proceedings of the South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, Acm Seeda-Cecnsm Conference, Kastoria, Greece, 25 September 2016; Association of Computing Machinery (ACM): New York, NY, USA, 2016; pp. 72–79, ISBN 978-1-4503-4810-2. [Google Scholar]
  12. Rybnicek, M.; Lang-Muhr, C.; Haslinger, D. A roadmap to continuous biometric authentication on mobile devices. In Proceedings of the 2014 International Wireless Communications and Mobile Computing Conference (IWCMC 2014), Nicosia, Cyprus, 4–8 August 2014; pp. 122–127, ISBN 978-1-4799-0959-9. [Google Scholar]
  13. Schimke, S.; Kiltz, S.; Vielhauer, C.; Kalker, T. Security Analysis for Biometric Data in ID Documents. In Proceedings of the SPIE-IS&T Electronic Imaging-Security, Steganography and Watermarking of Multimedia Contents VII, SPIE. Electronic Imaging, San Jose, CA, USA, 21 March 2005; Delp, E.J., III, Wong, P.W., Eds.; Volume 5681, pp. 474–485. [Google Scholar]
  14. Usidus, M. Biometria Współcześnie. Czy Te Oczy Mogą Kłamać? Młody Technik, 25 October 2017; 47–55. [Google Scholar]
  15. Interia Biznes. Biometria Stanie Się Standardem. Available online: https://biznes.interia.pl/finanse/news-biometria-stanie-sie-standardem,nId,4056136 (accessed on 14 April 2022).
  16. Markets and Markets. Biometric System Market with COVID-19 Impact Analysis by Authentication Type (Single Factor, Fingerprint, Iris, Face, Voice; Multi-Factor), Type (Contact-Based, Contactless, Hybrid), Offering Type, Mobility, Vertical & Region-Global Forecast to 2027. Available online: https://www.researchandmarkets.com/reports/5201287/global-biometric-systems-market-with-covid-19 (accessed on 30 March 2022).
  17. Pawłowicz, W. Oko w Oko z Biometrią. Available online: https://www.computerworld.pl/news/Oko-w-oko-z-biometria,415096.html (accessed on 14 April 2022).
  18. Pascu, L. Global Biometrics Market to Reach $71.6B by 2024 on Demand for Emerging Tech: Report. Available online: https://www.biometricupdate.com/202008/global-biometrics-market-to-reach-71-6b-by-2024-on-demand-for-emerging-tech-report (accessed on 14 April 2022).
  19. O’Neil King, R.; Burt, C. Biometrics in Healthcare. Available online: https://www.biometricupdate.com/wp-content/uploads/2017/04/special-report-global-biometric-healthcare.pdf (accessed on 14 April 2022).
  20. Sava, J.A. Global Biometric System Market Revenue in 2020 and 2025 (in Billion U.S. dollars). Available online: https://www.statista.com/statistics/1048705/worldwide-biometrics-market-revenue/ (accessed on 8 November 2020).
  21. Market Research Future. Biometric System Market, By Component (Hardware, Software), By Authentication Type (Single Factor Authentication, Multifactor Authentication), By Function (Non-Contact, Others), By Application (Government, Commercial, Healthcare)—Forecast 2027. Available online: https://www.marketresearchfuture.com/reports/biometric-system-market-3754 (accessed on 14 April 2022).
  22. Feldman, S. Biometric Technology: Majority in U.S. Argue Against Biometric Tech. Available online: https://www.statista.com/chart/18052/biometric-technology-opinion-poll/ (accessed on 8 November 2020).
  23. Amarnani, S. Global Biometrics Market Forecast 2019–2027. Global Biometrics Market by Type (Fixed, Mobile) by Verticals (Government, Transportation, Healthcare, Banking Financial Services & Insurance (Bfsi), Retail, Other Verticals) by Technology (Fingerprint Recognition, Iris Recognition, Facial Recognition, Hand Geometry, Vein Analysis, Voice Recognition, Dna Analysis, Gait Analysis, Electroencephalogram (Eeg)/Electrocardiogram (Ecg), Other Technologies) by Geography. Available online: https://inkwoodresearch.com/reports/global-biometrics-market/ (accessed on 14 April 2022).
  24. Wadhwani, P.; Gankar, S. Biometrics Market Size By Technology (Face, Fingerprint, Palmprint, Iris, Voice, Signature), By End-Use (BFSI, Government & Defense, Aerospace, Automotive, Consumer Electronics, Healthcare, Retail & E-Commerce), COVID-19 Impact Analysis, Regional Outlook, Growth Potential, Competitive Market Share & Forecast, 2021–2027. Available online: https://www.gminsights.com/industry-analysis/biometrics-market (accessed on 8 November 2020).
  25. Visa Research. Biometria. Jak to Działa I Czy Warto Z Niej Korzystać? Available online: https://www.visa.pl/visa-everywhere/blog/bdp/2020/06/19/biometria-jak-to-1592575916129.html (accessed on 14 April 2022).
  26. Mastercard. Badanie Mastercard: Biometria Stanie Się Nowym Standardem Potwierdzania Tożsamości W Płatnościach. Available online: https://www.mastercard.com/news/europe/pl-pl/centrum-prasowe/informacje-prasowe/pl-pl/2019/czerwiec/badanie-mastercard-biometria-stanie-sie-nowym-standardem-potwierdzania-tozsamosci-w-platnosciach/ (accessed on 14 April 2022).
  27. Nowakowski, M. Kiedy Zniknie Gotówka I Będziemy Płacić Twarzą Lub Głosem? Available online: https://alebank.pl/kiedy-zniknie-gotowka-i-bedziemy-placic-twarza-lub-glosem/?id=321164&catid=33333&cat2id=625&cat3id=25924 (accessed on 14 April 2022).
  28. Wodo, W.; Stygar, D.; Winiarska, K. Bezpieczeństwo Systemów Bankowości Elektronicznej I Mobilnej W Polsce. Badania Użytkowników 2019; Politechnika Wrocławska: Wrocław, Poland, 2019; ISBN 978-83-7493-109-0. [Google Scholar]
  29. Rogers, E.M. Diffusion of Innovations, 5th ed.; Free Press: New York, NY, USA, 2003; ISBN 978-0-7432-2209-9. [Google Scholar]
  30. Dearing, J.W.; Cox, J.G. Diffusion of Innovations Theory, Principles, And Practice. Health Aff. 2018, 37, 183–190. [Google Scholar] [CrossRef]
  31. Bhatti, Y.; Olsen, A.; Pedersen, L.H. Administrative Professionals and the Diffusion of Innovations: The Case of Citizen Service Centres. Public Adm. 2011, 89, 577–594. [Google Scholar] [CrossRef]
  32. Langenderfer, J.; Linnhoff, S. The Emergence of Biometrics and Its Effect on Consumers. J. Consum. Aff. 2005, 39, 314–338. [Google Scholar] [CrossRef]
  33. Miltgen, C.L.; Popovič, A.; Oliveira, T. Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context. Decis. Support Syst. 2013, 56, 103–114. [Google Scholar] [CrossRef]
  34. Venkatesh, V.; Bala, H. Technology Acceptance Model 3 and a Research Agenda on Interventions. Decis. Sci. 2008, 39, 273–315. [Google Scholar] [CrossRef] [Green Version]
  35. Venkatesh, V.; Thong, J.Y.L.; Xu, X. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology. MIS Q. 2012, 36, 157–178. [Google Scholar] [CrossRef] [Green Version]
  36. Fishbein, M.; Ajzen, I. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research; Addison-Wesley Pub. Co.: Reading, MA, USA, 1975; ISBN 978-0201020892. [Google Scholar]
  37. Davis, F.D. A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 1985. [Google Scholar]
  38. Pinho, J.C.M.R.; Soares, A.M. Examining the technology acceptance model in the adoption of social networks. J. Res. Interact. Mark. 2011, 5, 116–129. [Google Scholar] [CrossRef]
  39. Venkatesh, V.; Morris, M.G.; Davis, G.B.; Davis, F.D. User Acceptance of Information Technology: Toward a Unified View. MIS Q. 2003, 27, 425–478. [Google Scholar] [CrossRef] [Green Version]
  40. Ayaz, A.; Yanartaş, M. An analysis on the unified theory of acceptance and use of technology theory (UTAUT): Acceptance of electronic document management system (EDMS). Comput. Hum. Behav. Rep. 2020, 2, 100032. [Google Scholar] [CrossRef]
  41. Masur, P.K. Situational Privacy and Self-Disclosure; Springer International Publishing: Cham, Switzerland, 2019; ISBN 978-3-319-78883-8. [Google Scholar]
  42. Ioannou, A.; Tussyadiah, I.; Lu, Y. Privacy concerns and disclosure of biometric and behavioral data for travel. Int. J. Inf. Manag. 2020, 54, 102122. [Google Scholar] [CrossRef]
  43. Bélanger, F.; Crossler, R.E. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Q. 2011, 35, 1017–1041. [Google Scholar] [CrossRef] [Green Version]
  44. Yu, L.; Li, H.; He, W.; Wang, F.-K.; Jiao, S. A meta-analysis to explore privacy cognition and information disclosure of internet users. Int. J. Inf. Manag. 2020, 51, 102015. [Google Scholar] [CrossRef]
  45. Smith, H.J.; Dinev, T.; Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Q. 2011, 35, 989–1015. [Google Scholar] [CrossRef] [Green Version]
  46. Li, Y. Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework. Commun. Assoc. Inf. Syst. 2011, 28, 453–496. [Google Scholar] [CrossRef] [Green Version]
  47. Miltgen, C.L.; Peyrat-Guillard, D. Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. Eur. J. Inf. Syst. 2019, 23, 103–125. [Google Scholar] [CrossRef]
  48. TIBCO Software Inc. Statistica (Data Analysis Software System), version 13; TIBCO Software Inc.: Palo Alto, CA, USA, 2017. [Google Scholar]
  49. Song, Y.; Qin, Z.; Yuan, Q. The Impact of Eco-Label on the Young Chinese Generation: The Mediation Role of Environmental Awareness and Product Attributes in Green Purchase. Sustainability 2019, 11, 973. [Google Scholar] [CrossRef] [Green Version]
  50. Qin, Z.; Song, Y.; Tian, Y. The Impact of Product Design with Traditional Cultural Properties (TCPs) on Consumer Behavior Through Cultural Perceptions: Evidence from the Young Chinese Generation. Sustainability 2019, 11, 426. [Google Scholar] [CrossRef] [Green Version]
  51. Song, Y.; Luximon, A.; Luximon, Y. The effect of facial features on facial anthropomorphic trustworthiness in social robots. Appl. Ergon. 2021, 94, 103420. [Google Scholar] [CrossRef]
  52. Song, Y.; Luximon, Y. The face of trust: The effect of robot face ratio on consumer preference. Comput. Hum. Behav. 2021, 116, 106620. [Google Scholar] [CrossRef]
  53. Wodo, W.; Stygar, D. Security of Digital Banking Systems in Poland: Users Study 2019. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP 2020), Valletta, Malta, 25–27 February 2020; Furnell, S., Mori, P., Weippl, E.R., Camp, O., Eds.; Scitepress-Science and Technology Publications: Setúbal, Portugal, 2020; pp. 221–231, ISBN 978-989-758-399-5. [Google Scholar]
  54. Koufaris, M. Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior. Inf. Syst. Res. 2002, 13, 205–223. [Google Scholar] [CrossRef] [Green Version]
  55. Moriuchi, E. An empirical study of consumers’ intention to use biometric facial recognition as a payment method. Psychol. Mark. 2021, 38, 1741–1765. [Google Scholar] [CrossRef]
  56. Rosén, A.F.; Sondell, E.; Khalil, E.; Paulsson, V. A Behavioral Intention for Biometric Payment Card: A Swedish Perspective. In Proceedings of the AMCIS 2021 TREOS, (Technology Research, Education, and Opinion), AMCIS 2021. Digital Innovation and Entrepreneurship, Virtual Conference, 9–13 August 2021. [Google Scholar]
  57. Zhang, W.K.; Kang, M.J. Factors Affecting the Use of Facial-Recognition Payment: An Example of Chinese Consumers. IEEE Access 2019, 7, 154360–154374. [Google Scholar] [CrossRef]
  58. Liu, D.; Tu, W. Factors influencing consumers’ adoptions of biometric recognition payment devices: Combination of initial trust and UTAUT model. Int. J. Mob. Commun. 2021, 19, 345. [Google Scholar] [CrossRef]
  59. Hizam, S.M.; Ahmed, W.; Fahad, M.; Akter, H.; Sentosa, I.; Ali, J. User Behavior Assessment Towards Biometric Facial Recognition System: A SEM-Neural Network Approach. In Advances in Information and Communication; Arai, K., Ed.; Springer International Publishing: Cham, Switzerland, 2021; pp. 1037–1050. ISBN 978-3-030-73102-1. [Google Scholar]
  60. Ebruder, M.; Ehaffke, P.; Eneave, N.; Enouripanah, N.; Eimhoff, R. Measuring Individual Differences in Generic Beliefs in Conspiracy Theories Across Cultures: Conspiracy Mentality Questionnaire. Front. Psychol. 2013, 4, 225. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Physiological (left) and behavioral (right) biometric traits (adapted from [1]).
Figure 1. Physiological (left) and behavioral (right) biometric traits (adapted from [1]).
Sustainability 14 09424 g001
Figure 2. Some major milestones in the history of fingerprint recognition (see [4]).
Figure 2. Some major milestones in the history of fingerprint recognition (see [4]).
Sustainability 14 09424 g002
Figure 3. Iris code and accompanying iris pattern. Source: https://www.cl.cam.ac.uk/~jgd1000/iris_recognition.html (accessed on 14 April 2022), based on [7].
Figure 3. Iris code and accompanying iris pattern. Source: https://www.cl.cam.ac.uk/~jgd1000/iris_recognition.html (accessed on 14 April 2022), based on [7].
Sustainability 14 09424 g003
Figure 4. Biometric enrollment and verification. The enrollment phase produces an association between a biometric characteristic and its identity. In the verification phase, an enrolled user claims an identity, which the system verifies on the basis of the user’s biometric feature set [10].
Figure 4. Biometric enrollment and verification. The enrollment phase produces an association between a biometric characteristic and its identity. In the verification phase, an enrolled user claims an identity, which the system verifies on the basis of the user’s biometric feature set [10].
Sustainability 14 09424 g004
Figure 5. Worldwide biometric technologies market, source: [20].
Figure 5. Worldwide biometric technologies market, source: [20].
Sustainability 14 09424 g005
Figure 6. Biometric market growth, source: [24].
Figure 6. Biometric market growth, source: [24].
Sustainability 14 09424 g006
Figure 7. Determinants of end-user acceptance of biometrics, integrated approach model—see [33] (p. 106).
Figure 7. Determinants of end-user acceptance of biometrics, integrated approach model—see [33] (p. 106).
Sustainability 14 09424 g007
Figure 8. A Model of the verified hypotheses of dependencies and characteristics measured in qualitative research: model of behavioral intention to accept BP.
Figure 8. A Model of the verified hypotheses of dependencies and characteristics measured in qualitative research: model of behavioral intention to accept BP.
Sustainability 14 09424 g008
Table 1. Set of hypotheses in verified model.
Table 1. Set of hypotheses in verified model.
Symbol of HypothesisContent of Hypothesis
H1aThe higher the age of the respondents, the greater their fear of using personal data in BP systems
H1bThe higher the age of the respondents, the greater their fear of barriers in life with BP
H1cThe higher the age of the respondents, the greater their knowledge and experience (also in BP area)
H2aFear about personal data has a direct negative effect on perceived safety
H2bThe higher the respondents’ concerns about personal data, the worse their perception of use and facilitating conditions of BP
H3aFear of barriers in life has a direct negative effect on perceived use and facilitating conditions
H3bFear of barriers in life has a direct negative effect on attitude towards BP
H4aKnowledge and experience has a direct positive effect on perceived use and facilitating conditions
H4bKnowledge and experience has a direct positive effect on importance of innovative payments
H4cKnowledge and experience has a direct positive effect on replacement in future
H5aPerceived safety has a direct positive effect on importance of innovative payments
H5bPerceived safety has a direct positive effect on attitude towards BP
H6aPerceived use and facilitating conditions variable has a direct positive effect on attitude towards BP
H6bPerceived use and facilitating conditions variable has a direct positive effect on behavioral intention to accept and to use BP
H7aImportance of innovative payments has a direct positive effect on attitude towards BP
H7bImportance of innovative payments has a direct positive effect on behavioral intention to accept and to use BP
H8aReplacement in future has a direct positive effect on importance of innovative payments
H8bReplacement in future has a direct positive effect on behavioral intention to accept and to use BP
H9Attitude towards BP has a direct positive effect on behavioral intention to accept and to use BP
Table 2. The internal consistency of the measurement items.
Table 2. The internal consistency of the measurement items.
ConstructCronbach’s AlphaVariableStandardized Factor LoadingSMCAVEComposite Reliability
Fear about personal data0.879Q100.8770.6870.7610.905
Q110.9100.731
Q120.8280.538
Fear of barriers in life0.829Q130.6810.4920.5690.868
Q140.7800.439
Q150.6780.411
Q160.8510.546
Q170.7670.500
Perceived use and facilitating conditions0.879Q210.7080.4730.6270.909
Q220.8370.649
Q230.7820.567
Q240.7930.532
Q250.7750.481
Q260.8480.606
Table 3. Goodness of Fit Test.
Table 3. Goodness of Fit Test.
Category of IndexMeasureValue
Absolute fit indicesChi-square152.381
d.f.74
Chi-square/d.f.2.059
GFI0.905
AGFI0.863
RMSEA0.071
SRMR0.054
Incremental fit indicesNFI0.894
IFI0.948
TLI0.930
CFI0.942
Table 4. Correlation matrix of the constructs.
Table 4. Correlation matrix of the constructs.
ConstructAVEF1F2PU
Fear about personal data (F1)0.7611
Fear of barriers in life (F2)0.5690.456 ***1
Perceived use and facilitating conditions (PU)0.627−0.0200.0951
Note: *** p < 0.001.
Table 5. Estimated SEM parameters, their p-values, and conclusions about hypotheses.
Table 5. Estimated SEM parameters, their p-values, and conclusions about hypotheses.
Symbol of HypothesisParameter Estimatep-Value (Rounded to 3 Digits)Conclusion about Hypothesis
H1a0.3230.000Verified
H1b0.1710.013Verified
H1c−0.0830.237Rejected
H2a−0.2410.000Verified
H2b−0.0670.319Rejected
H3a0.1750.008Rejected because of positive value
H3b−0.1240.020Verified
H4a0.2580.000Verified
H4b0.3480.000Verified
H4c0.2620.000Verified
H5a0.1260.053Almost verified
H5b0.5890.000Verified
H6a0.2050.000Verified
H6b0.1160.052Almost verified
H7a0.1490.005Verified
H7b0.2000.001Verified
H8a0.0520.445Rejected
H8b0.1790.002Verified
H90.3950.000Verified
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Mróz-Gorgoń, B.; Wodo, W.; Andrych, A.; Caban-Piaskowska, K.; Kozyra, C. Biometrics Innovation and Payment Sector Perception. Sustainability 2022, 14, 9424. https://doi.org/10.3390/su14159424

AMA Style

Mróz-Gorgoń B, Wodo W, Andrych A, Caban-Piaskowska K, Kozyra C. Biometrics Innovation and Payment Sector Perception. Sustainability. 2022; 14(15):9424. https://doi.org/10.3390/su14159424

Chicago/Turabian Style

Mróz-Gorgoń, Barbara, Wojciech Wodo, Anna Andrych, Katarzyna Caban-Piaskowska, and Cyprian Kozyra. 2022. "Biometrics Innovation and Payment Sector Perception" Sustainability 14, no. 15: 9424. https://doi.org/10.3390/su14159424

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop