Biometrics Technology: Understanding Dynamics Influencing Adoption for Control of Identification Deception Within Nigeria Gideon U

Biometrics Technology: Understanding Dynamics Influencing Adoption for Control of Identification Deception Within Nigeria Gideon U

Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 1-1-2011 Biometrics Technology: Understanding Dynamics Influencing Adoption for Control of Identification Deception Within Nigeria Gideon U. Nwatu Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Databases and Information Systems Commons, and the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University COLLEGE OF MANAGEMENT AND TECHNOLOGY This is to certify that the doctoral dissertation by Gideon U. Nwatu has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Raghu Korrapati, Committee Chairperson, Applied Management and Decision Sciences Faculty Dr. Stephanie Lyncheski, Committee Member, Applied Management and Decision Sciences Faculty Dr. Walter McCollum, University Reviewer Applied Management and Decision Sciences Faculty Chief Academic Officer David Clinefelter, Ph.D. Walden University 2011 © Gideon U. Nwatu, 2011 Abstract One of the objectives of any government is the establishment of an effective solution to significantly control crime. Identity fraud in Nigeria has generated global attention and negative publicity toward its citizens. The research problem addressed in this study was the lack of understanding of the dynamics that influenced the adoption and usability of biometrics technology for reliable identification and authentication to control identity deception. The support for this study was found in the theoretical framework of the technology acceptance model (TAM). The purpose of the study was to provide scholarly research about the factors that influenced the adoption of biometrics technology to reliably identify and verify individuals in Nigeria to control identity fraud. The mixed- method descriptive and inferential study used interview and survey questionnaires for data collection. The binary logistic regression, point bi-serial correlation, independent samples t test, and content analyses were performed using SPSS version 18, Microsoft Excel spreadsheet 2007, and Nvivo 7.0 software. The results from the findings indicated statistical correlation between adopt biometrics technology and three other variables, ease of use (r = .38, n = 120, p <.01), perceived usefulness (r = .41, n = 120, p < .01), and awareness (r = .33, n = 120, p < .01). The implications for social change include leveraging biometrics technology for recognition, confirmation, and accountability of individuals to prevent identity scheming, ensure security, and control the propagation of personal information. Beyond these immediate benefits, this research presents an example that other developing countries may use to facilitate the adoption of biometrics technology. Biometrics Technology: Understanding Dynamics Influencing Adoption for Control of Identification Deception Within Nigeria by Gideon U. Nwatu M.B.A. University of District of Columbia, 1991 B.S. West Virginia University, 1983 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Applied Management and Decision Sciences Walden University May 2011 UMI Number: 3461683 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent on the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. UMI 3461683 Copyright 2011 by ProQuest LLC. All rights reserved. This edition of the work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, MI 48106 - 1346 Abstract Biometrics Technology: Understanding Dynamics Influencing Adoption for Control of Identification Deception Within Nigeria by Gideon U. Nwatu M.B.A. University of District of Columbia, 1991 B.S. West Virginia University, 1983 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Applied Management and Decision Sciences Walden University May 2011 Dedication I dedicate this research to my dear and loving wife Ulo-o. Without her enduring love, great sacrifices, commitment, and support throughout this process, it would have been very difficult to overcome the many challenges and complete this scholarly journey. I truly and graciously express appreciation for her extraordinary dedication and understanding and for embarking on this journey with me. I owe my achievements to her. I also dedicate this work to our children, Obinna, Chibuzo, Ijeoma, and Chi-Chi for their support in several ways. I want to thank my parents, Mr. Paul Amadiegwu and Mrs. Bertha Nwatu, who sent me to the United States for further studies as a private student. They provided me a great opportunity that was necessary for accomplishing this professional and scholarly milestone. Acknowledgments I would like to give special recognition and extend my sincere gratitude to my mentor and committee chair, Dr. Raghu Korrapati, whose constant and consistent leadership and encouragement guided me through this journey and made this accomplishment a reality. I would not have completed this journey without his untiring support. I will always be grateful, Dr. Raghu. I would also like to thank my committee member, Dr. Stephanie Lyncheski, for contributing valuable insights and expertise that contributed significantly to the quality and validity of the final dissertation. I extend my sincere thank you to Dr. Walter McCollum for his support in so many ways and also for introducing biometrics technology to me, which provided the genesis and catalyst for this study. I extend appreciation to each of the study participants who gave their time and attention and openly shared their attitudes, beliefs, and opinions. I thank Walden University’s School of Management staff and faculty for their great support and encouragement through this journey. I thank Elder Dr. John Oriji for all his assistance and encouragement. Finally, I extend my heartfelt thanks to Drs. Nnanna Okafor, Melesse Asfaw, Dominic Albert for unwavering collegial support; Jacob Mays of SPSS tutor, and Christine Weeber of Stonefly Editorial Services for professional services they provided to help me attain this academic accomplishment. Table of Contents List of Tables .......................................................................................................................x List of Figures ................................................................................................................... xii Chapter 1: Introduction to the Study ....................................................................................1 Introduction ....................................................................................................................1 Statement of the Problem ...............................................................................................9 Background of the Problem .........................................................................................10 Nature of the Study ......................................................................................................15 Research Questions ......................................................................................................17 Purpose of the Study ....................................................................................................17 Theoretical Framework ................................................................................................18 Operational Definitions of Terms and Acronyms ........................................................20 Assumptions of the Study ............................................................................................25 Scope and Limitations of the Study .............................................................................25 Delimitations of the Study ...........................................................................................27 The Significance of the Study ......................................................................................27 Management Profession ........................................................................................ 27 Information Systems Management (ISM) ............................................................ 29 Body of Knowledge .............................................................................................. 30 Technique to Control Identity Fraud..................................................................... 31 Summary ......................................................................................................................33 i Chapter 2: Literature Review .............................................................................................36 Introduction and Organization .....................................................................................36 The Literature Review .................................................................................................38

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    317 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us