{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T16:50:26Z","timestamp":1740156626600,"version":"3.37.3"},"reference-count":60,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"Even though both internet-of-cloud services and biometric systems (BSs) are used worldwide, popular and expanded among public and private services, their utilization has not been extended among Greek users, and in particular within Greek HEIs. This paper aims to examine the University of the Aegean (UA) students\u2019 perceptions, especially on BS acceptance, determining the impact of their sociodemographic characteristics toward this. An online instrument was developed based on constructs of technology acceptance models, and previous research focused on BS acceptance, including a great variety of sociodemographic variables. The authors collected 768 complete responses to explore the social and demographic attributes that impact on students\u2019 BS acceptance through exploratory descriptive research. This study found that several UA students\u2019 sociodemographic attributes are linked to their BS acceptance. Specifically, gender, age, study level, year of study, professional profile and fathers\u2019 occupation are useful to determine which students\u2019 groups are in favor of BS, while employment status, annual income and mothers\u2019 occupation are weak toward this. Security and privacy concerns are indicated to influence users\u2019 BS acceptance as well. This study provides a unique approach to better understanding the Greek students\u2019 BS acceptance, with important implications for improved BS marketing in Greece in synergy with the internet-of-cloud services and their potential adoption in HEIs internal settings. It also provides developers with further knowledge for security and privacy non-functional requirements in order to increase users\u2019 acceptance and to address these challenges within the internet of cloud.<\/jats:p>","DOI":"10.3390\/fi14110328","type":"journal-article","created":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T09:14:01Z","timestamp":1668417241000},"page":"328","source":"Crossref","is-referenced-by-count":3,"title":["The Role of Users\u2019 Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study"],"prefix":"10.3390","volume":"14","author":[{"given":"Angeliki","family":"Kitsiou","sequence":"first","affiliation":[{"name":"Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, GR 81100 Lesvos, Greece"}]},{"given":"Charikleia","family":"Despotidi","sequence":"additional","affiliation":[{"name":"Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, GR 81100 Lesvos, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8844-2596","authenticated-orcid":false,"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[{"name":"Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, GR 81100 Lesvos, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8037-2191","authenticated-orcid":false,"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[{"name":"Laboratory of Systems Security, Department of Digital Systems, University of Piraeus, GR 18532 Piraeus, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2022,11,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: Measuring individuals concerns about organizational practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Q."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1080\/10941665.2018.1499544","article-title":"Empirical study on Chinese tourists\u2019 perceived trust and intention to use biometric technology","volume":"23","author":"Pai","year":"2018","journal-title":"Asia Pac. J. Tour. Res"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"15","DOI":"10.14445\/22312803\/IJCTT-V69I6P103","article-title":"The Reliability and Acceptance of Biometric System in Bangladesh: Users Perspective","volume":"69","author":"Siddique","year":"2021","journal-title":"Int. J. Comput. Trends Technol."},{"key":"ref_4","first-page":"125","article-title":"A study of users\u2019 compliance and satisfied utilization of biometric application system","volume":"30","author":"Habibu","year":"2021","journal-title":"Inf. Secur. J."},{"key":"ref_5","first-page":"992","article-title":"The Impact of Internet Banking Adoption in the Kingdom of Bahrain-Overcoming Barriers to Adoption through the Use of Biometrics","volume":"15","author":"Janahi","year":"2021","journal-title":"Int. J. Innov. Creat. Change"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Rathgeb, C., Tolosana, R., Vera-Rodriguez, R., and Busch, R. (2022). Handbook of Digital Face Manipulation and Detection, Springer.","DOI":"10.1007\/978-3-030-87664-7"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.inffus.2020.08.021","article-title":"Behavioral biometrics & continuous user authentication on mobile devices: A survey","volume":"66","author":"Stylios","year":"2021","journal-title":"Inf. Fusion"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1236","DOI":"10.1080\/09537325.2020.1758655","article-title":"User acceptance of voice biometrics in managing the physical access to a secure area of an international airport","volume":"32","author":"Cornacchia","year":"2020","journal-title":"Technol. Anal. Strateg. Manag."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"101720","DOI":"10.1016\/j.jairtraman.2019.101720","article-title":"Acceptance of biometric technology in airport check-in","volume":"81","author":"Negri","year":"2019","journal-title":"J. Air Transp. Manag."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1108\/10650741111117806","article-title":"Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams","volume":"28","author":"Levy","year":"2011","journal-title":"CWIS"},{"key":"ref_11","unstructured":"Babbie, E.R. (2021). The Practice of Social Research, Cengage Learning. [15th ed.]."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jairtraman.2016.05.005","article-title":"An empirical examination of U.S. Travelers\u2019 intentions to use biometric e-gates in airports","volume":"55","author":"Morosan","year":"2016","journal-title":"J. Air Transp. Manag."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1108\/IJIUS-02-2019-0015","article-title":"Implementing and analysing FAR and FRR for face and voice recognition (multimodal) using KNN classifier","volume":"8","author":"Kumar","year":"2020","journal-title":"Int. J. Intell. Unmanned Syst."},{"key":"ref_14","first-page":"2","article-title":"Multimodal biometric system combining left and right palmprints","volume":"48","author":"Taouche","year":"2019","journal-title":"Inf. Discov. Deliv."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"173","DOI":"10.17512\/jamcm.2017.2.14","article-title":"The overview of trends and challenges in mobile biometrics","volume":"16","author":"Wojciechowska","year":"2017","journal-title":"J. Appl. Comput. Mech."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"315","DOI":"10.15837\/ijccc.2016.3.2556","article-title":"Biometrics systems and technologies: A survey","volume":"11","author":"Buciu","year":"2016","journal-title":"Int. J. Comput. Commun. Control"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1108\/SR-07-2017-0131","article-title":"Biometric template security: An overview","volume":"38","author":"Riaz","year":"2018","journal-title":"Sens. Rev."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"743","DOI":"10.3390\/jcp1040036","article-title":"Users\u2019 Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach","volume":"1","author":"Skalkos","year":"2021","journal-title":"J. Cybersecur. Priv."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Stajano, F., Mj\u00f8lsnes, S.F., Jenkinson, G., and Thorsheim, P. (2016). Technology and Practice of Passwords, Springer.","DOI":"10.1007\/978-3-319-29938-9"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bansal, N., Verma, A., Kaur, I., and Sharma, D. (2017, January 21\u201323). Multimodal biometrics by fusion for security using genetic algorithm. Proceedings of the IEEE 4th International Conference on Signal Processing, Computing and Control (ISPCC 2017), Solan, India.","DOI":"10.1109\/ISPCC.2017.8269668"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.patrec.2017.03.027","article-title":"A multi-biometric system for continuous student authentication in e-learning platforms","volume":"113","author":"Fenu","year":"2018","journal-title":"Pattern Recognit. Lett."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Kumar, R., Phoha, V.V., and Jain, A. (2015, January 8\u201311). Treadmill attack on gait-based authentication systems. Proceedings of the IEEE 7th International Conference on Biometrics Theory, Applications and Systems, Arlington, VA, USA.","DOI":"10.1109\/BTAS.2015.7358801"},{"key":"ref_23","first-page":"145","article-title":"Prediction based person recognition using face and speech","volume":"7","author":"Kumar","year":"2018","journal-title":"Int. J. Eng. Sci. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1108\/IMCS-09-2013-0062","article-title":"The effect of adaptive mechanism on behavioural biometric based mobile phone authentication","volume":"22","author":"Meng","year":"2014","journal-title":"Inf. Manag. Comput. Secur."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Zhang, X.D.Y., and Xu, X.X. (2017, January 6\u20139). Android-based multimodal biometric identification system using feature level fusion. Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Xiamen, China.","DOI":"10.1109\/ISPACS.2017.8266457"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1108\/SR-08-2015-0136","article-title":"A survey of liveness detection methods for face biometric systems","volume":"37","author":"Xin","year":"2018","journal-title":"Sens. Rev."},{"key":"ref_27","unstructured":"Li, L.Z., Sajat, M.S., Yusof, Y., Fazea, Y., and Purba, H.S. (2022, March 22). The Design and User Acceptance of IoT-based Access and Entrance Control System Using Voice Recognition. Available online: https:\/\/www.researchgate.net\/publication\/349161710_The_Design_and_User_Acceptance_of_IoT-based_Access_and_Entrance_Control_System_Using_Voice_Recognition?channel=doi&linkId=602394184585158939936bf2&showFulltext=true."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.dss.2013.05.010","article-title":"Determinants of end-user acceptance of biometrics: Integrating the \"Big 3\" of technology acceptance with privacy context","volume":"56","author":"Miltgen","year":"2013","journal-title":"Decis. Support Syst."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Juels, A. (2004). Financial Cryptography, Springer.","DOI":"10.1007\/b98935"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Habibu, T., Luhanga, E.T., and Sam, A. (2019). Evaluation of users\u2019 knowledge and concerns of biometric passport systems. Data, 4.","DOI":"10.3390\/data4020058"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns: The construct, the scale, and a causal model","volume":"15","author":"Malhotra","year":"2004","journal-title":"Inf. Syst. Res."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","article-title":"Internet privacy concerns: An integrated conceptualization and four empirical studies","volume":"37","author":"Hong","year":"2013","journal-title":"MIS Q."},{"key":"ref_33","first-page":"1","article-title":"Alpha, Omega, and H Internal Consistency Reliability Estimates: Reviewing These Options and When to Use Them","volume":"12","author":"Kalkbrenner","year":"2021","journal-title":"Couns. Outcome Res. Eval."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"19","DOI":"10.3991\/ijet.v15i09.11867","article-title":"An empirical study of students\u2019 intention to use cloud e-learning in higher education","volume":"15","author":"Wang","year":"2020","journal-title":"Int. J. Emerg. Technol."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s10209-014-0348-1","article-title":"Technology acceptance model: A literature review from 1986 to 2013","volume":"14","year":"2015","journal-title":"Univers. Access Inf. Soc."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1242","DOI":"10.1080\/0144929X.2012.659217","article-title":"A study of executives\u2019 use of biometrics: An application of theory of planned behaviour","volume":"32","author":"Seyal","year":"2013","journal-title":"Behav. Inf. Technol."},{"key":"ref_37","first-page":"328","article-title":"Unified theory of acceptance and use of technology: A synthesis and the road ahead","volume":"17","author":"Venkatesh","year":"2016","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/07421222.2003.11045748","article-title":"The DeLone and McLean model of information systems success: A ten-year update","volume":"19","author":"DeLone","year":"2003","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/S0065-2601(08)60019-2","article-title":"Toward a hierarchical model of intrinsic and extrinsic motivation","volume":"29","author":"Vallerand","year":"1997","journal-title":"Adv. Exp. Soc. Psychol."},{"key":"ref_40","unstructured":"Onywoki, B., and Opiyo, E. (2022, November 09). A Framework for the Adoption of Biometric ATM Authentication in the Kenyan Banks. Available online: http:\/\/erepository.uonbi.ac.ke\/bitstream\/handle\/11295\/73528\/Onywoki%20_Biometric%20ATM%20authentication%20.pdf?sequence=1."},{"key":"ref_41","first-page":"661","article-title":"Customers\u2019 adoption of biometric systems in restaurants: An extension of the technology acceptance model","volume":"20","author":"Morosan","year":"2011","journal-title":"J. Hosp. Mark. Manag."},{"key":"ref_42","unstructured":"Chalikias, \u039c., Lalou, P., and Manolessou, A. (2021, July 12). Research Methodology and Introduction to Statistical Data Analysis via IBM SPSS STATISTICS. Available online: https:\/\/repository.kallipos.gr\/handle\/11419\/5075."},{"key":"ref_43","unstructured":"Bourdieu, P. (1987). Distinction: A Social Critique of the Judgement of Taste, Harvard University Press. [2nd ed.]."},{"key":"ref_44","first-page":"29","article-title":"Parental perceptions and recommendations of computing majors: A technology acceptance model approach","volume":"15","author":"Powell","year":"2017","journal-title":"Inf. Syst. Educ. J."},{"key":"ref_45","unstructured":"Rea, L.M., and Parker, R.A. (2014). Designing and Conducting Survey Research: A Comprehensive Guide, John Wiley & Sons. [3rd ed.]."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9734\/BJMCS\/2016\/25183","article-title":"Assessing the Validity and Reliability of a Measurement Model in Structural Equation Modeling (SEM)","volume":"15","author":"Ahmad","year":"2016","journal-title":"Br. J. Math. Comput. Sci."},{"key":"ref_47","unstructured":"Fischlin, M., and Katzenbeisser, S. (2013). Number Theory and Cryptography, Springer."},{"key":"ref_48","unstructured":"Keough, E., and Muir, S. (2021, July 22). UK Now Ready for Biometric Banking. Experian. Available online: https:\/\/www.experianplc.com\/media\/news\/2016\/uk-now-ready-for-biometric-banking\/."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Bhagavatula, R., Ur, B., Iacovino, K., Kywe, S.M., Cranor, L.F., and Savvides, M. (2015, January 8). Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption. Proceedings of the Workshop on Usable Security, (USEC 2015), San Diego, CA, USA.","DOI":"10.14722\/usec.2015.23003"},{"key":"ref_50","unstructured":"Tiits, M., Kalvet, T., and Laas-Mikko, K. (2014, January 10\u201312). Social acceptance of epassports. Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG), IEEE, Darmstadt, Germany."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Lee, T.Z., and Bong, D.B. (2016, January 27\u201329). Face and palmprint multimodal biometric system based on bit-plane decomposition approach. Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW, 2016), Nantou, Taiwan.","DOI":"10.1109\/ICCE-TW.2016.7520922"},{"key":"ref_52","unstructured":"Santa, I. (2021, July 22). Biometric Technology Enjoys Strong Support from Consumers, Says CTA|Business Wire. Available online: https:\/\/www.businesswire.com\/news\/home\/20160330006149\/en\/Biometric-?-Technology-?-Enjoys-?-Strong-?-Support-?-Consumers-?-CTA."},{"key":"ref_53","unstructured":"Doyle, J. (2021, July 15). Accenture Research Shows Citizen Support for Biometrics to Facilitate Travel and Secure Borders Accenture Newsroom. Available online: https:\/\/newsroom.accenture.com\/industries\/health-public-service\/accenture-research-shows-citizen-support-for-use-of-biometrics-to-facilitate-travel-and-secure-borders.htm."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1504\/IJBM.2012.047644","article-title":"Evaluation of biometric systems: A study of users\u2019 acceptance and satisfaction","volume":"4","author":"Giot","year":"2012","journal-title":"Int. J. Biometr."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Vgena, K., Kitsiou, A., Kalloniatis, C., and Gritzalis, S. (2022). Determining the Role of Social Identity Attributes to the Protection of Users\u2019 Privacy in Social Media. Future Internet, 14.","DOI":"10.3390\/fi14090249"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1108\/ICS-12-2021-0211","article-title":"Understanding the role of users\u2019 socio-location attributes and their privacy implications on social media","volume":"30","author":"Vgena","year":"2022","journal-title":"Inf. Comput. Secur."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Kitsiou, A., Tzortzaki, E., Kalloniatis, C., and Gritzalis, S. (2021). Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks. Future Internet, 13.","DOI":"10.3390\/fi13020023"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Vgena, K., Kitsiou, A., Kalloniatis, C., Kavroudakis, D., and Gritzalis, S. (2019). Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes. Future Internet, 11.","DOI":"10.3390\/fi11110234"},{"key":"ref_59","first-page":"117","article-title":"Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts","volume":"Volume 12501","author":"Katsikas","year":"2020","journal-title":"CyberICPS 2020 6th Workshop on Security of Industrial Control Systems and Cyber-Physical Systems in Conjunction with 25th European Symposium on Research in Computer Security (ESORICS)"},{"key":"ref_60","unstructured":"Kitsiou, A., Tzortzaki, E., Kalloniatis, C., and Gritzalis, S. (2020). International Conference on Trust and Privacy in Digital Business, Springer."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/11\/328\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T03:22:56Z","timestamp":1728357776000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/11\/328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,13]]},"references-count":60,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["fi14110328"],"URL":"https:\/\/doi.org\/10.3390\/fi14110328","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2022,11,13]]}}}