Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

An Integrated Success Model for Adopting Biometric Authentication Technique for District Health Information Management System 2, Ghana

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2020
Authors:
Lazarus Kwao, Richard Millham, Enoch Opanin Gyamfi
10.5120/ijca2020919686

Lazarus Kwao, Richard Millham and Enoch Opanin Gyamfi. An Integrated Success Model for Adopting Biometric Authentication Technique for District Health Information Management System 2, Ghana. International Journal of Computer Applications 177(40):1-16, February 2020. BibTeX

@article{10.5120/ijca2020919686,
	author = {Lazarus Kwao and Richard Millham and Enoch Opanin Gyamfi},
	title = {An Integrated Success Model for Adopting Biometric Authentication Technique for District Health Information Management System 2, Ghana},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2020},
	volume = {177},
	number = {40},
	month = {Feb},
	year = {2020},
	issn = {0975-8887},
	pages = {1-16},
	numpages = {16},
	url = {http://www.ijcaonline.org/archives/volume177/number40/31168-2020919686},
	doi = {10.5120/ijca2020919686},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

This paper evaluated users’ perspective of adopting a biometric authentication technique by utilizing a proposed model derived from the technology acceptance model to determine how effective user accepts a proposed keystroke biometric authentication in an E-Health System. This paper combined the TAM of Davis et al with the success adoption model of DeLone and McLean where external variables for the TAM of Davis et al were derived from the four dimensions considered in the model of DM. The research design is a self-administered survey and the empirical part of the research is quantitative. The aim of the empirical part is to test the fit of the conceptual model with received data based on a questionnaire. This paper uses a cross-sectional approach that provides a “snapshot” of the secured system’s usefulness and ease-of-use from the perspective of the end-users. Based on empirical findings, users with a higher degree of perceived usefulness, privacy concerns, and security concerns will demonstrate a more positive attitude towards adopting keystroke biometric authentication in an e-Health System. The proposed model and its elements prove that it can be a useful tool for decision makers in evaluating authentication techniques in e-health systems.

References

  1. Jain, A, Flynn, P and A, Ross. A Handbook of Biometrics. US : Springer US, 2008, pp. 1-2.
  2. Bolle, Ruud M., et al. Guide to biometrics. s.l. : Springer Science & Business Media, 2013.
  3. Biometric authentication and identification using keystroke dynamics: A survey. Banerjee, S. P. and Woodard, D. L. 2012, Journal of Pattern Recognition Research, pp. 7(1), 116-139.
  4. Health Professionals’ readiness to implement electronic medical record system at three hospitals in Ethiopia: a cross sectional study. Biruk, Senafekesh , et al. 2014, BMC Med Inform Decis Mak, p. 14(1): 1.
  5. Privacy and biometrics: An empirical examination of employee concerns. Carpenter, D., et al. 2018, Information Systems Frontiers, pp. 20(1), 91-110.
  6. Exploring biometric technology adoption in a developing country context using the modified UTAUT. Akinnuwesi, B. A., et al. 2016, International Journal of Business Information Systems, pp. 23(4), 482-521.
  7. PMI . Ghana’s Innovative Health Information Management System Gains African Recognition. [Online] PMI, April 2014. [Cited: October 06, 2019.] https://www.pmi.gov/news/stories-from-the-field/stories-from-the-field---detail/ghana-s-innovative-health-information-management-system-gains-african-recognition.
  8. Poppe, O. Health Information Systems in West Africa: Implementing DHIS2 in Ghana (Master's thesis). Accra, Ghana : UNIVERSITY OF OSLO, 2012.
  9. DHIS2 Documentation Team. Rolling Out A Nationwide Web-Based District Health Information System, DHIMS2- The Ghana Experience. [Online] 2012. dhis2.org/doc/snapshot/en/implementer/dhis2..
  10. A literature review and meta-synthesis of its strengths and operational challenges based on the experiences of 11 countries. Dehnavieh, R., et al. 2019, Health Information Management Journal, pp. 48(2), 62-75.
  11. Nyonator, F., Ofosu, A. and Osei, D. District Health Information Management System DHIMS II: The Data Challenge For Ghana Health Service. NetHope Solutions Center Case Studies. [Online] 2013. https://solutionscenter.nethope.org/assets/collaterals/dhims2_crs_presentation.ppt.
  12. Response option for attacks detected by intrusion detection system. Anwar, S., et al. 2015. In Software Engineering and Computer Systems (ICSECS), 2015 4th International Conference. pp. 195-200.
  13. Coley, S. C., et al. Use of Password System for Primary Authentication. CWE Version 2.9. 2015, p. 601.
  14. Securing passwords against dictionary attacks. Pinkas, B. and Sander, T. s.l. : ACM, 2002. In Proceedings of the 9th ACM conference on Computer and communications security. pp. 161-170.
  15. Offline dictionary attack on password authentication schemes using smart cards. Wang, D. and Wang, P. Berlin, Germany : s.n., 2015. In Information Security; Springer. pp. 221–237.
  16. Understanding password choices: How frequently entered passwords are re-used across websites. Wash, R., et al. 2016. In Symposium on Usable Privacy and Security (SOUPS). pp. 175-188.
  17. A study of personal information in human-chosen passwords and its security implications. Li, Y., Wang, H. and Sun, K. s.l. : IEEE, 2016. In INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. pp. 1-9.
  18. User practice in password security: An empirical study of real-life passwords in the wild. Shen, C., et al. 2016, Computers & Security, pp. 61, 130-141.
  19. Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures. Missaoui, C., et al. s.l. : Springer, Cham., 2018. In International Symposium on Cyberspace Safety and Security. pp. 3-17.
  20. Scaling Up: The Challenges of eHealth Systems in Developing Countries. Kwao, Lazarus, et al. X, s.l. : IJRASET, October 2019, International Journal for Research in Applied Science & Engineering Technology, Vol. 7, pp. 815-823. 2321-9653.
  21. Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context. Miltgen, C. L., Popovič, A. and Oliveira, T. 2013, Decision Support Systems, pp. 56, 103-114.
  22. Towards understanding user perceptions of authentication technologies. Jones, L. A., Antón, A. I. and Earp, J. B. 2007. In Proceedings of the 2007 ACM workshop on Privacy in electronic society. pp. 91-98.
  23. Perceived acceptability of biometric security systems. Deane, F., et al. 1995, Computers & Security, pp. 14(3), 225-231.
  24. Biometrics and e-identity (e-passport) in the European Union: end-user perspectives on the adoption of a controversial innovation. Ng-Kruelle, G., et al. 2006, Journal of Theoretical and Applied Electronic Commerce Research, pp. 1(2), 12-35.
  25. Research commentary: Desperately seeking the “IT” in IT research—A call to theorizing the IT artifact. Orlikowski, W. J and Iacono, C. S. 2001, Information systems research, pp. 12(2), 121-134.
  26. Technology acceptance model 3 and a research agenda on interventions. Venkatesh, V. and Bala, H. 2008, Decision sciences, pp. 39(2), 273-315.
  27. User acceptance of information technology: Toward a unified view. Venkatesh, V., et al. 2003, MIS quarterly, pp. 425-478.
  28. Verification of computer users using keystroke dynamics. Obaidat, M. S. and Sadoun, B. 1997, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), pp. 27(2), 261-269.
  29. Biometric personal authentication using keystroke dynamics: A review. Karnan, M., Akila, M. and Krishnaraj, N. 2011, Applied Soft Computing,, pp. 11(2), 1565-1573.
  30. Gagbla, K. G. Securing E-Business Applications. Using Keystroke Dynamics as a Biometric Authentication Technique. 2005.
  31. Evaluating the reliability of credential hardening through keystroke dynamics. Bartlow, N. and Cukic, B. s.l. : IEEE, 2006. In 2006 17th International Symposium on Software Reliability Engineering. pp. 117-126.
  32. Journal of management information systems. Hu, P. J., et al. 2, 1999, Examining the technology acceptance model using physician acceptance of telemedicine technology, Vol. 16, pp. 91-112.
  33. Why do people use information technology? A critical review of the technology acceptance model. Legris, P., Ingham, J. and Collerette, P. 3, 2003, Information & management, Vol. 40, pp. 191-204.
  34. User acceptance of computer technology: a comparison of two theoretical models. Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. 1989, Management science, pp. 35(8), 982-1003.
  35. Sekaran, Uma and Bougie, Roger. Research methods for business: A skill building approach. s.l. : John Wiley & Sons, 2016.
  36. A bridge between PLS path modeling and multi-block data analysis. In Handbook of partial least squares. Tenenhaus, M. and Hanafi, M. s.l. : Springer, Berlin, Heidelberg., 2010, pp. 99-123.
  37. The partial least squares approach to structural equation modeling. Chin, W. W. 2, s.l. : Modern methods for business research, 1998, Vol. 295, pp. 295-336.
  38. Ellis, P. D. The essential guide to effect sizes: Statistical power, meta-analysis, and the interpretation of research results. s.l. : Cambridge University Press, 2010. p. 94. Vol. 90.
  39. The DeLone and McLean model of information systems success: a ten-year update. Delone, W. H. and McLean, E. R. 4, s.l. : Journal of management information systems, 2003, Journal of management information systems, Vol. 19, pp. 9-30.
  40. Does the technology acceptance model predict actual use? A systematic literature review. Turner, M., et al. 5, s.l. : Information and software technology, 2010, Vol. 52, pp. 463-479.
  41. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Shin, D. H. 5, s.l. : Interacting with computers, 2010, Vol. 22, pp. 428-438.
  42. Privacy and data security in E-health: Requirements from the user’s perspective. Wilkowska, W. and Ziefle, M. 3, s.l. : Health informatics journal, 2012, Vol. 18, pp. 191-201.
  43. Investigating factors influencing the adoption of e-Health in developing countries: A patient’s perspective. Hoque, M. R., Bao, Y. and Sorwar, G. 1, s.l. : Informatics for Health and Social Care, 2017, Vol. 42, pp. 1-17.
  44. A unified perspective on the factors influencing consumer acceptance of internet of things technology. Gao, L. and Bai, X. 2, s.l. : Asia Pacific Journal of Marketing and Logistics, 2014, Vol. 26, pp. 211-231.
  45. Factors influencing consumer adoption of USB-based Personal Health Records in Taiwan. Jian, W. S., et al. 1, s.l. : BMC health services research,, 2012, Vol. 12, p. 277.
  46. An integrated success model for evaluating information system in public sectors. Zaied, A. N. H. 6, s.l. : Journal of Emerging Trends in Computing and Information Sciences, 2012, Vol. 3, pp. 814-825.
  47. Multimodel Biometric Authentication Based on Finger Print and Keystroke Dynamics Using Fuzzy Set. Venko, Chandrasekar, Shanmugavalli, V and Krishna, Sankar P. 2014, Australian Journal of Basic and Applied Sciences, p. 8(5).
  48. I Feel Like I’m Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphone. De Luca, A., et al. Seoul, Korea : ACM: New York, NY, USA,, 2015. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 18–23 April 2015. pp. 1411–1414.

Keywords

DHIMS 2, Technology Acceptance, Delone and McLean, Keystroke Biometrics Authentication, Ghana e-Health Service