Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

The Adoption of Biometric Fingerprint Timekeeping Technology in the Ghanaian Business Community – Effectiveness and Impact

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 85 - Number 9
Year of Publication: 2014
James Ami-narh
Lawrence K Aziale
Albert Akanferi

James Ami-narh, Lawrence K Aziale and Albert Akanferi. Article: The Adoption of Biometric Fingerprint Timekeeping Technology in the Ghanaian Business Community Effectiveness and Impact. International Journal of Computer Applications 85(9):32-39, January 2014. Full text available. BibTeX

	author = {James Ami-narh and Lawrence K Aziale and Albert Akanferi},
	title = {Article: The Adoption of Biometric Fingerprint Timekeeping Technology in the Ghanaian Business Community  Effectiveness and Impact},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {85},
	number = {9},
	pages = {32-39},
	month = {January},
	note = {Full text available}


Timekeeping mechanisms are relevant to organisational productivity. Moreover, biometric timekeeping methods are more robust and provide access to enhanced systems of employee motivation and monitoring. This study sought to investigate the impact of the adoption and usage of biometric time and attendance management systems among the Ghanaian business community in the Greater Accra Metropolis. The study involved a quantitative research, and its population was the entire registered membership of Association of Ghana Industries in the Greater Accra Region of Ghana made up of 845 members. A sample size of 200 was chosen. This represented a sample size of 23. 6% of the total population. Primary and secondary data were used, and self-administered questionnaire was the instrument used in primary data collection. Statistical tools used for data analysis were goodness-of-fit (Chi-square) test, 2x2 contingency table and Friedman (K-related samples) test. Results of the study indicated that biometric timekeeping technologies are more secured than traditional timekeeping methods. Moreover, the use of biometric timekeeping technologies has better effect on organization labour cost as compared with traditional methods. Also, investment in biometric timekeeping technologies is worth the cost, and biometric hardware technologies are not susceptible to frequent breakdown as compared to traditional methods. The study concludes that biometric timekeeping technology is more useful and applicable within the business community in Ghana. It is recommended therefore that its adoption should be encouraged in the various organisational setups in the economy.


  • Beyda, C. S. and V. S. Jefferiss, Well-Rounded Timekeeping. HRMagazine, 2011: p. 75-77.
  • Josphineleela, R. and M. Ramakrishnan, An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique. International Journal of Computer Science and Information Security (IJCSIS), 2012. 10(3).
  • Aberdeen Group, Evolving Time and Attendance: Foundation for Workforce Management Improvements, 2008.
  • Nucleus Research ROI Evaluation Report:: KRONOS Workforce Timekeeper. 2006.
  • Yuen, T. , Hong Kong Construction Sites Use Hundreds of Biometric HandReaders 2013.
  • Johnson, A. M. The Technology Acceptance Model and the Decision to Invest in Information Security. in Proceedings of the 2005 Southern Association of Information Systems Conference. 2005.
  • Lule, I. , T. K. Omwansa, and T. M. Waema, Application of Technology Acceptance Model (TAM) in M-Banking Adoption in Kenya. International Journal of Computing and ICT Research, 2012. 6(1): p. 31-43.
  • Legris, P. , J. Inghamb, and P. Collerettec, Why do people use information technology? A critical review of the technology acceptance model. Information & Management, 2003. 40(2003): p. 191-204.
  • Ajzen, I. and M. Fishbein, Understanding attitudes and predicting social behavior. 1980, Englewood Cliffs, NJ: Prentice-Hall.
  • Jain, A. K. , P. J. Flynn, and A. A. Ross, Handbook of biometrics. 2008: Springer.
  • Chollet, G. , B. Dorizzi, and D. Petrovska-Delacretaz, Introduction - About the Need of an Evaluation Framework in Biometrics, in Guide to Biometric Reference Systems and Performance Evaluation. 2009, Springer. p. 1-10.
  • Saraswat, C. and A. Kumar, An efficient automatic attendance system using fingerprint verification technique. International Journal on Computer Science and Engineering (IJCSE), 2010. 2(2): p. 264-269.
  • Shoewu, O. and O. A. Idowu, Development of Attendance Management System using Biometrics. The Pacific Journal of Science and Technology, 2012. 13(1).
  • El-Abed, M. , et al. A study of users' acceptance and satisfaction of biometric systems. in Security Technology (ICCST), 2010 IEEE International Carnahan Conference on. 2010. IEEE.
  • Tassabehji, R. and M. A. Kamala. Improving e-banking security with biometrics: modelling user attitudes and acceptance. in New Technologies, Mobility and Security (NTMS), 2009 3rd International Conference on. 2009. IEEE.
  • Kant, C. and R. Nath, Reducing process-time for fingerprint identification system. International Journals of Biometric and Bioinformatics, 2009. 3(1): p. 1-9.
  • Abdelbary, A. M. , Exploration of factors affecting adoption of biometric technology by five-star Egyptian hotel employees. 2011.
  • Patel, H. and P. Asrodia, Employee Attendance Management System Using Fingerprint Recognition. 2012.
  • Bhargava, N. , et al. , Fingerprint Matching using Ridge-End and Bifurcation Points. 2012.
  • Kumar, S. , et al. , Fingerprint Verification based on Fusion of Minutiae and Ridges using Strength Factors. International Journal of Computer Applications, 2010. 4(1).
  • Babatunde, I. G. , A. O. Charles, and A. Cleopas, Fingerprint Matching using Neighbourhood Distinctiveness. International Journal of Computer Applications, March, 2013. 66(21).
  • Kekre, D. H. B. , D. T. Sarode, and R. Vig, Fingerprint identification using sectorized cepstrum complex plane. International Journal of Computer Applications, 2010. 8(1): p. 12-15.
  • Maheswari, S. U. and E. Chandra, An Efficient Fingerprint Denoiser for Fingerprint Recognition. International Journal of Computer Applications, 2013. 66(22).
  • Jitendra, C. , S. Sharma, and J. S. Verma, A New Framework for improving low Quality Fingerprint Images. International Journal, 2011. 2(6).
  • Manivannan, N. , et al. , Fingerprint Biometric for Identity management. International Journal of Industrial Engineering and Management, 2011. 2(2): p. 39-44.
  • Katiran, N. , et al. Development of attendance system using biometric fingerprint identification. in 3rd Engineering Conference on Advancement in Mechanical and Manufacturing for Sustainable Environment April 14-16, 2010, . 2010. Kuching, Sarawak, Malaysia.
  • Lakshmi, G. P. , FINGERPRINT IDENTIFICATION SYSTEM combined with" CRYPTOGRAPHY" for Authentication. International Journal of Engineering Science and Technology, 2010. 2(7): p. 3054-3077.
  • Rao, S. and K. J. Satoa, An Attendance Monitoring System Using Biometrics Authentication. International Journal, April, 2013. 3(4).
  • Oloyede Muhtahir, O. , O. Adedoyin Adeyinka, and S. Adewole Kayode, Fingerprint Biometric Authentication for Enhancing Staff Attendance System. system, February, 2013. 5(3).
  • Agarwal, R. and J. Prasad, Are Individual Differences German to the Acceptance of new Information Technologies. Decision Sciences, 1999. 30(2): p. 361-391.
  • Dishawa, M. T. and D. M. Strong, Extending the technology acceptance model with task technology constructs. Information & Management, 1999. 36(1999): p. 9-21.
  • Lederer, A. L. , et al. , The technology acceptance model and the World Wide Web. Decision Support Systems, 2000. 29(2000): p. 269–282.
  • Gefen, D. and D. W. Straub, Gender Difference in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model. MIS Quarterly, 1997. 21(4): p. 389-400.
  • Igbaria, M. , J. Livari, and H. Maragahh, Why do individuals use computer technology? A Finnish case study. Information & Management, 1995. 29: p. 227-238.