The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study
Abstract
:1. Introduction
2. Materials and Methods
2.1. Related Work on Biometric Systems and Users’ Acceptance
2.2. Statement of Interest and Research Questions
- RQ1: What are University of the Aegean students’ perceptions and familiarity regarding BS adoption and use?
- RQ2: What are the socio-demographical factors that affect University of the Aegean students’ acceptance of BS?
2.3. Research Methodology
3. Results
3.1. Knowledge
3.2. Adoption
3.3. Usability
3.4. Reliability
3.5. Intention to Use Biometrics
3.6. Privacy and Security Concerns
3.7. Confidence and Social Control Concerns
4. Discussion
4.1. Gender
4.2. Age
4.3. Study Level
4.4. Year of Studies
4.5. Professional Profile
4.6. Father’s Occupation
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Constructs | Items |
Knowledge | Did you know what BS are, before you read the introductory note?Responses: Yes/No |
With which of the following Biometric techniques are you familiar?Responses (choose yes/no for each one):Fingerprint, Face recognition, DNA, hand geometry, signature, gait, iris scan, keystrokes, other | |
Adoption | Have you adopted any of these techniques in your everyday life?Responses (you may choose yes/no for the following):Fingerprint, Face recognition, DNA, hand geometry, signature, gait, iris scan, keystrokes, other |
If you have adopted any of them, which of the following daily activity does it concern?Response: open-ended question | |
Usability | How easily do you think that BS are in use?Responses:1: very difficult, 2: difficult, 3: moderate, 4: easy, 5: very easy |
Do you think their use requires a special training?Responses: Yes/No | |
Which of the following do you consider the most import advantage for using BS?Responses:A key, card is not requiredThe speed of the verificationPassword memorization is not requiredThe possibility of proper recognitionEasiness of learningOther | |
Which of the following do you consider the most important disadvantage while using BS?Responses:The difficulty of learningThe relatively high installation costHigh maintenance requirementsThe lengthy registration proceduresThe risk of personal data breachThey’re unhealthy and dangerousFeeling of fear or anxietyOther | |
Provided that you feel fear when your identification is based on your biometric information, please justifyResponse: open-ended question | |
Reliability | Do you consider BS to be a more reliable method of identification than password/PIN;Responses:1: Not at all, 2: Little, 3: moderate, 4: very, 5: very much |
“Do you consider BS to be a more secure method of identification than password/PIN?”Responses:1: Not at all, 2: Little, 3: moderate, 4: very, 5: very much | |
Do you consider BS to be a more reliable solution to reduce thefts than passwords/Pins?Responses:Yes, No, it could be | |
Intention to use biometric systems | Do you think that using BS can make your everyday life easier?Responses: Yes/No |
In which services do you think BS would be good to be integrated?Responses (you may choose yes/no for the followings):airports, arenas, public spaces, hospitals, education, bank, other | |
To what extent do you feel ready to stop using passwords/Pins and replace them with biometric techniques?Responses:1: Not at all, 2: Little, 3: moderate, 4: very, 5: very much | |
To what extent are you willing to adopt biometric identity for your online banking?Responses:1: Not at all, 2: Little, 3: moderate, 4: very, 5: very much | |
To what extent are you willing to replace passports and IDs with your biometric characteristics when it comes to travel within or outside the EU?Responses:1: Not at all, 2: Little, 3: moderate, 4: very, 5: very much | |
Is there any activity/service for which you are willing to use biometric techniques directly? Response: open-ended question | |
Privacy and Security concerns | Does using of the following biometric techniques increase the risk of privacy invasion?Responses (you may choose yes/no for the followings):Fingerprint, Face recognition, DNA, hand geometry, signature, gait, iris scan, keystrokes, other |
Do you believe that using BS can lead to your privacy violation?Responses: Yes/No | |
Does using of the following biometric techniques increase the security level against potential threats?Responses (you may choose yes/no for the followings):Fingerprint, Face recognition, DNA, hand geometry, signature, gait, iris scan, keystrokes, other | |
Which services are using powerful biometric methods to ensure security and protection of your identity?Responses (you may choose yes/no for the followings):airports, arenas, public spaces, hospitals, education, bank, other | |
Confidence and Social control | Would you like to know how your biometric characteristics will be used in particular by the services that request them?Responses: Yes/No |
Do you trust that biometric information obtained from the services will only be used for verification purposes?Responses: Yes/No | |
Do you think that your biometric information can be cloned?Responses: Yes/No | |
Do you believe that BS may violate human rights?Responses: Yes/No | |
To what extent do you agree or disagree with the following statement “governments collect citizens’ biometric information for other uses than their security?Responses:1: Not at all, 2: Little, 3: moderate, 4: very, 5: very much |
References
- Smith, J.H.; Milberg, S.J.; Burke, S.J. Information privacy: Measuring individuals concerns about organizational practices. MIS Q. 1996, 20, 167–196. [Google Scholar] [CrossRef]
- Pai, C.; Wang, T.W.; Chen, T.S.; Cai, K.Y. Empirical study on Chinese tourists’ perceived trust and intention to use biometric technology. Asia Pac. J. Tour. Res 2018, 23, 880–895. [Google Scholar] [CrossRef]
- Siddique, S.; Yasmin, M.; Taher, T.B.; Alam, M. The Reliability and Acceptance of Biometric System in Bangladesh: Users Perspective. Int. J. Comput. Trends Technol. 2021, 69, 15–21. [Google Scholar] [CrossRef]
- Habibu, T.; Luhanga, E.T.; Sam, A.E. A study of users’ compliance and satisfied utilization of biometric application system. Inf. Secur. J. 2021, 30, 125–138. [Google Scholar] [CrossRef]
- Janahi, Y. The Impact of Internet Banking Adoption in the Kingdom of Bahrain-Overcoming Barriers to Adoption through the Use of Biometrics. Int. J. Innov. Creat. Change 2021, 15, 992–997. [Google Scholar]
- Laas-Mikko, K.; Kalvet, T.; Derevski, R.; Tiits, M. Promises, Social, and Ethical Challenges with Biometrics in Remote Identity Onboarding. In Handbook of Digital Face Manipulation and Detection; Rathgeb, C., Tolosana, R., Vera-Rodriguez, R., Busch, R., Eds.; Springer: Cham, Switzerland, 2022; pp. 437–462. [Google Scholar] [CrossRef]
- Stylios, I.; Kokolakis, S.; Thanou, O.; Chatzis, S. Behavioral biometrics & continuous user authentication on mobile devices: A survey. Inf. Fusion 2021, 66, 76–99. [Google Scholar] [CrossRef]
- Cornacchia, M.; Papa, F.; Sapio, B. User acceptance of voice biometrics in managing the physical access to a secure area of an international airport. Technol. Anal. Strateg. Manag. 2020, 32, 1236–1250. [Google Scholar] [CrossRef]
- Negri, N.A.R.; Borille, G.M.R.; Falcão, V.A. Acceptance of biometric technology in airport check-in. J. Air Transp. Manag. 2019, 81, 101720. [Google Scholar] [CrossRef]
- Levy, Y.; Ramim, M.M.; Furnell, S.M.; Clarke, N.L. Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams. CWIS 2011, 28, 102–113. [Google Scholar] [CrossRef]
- Babbie, E.R. The Practice of Social Research, 15th ed.; Cengage Learning: Hamshire, UK, 2021. [Google Scholar]
- Morosan, C. An empirical examination of U.S. Travelers’ intentions to use biometric e-gates in airports. J. Air Transp. Manag. 2016, 55, 120–128. [Google Scholar] [CrossRef]
- Kumar, D.; Rao, P.V. Implementing and analysing FAR and FRR for face and voice recognition (multimodal) using KNN classifier. Int. J. Intell. Unmanned Syst. 2020, 8, 55–67. [Google Scholar] [CrossRef]
- Taouche, C.; Belhadef, H. Multimodal biometric system combining left and right palmprints. Inf. Discov. Deliv. 2019, 48, 2–13. [Google Scholar] [CrossRef]
- Wojciechowska, A.; Choraś, M.; Kozik, R. The overview of trends and challenges in mobile biometrics. J. Appl. Comput. Mech. 2017, 16, 173–185. [Google Scholar] [CrossRef] [Green Version]
- Buciu, I.; Gacsadi, A. Biometrics systems and technologies: A survey. Int. J. Comput. Commun. Control 2016, 11, 315–330. [Google Scholar] [CrossRef] [Green Version]
- Riaz, N.; Riaz, A.; Khan, S.A. Biometric template security: An overview. Sens. Rev. 2018, 38, 120–127. [Google Scholar] [CrossRef]
- Skalkos, A.; Stylios, I.; Karyda, M.; Kokolakis, S. Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach. J. Cybersecur. Priv. 2021, 1, 743–766. [Google Scholar] [CrossRef]
- Buriro, A.; Crispo, B.; Del Frari, F.; Klardie, J.; Wrona, K. ITSME: Multi-Modal and Unobtrusive Behavioural User Authentication for Smartphones. In Technology and Practice of Passwords; Stajano, F., Mjølsnes, S.F., Jenkinson, G., Thorsheim, P., Eds.; Springer: Cham, Switzerland, 2016; pp. 45–61. [Google Scholar]
- Bansal, N.; Verma, A.; Kaur, I.; Sharma, D. Multimodal biometrics by fusion for security using genetic algorithm. In Proceedings of the IEEE 4th International Conference on Signal Processing, Computing and Control (ISPCC 2017), Solan, India, 21–23 September 2017. [Google Scholar] [CrossRef]
- Fenu, G.; Marras, M.; Boratto, L. A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recognit. Lett. 2018, 113, 83–92. [Google Scholar] [CrossRef]
- Kumar, R.; Phoha, V.V.; Jain, A. Treadmill attack on gait-based authentication systems. In Proceedings of the IEEE 7th International Conference on Biometrics Theory, Applications and Systems, Arlington, VA, USA, 8–11 September 2015; pp. 1–7. [Google Scholar]
- Kumar, D.; Rao, P.V. Prediction based person recognition using face and speech. Int. J. Eng. Sci. Technol. 2018, 7, 145–150. [Google Scholar] [CrossRef]
- Meng, W.; Wong, D.S. The effect of adaptive mechanism on behavioural biometric based mobile phone authentication. Inf. Manag. Comput. Secur. 2014, 22, 155–166. [Google Scholar] [CrossRef]
- Zhang, X.D.Y.; Xu, X.X. Android-based multimodal biometric identification system using feature level fusion. In Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Xiamen, China, 6–9 November 2017. [Google Scholar] [CrossRef]
- Xin, Y.; Liu, Y.; Liu, Z.; Zhu, X.; Kong, L.; Wei, D.; Chang, J. A survey of liveness detection methods for face biometric systems. Sens. Rev. 2018, 37, 346–356. [Google Scholar] [CrossRef]
- Li, L.Z.; Sajat, M.S.; Yusof, Y.; Fazea, Y.; Purba, H.S. The Design and User Acceptance of IoT-based Access and Entrance Control System Using Voice Recognition. Available online: https://www.researchgate.net/publication/349161710_The_Design_and_User_Acceptance_of_IoT-based_Access_and_Entrance_Control_System_Using_Voice_Recognition?channel=doi&linkId=602394184585158939936bf2&showFulltext=true (accessed on 22 March 2022).
- Miltgen, C.; Popovic, A.; Oliveira, T. Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context. Decis. Support Syst. 2013, 56, 103–114. [Google Scholar] [CrossRef]
- Levine, B.N.; Reiter, M.K.; Wang, C.; Wright, M.K. Timing attacks in low-latency mix-based systems. In Financial Cryptography; Juels, A., Ed.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 251–265. [Google Scholar]
- Habibu, T.; Luhanga, E.T.; Sam, A. Evaluation of users’ knowledge and concerns of biometric passport systems. Data 2019, 4, 58. [Google Scholar] [CrossRef] [Green Version]
- Malhotra, N.; Kim, S.; Agarwal, J. Internet users’ information privacy concerns: The construct, the scale, and a causal model. Inf. Syst. Res. 2004, 15, 336–355. [Google Scholar] [CrossRef] [Green Version]
- Hong, W.; Thong, J.Y. Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Q. 2013, 37, 275–298. [Google Scholar] [CrossRef]
- Kalkbrenner, M.T. Alpha, Omega, and H Internal Consistency Reliability Estimates: Reviewing These Options and When to Use Them. Couns. Outcome Res. Eval. 2021, 12, 1–12. [Google Scholar] [CrossRef]
- Wang, L.Y.; Lew, S.L.; Lau, S.H. An empirical study of students’ intention to use cloud e-learning in higher education. Int. J. Emerg. Technol. 2020, 15, 19–38. [Google Scholar] [CrossRef]
- Marangunić, N.; Granić, A. Technology acceptance model: A literature review from 1986 to 2013. Univers. Access Inf. Soc. 2015, 14, 81–95. [Google Scholar] [CrossRef]
- Seyal, A.H.; Turner, R. A study of executives’ use of biometrics: An application of theory of planned behaviour. Behav. Inf. Technol. 2013, 32, 1242–1256. [Google Scholar] [CrossRef]
- Venkatesh, V.; Thong, J.Y.; Xu, X. Unified theory of acceptance and use of technology: A synthesis and the road ahead. J. Assoc. Inf. Syst. 2016, 17, 328–376. [Google Scholar] [CrossRef]
- DeLone, W.H.; McLean, E.R. The DeLone and McLean model of information systems success: A ten-year update. J. Manag. Inf. Syst. 2003, 19, 9–30. [Google Scholar] [CrossRef]
- Vallerand, R. Toward a hierarchical model of intrinsic and extrinsic motivation. Adv. Exp. Soc. Psychol. 1997, 29, 271–360. [Google Scholar] [CrossRef]
- Onywoki, B.; Opiyo, E. A Framework for the Adoption of Biometric ATM Authentication in the Kenyan Banks. Available online: http://erepository.uonbi.ac.ke/bitstream/handle/11295/73528/Onywoki%20_Biometric%20ATM%20authentication%20.pdf?sequence=1 (accessed on 9 November 2022).
- Morosan, C. Customers’ adoption of biometric systems in restaurants: An extension of the technology acceptance model. J. Hosp. Mark. Manag. 2011, 20, 661–690. [Google Scholar] [CrossRef]
- Chalikias, Μ.; Lalou, P.; Manolessou, A. Research Methodology and Introduction to Statistical Data Analysis via IBM SPSS STATISTICS. 2015. Available online: https://repository.kallipos.gr/handle/11419/5075 (accessed on 12 July 2021).
- Bourdieu, P. Distinction: A Social Critique of the Judgement of Taste, 2nd ed.; Harvard University Press: Cambridge, MA, USA, 1987. [Google Scholar]
- Powell, L.M.; Wimmer, H. Parental perceptions and recommendations of computing majors: A technology acceptance model approach. Inf. Syst. Educ. J. 2017, 15, 29. [Google Scholar]
- Rea, L.M.; Parker, R.A. Designing and Conducting Survey Research: A Comprehensive Guide, 3rd ed.; John Wiley & Sons: Jossey-Bass, CA, USA, 2014. [Google Scholar]
- Ahmad, S.; Zulkurnain, N.N.A.; Khairushalimi, F.I. Assessing the Validity and Reliability of a Measurement Model in Structural Equation Modeling (SEM). Br. J. Math. Comput. Sci. 2016, 15, 1–8. [Google Scholar] [CrossRef]
- Volkamer, M.; Renaud, K. Mental models—General introduction and review of their application to human-centred security. In Number Theory and Cryptography; Fischlin, M., Katzenbeisser, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 255–280. [Google Scholar]
- Keough, E.; Muir, S. UK Now Ready for Biometric Banking. Experian. 2016. Available online: https://www.experianplc.com/media/news/2016/uk-now-ready-for-biometric-banking/ (accessed on 22 July 2021).
- Bhagavatula, R.; Ur, B.; Iacovino, K.; Kywe, S.M.; Cranor, L.F.; Savvides, M. Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption. In Proceedings of the Workshop on Usable Security, (USEC 2015), San Diego, CA, USA, 8 February 2015. [Google Scholar] [CrossRef] [Green Version]
- Tiits, M.; Kalvet, T.; Laas-Mikko, K. Social acceptance of epassports. In Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG), IEEE, Darmstadt, Germany, 10–12 September 2014; pp. 1–6. [Google Scholar]
- Lee, T.Z.; Bong, D.B. Face and palmprint multimodal biometric system based on bit-plane decomposition approach. In Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW, 2016), Nantou, Taiwan, 27–29 May 2016. [Google Scholar] [CrossRef]
- Santa, I. Biometric Technology Enjoys Strong Support from Consumers, Says CTA|Business Wire. 2016. Available online: https://www.businesswire.com/news/home/20160330006149/en/Biometric-?-Technology-?-Enjoys-?-Strong-?-Support-?-Consumers-?-CTA (accessed on 22 July 2021).
- Doyle, J. Accenture Research Shows Citizen Support for Biometrics to Facilitate Travel and Secure Borders Accenture Newsroom. 2014. Available online: https://newsroom.accenture.com/industries/health-public-service/accenture-research-shows-citizen-support-for-use-of-biometrics-to-facilitate-travel-and-secure-borders.htm (accessed on 15 July 2021).
- El-Abed, M.; Giot, R.; Hemery, B.; Rosenberger, C. Evaluation of biometric systems: A study of users’ acceptance and satisfaction. Int. J. Biometr. 2012, 4, 265–290. [Google Scholar] [CrossRef] [Green Version]
- Vgena, K.; Kitsiou, A.; Kalloniatis, C.; Gritzalis, S. Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media. Future Internet 2022, 14, 249. [Google Scholar] [CrossRef]
- Vgena, K.; Kitsiou, A.; Kalloniatis, C. Understanding the role of users’ socio-location attributes and their privacy implications on social media. Inf. Comput. Secur. 2022, 30, 705–729. [Google Scholar] [CrossRef]
- Kitsiou, A.; Tzortzaki, E.; Kalloniatis, C.; Gritzalis, S. Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks. Future Internet 2021, 13, 23. [Google Scholar] [CrossRef]
- Vgena, K.; Kitsiou, A.; Kalloniatis, C.; Kavroudakis, D.; Gritzalis, S. Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes. Future Internet 2019, 11, 234. [Google Scholar] [CrossRef]
- Kitsiou, A.; Tzortzaki, E.; Kalloniatis, C.; Gritzalis, S. Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts. In CyberICPS 2020 6th Workshop on Security of Industrial Control Systems and Cyber-Physical Systems in Conjunction with 25th European Symposium on Research in Computer Security (ESORICS); LNCS Lecture Notes in Computer Science; Katsikas, S.K., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Eds.; Springer: Guildford, UK, 2020; Volume 12501, pp. 117–132. [Google Scholar]
- Kitsiou, A.; Tzortzaki, E.; Kalloniatis, C.; Gritzalis, S. Measuring Users’ Socio- contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments. In International Conference on Trust and Privacy in Digital Business; Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12395 LNCS; Springer: Berlin/Heidelberg, Germany, 2020; pp. 140–155. [Google Scholar]
Socio-Demographic Characteristics | Count | Percentage | |
---|---|---|---|
Gender | Male | 279 | 37% |
Female | 480 | 62% | |
Other | 6 | 1% | |
Age | 18–22 | 407 | 54% |
23–30 | 183 | 23% | |
31–45 | 135 | 17% | |
46–60 | 40 | 6% | |
Study level | Undergraduate | 515 | 68% |
Postgraduate | 185 | 24% | |
Doctoral Students | 62 | 8% | |
Undergraduate Students year of study | 1st Year | 147 | 28% |
2nd Year | 105 | 20% | |
3rd Year | 64 | 12% | |
4th Year | 92 | 18% | |
5th Year | 58 | 12% | |
>5th Year | 50 | 10% | |
Employment status | Yes | 313 | 41% |
No | 448 | 59% | |
Professional Profile | Public servant | 88 | 27% |
Private servant | 148 | 50% | |
Self-employed | 64 | 20% | |
Other | 13 | 3% | |
Annual Income | <10.000€ | 299 | 44% |
10.001–25.000€ | 292 | 42% | |
25.001–55.000€ | 88 | 13% | |
>55.001€ | 11 | 1% | |
Father’s Occupation | Public servant | 146 | 20% |
Private servant | 174 | 24% | |
Self- employed | 209 | 29% | |
Pensioner | 148 | 21% | |
Housekeeper | 0 | 0 | |
Unemployed | 24 | 3% | |
Other | 23 | 3% | |
Mother’s Occupation | Public servant | 153 | 21% |
Private servant | 164 | 22% | |
Self- employed | 102 | 14% | |
Pensioner | 95 | 13% | |
Housekeeper | 157 | 21% | |
Unemployed | 62 | 8% | |
Other | 3 | 1% |
Constructs | Subsections | Findings Discussed |
---|---|---|
Knowledge | Knowledge/Familiarity with BS | Total sample, study level, year of undergraduate studies |
Familiarity with BS techniques | Total sample, age group | |
Adoption | Incorporation in everyday life practices | BS techniques for total sample, students’ professional profile |
easiness of use | Total sample | |
Usability | Special training | Total sample |
BS advantages | Total sample, gender | |
BS disadvantages | Total sample, age group | |
BS fear or anxiety | Total sample, students’ professional profile, father’s occupation | |
Reliability | BS as a more reliable method of identification than password/PIN | Total sample |
BS as a more reliable solution to reduce thefts than passwords/Pins | Age group | |
Intention to use biometric systems | Easier day life due to BS | Total sample, age group, mother’s occupation |
Services in favor that BS could be integrated | Total sample, Airport per age group, Hospital per year of study | |
Replacement of PINS/passwords | Total sample | |
Replacement of passports/IDs | Total sample | |
Privacy and Security concerns | BS techniques that increase the risk of privacy invasion | Total sample, age group |
Services that use powerful biometric methods for security and identity protection | Total sample, mobile industry per students’ professional profile | |
Confidence and Social control | Knowledge of how biometric characteristics will be used by the services | Total sample |
Trust that biometric information obtained from the services will only be used for verification purposes | Gender | |
Biometric information can be cloned | Total sample, age group | |
Privacy Violation | Total sample, gender |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kitsiou, A.; Despotidi, C.; Kalloniatis, C.; Gritzalis, S. The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study. Future Internet 2022, 14, 328. https://doi.org/10.3390/fi14110328
Kitsiou A, Despotidi C, Kalloniatis C, Gritzalis S. The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study. Future Internet. 2022; 14(11):328. https://doi.org/10.3390/fi14110328
Chicago/Turabian StyleKitsiou, Angeliki, Charikleia Despotidi, Christos Kalloniatis, and Stefanos Gritzalis. 2022. "The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study" Future Internet 14, no. 11: 328. https://doi.org/10.3390/fi14110328
APA StyleKitsiou, A., Despotidi, C., Kalloniatis, C., & Gritzalis, S. (2022). The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study. Future Internet, 14(11), 328. https://doi.org/10.3390/fi14110328