 2009 - Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, 2009. 1 Towards a Development of a Learners’ Ratified Acceptance of Multi-biometrics.

Slides:



Advertisements
Similar presentations
 Dr. Yair Levy & Dr. Michelle M. Ramim – Chais 2011 Conference, February 17, From E-learning Courses to Businesses: What Technologies Do They.
Advertisements

Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Department of Labor HSPD-12
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
 Dr. Yair Levy – Chais 2008, Israel – February 6, Towards an Empirical Development of Critical Value Factors of Online Learning Activities.
Chais Conference, Raanana, February 20, 2007 Nitza Geri, Orr Mendelson, David Gefen How to Increase Student Retention in MBA Programs with an Online Element?
 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, A Theoretical Approach for Biometrics Authentication of e-Exams By:
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2010, Israel – February 10, Students’ Perceived Ethical Severity of e-Learning Security Attacks.
Biometrics and Authentication Shivani Kirubanandan.
Procrastination in Online Exams: What Data Analytics Can Tell Us? Yair Levy, Ph.D. Graduate School of Computer and Information Sciences Michelle M. Ramim,
Biometrics: Voice Recognition
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Thermal imaging of ear biometrics Steinar Watne. Outline – Introduction to biometrics – Ear as biometric – Research questions – Experiment – Pre-processing.
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
National Smartcard Project Work Package 8 – Security Issues Report.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Deb Gearhart Trot University Student Authentication – What it Means for Us.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BY CHEN YEAH TECK Image-Based Authentication for Mobile Phones: Performance and User Opinions Source: Slippery Brick (2006)
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Information commitments, evaluative standards and information searching strategies in web-based learning evnironments Ying-Tien Wu & Chin-Chung Tsai Institute.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Students’ Perceived Ethical Severity of e-Learning Security Attacks
Biometric Security Technology Acceptance Study
Biometrics : From Yesterday to Tomorrow
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
State of e-Authentication in Higher Education Bernie Gleason
Assessing the Value of e-Learning Systems*
Follow My Voice: The Future of PHR Authentication
Seminar Presentation on Biometrics
Facial Recognition in Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BY: Michael Etse and Maverick Fermill
Presentation transcript:

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Towards a Development of a Learners’ Ratified Acceptance of Multi-biometrics Intentions Model (RAMIM): Initial Empirical Results By: Yair Levy Yair Levy Nova Southeastern University and Michelle M. Ramim Nova Southeastern University

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Outline Introduction Statement of the problem Objective Theoretical background Proposed initial model and propositions Methodology and sample Data analysis and results Implications Proposed revised model

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Introduction Growing use of organizational electronic records Growing use e-learning Valid authentication of users is a perpetual challenge amongst organizations Authentication should expand beyond the limited username/password verification Reduce misuse and unethical conduct * Source: United States Department of Education, National Center of Educational Statistics (NCES) (2005)

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Introduction (Cont.) The use of information security related devices in highly secured environments: –Financial institutions –Government agencies –Military facilities Expanded utility for management –Employee attendance –Track employee daily activities

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Statement of the problem A growing concern –Invasiveness of biometric devices –Effective safeguarding of biometric information –Potential misuse of information captured by biometric devices –Increase of identity fraud crimes –Compromising of existing identification methodologies

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Statement of the problem (Cont.) Context of e-learning systems Issues with academic misconduct A new trend Integrate more than a single biometric method of authentication Increase accuracy Transparency Reliability beyond the initial point of entry Monitoring real-time users’ activity in a non-intrusive manner

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Objectives Multi-biometric authentication method Initial empirical results Develop and validate a learners’ Ratified Acceptance of Multi-biometrics Intentions Model (RAMIM). The multi-biometric authentication –Two devices: fingerprint scanner and Web- cam head geometry scanner

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Theoretical Background Authentication Theory –Authentication is the process whereby the system verifies the user’s identity as declared (Liebl, 1993). –Two principal authentication elements: Identification - the user declares their identity Verification - the identity is validated –There are several established authentication protocols (password authentication protocol (PAP), encryption, etc.)

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Theoretical Background (Cont.) User authentication: (Furnell et al., 2000) –Something the user knows (e.g. password or personal identification number (PIN)) –Something the user has (e.g. a card, token, etc) –Something the user is (e.g. a biometric characteristic) Passwords are the most common authentication method (Oorschot & Thorpe, 2008; Rodwell, Furnell, & Reynolds, 2007) Passwords tend to be undermined by users Promote additional authentication methods –Physiological and behavioral biometrics –Multiple means of authentications

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Theoretical Background (Cont.) Biometrics - a process that examines unique biological characteristics of humans (James et al., 2006) –DNA, voice, retinal and iris, fingerprints, facial images, hand prints, or other unique biological characteristics –Biometric technologies operate by scanning a biological characteristic and matching it with the stored data –Behavioral characteristics - keystrokes dynamics, and mouse clicks (Sasamoto et al., 2008; Pusara & Brodley, 2004) Further work is needed to commercialize such methods to large scale systems.

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Multi-Biometrics A multilateral model scheme that utilizes a mixture of two or more biological and/or physiological characteristics that the end-user has in a secured environment Multi-biometrics can enable ongoing non- intrusive verification not only at the point of entry but also throughout the logged-in session. Use in various corporate and e-learning situations. The context outlined here is during e-exams.

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Users’ Acceptance of Technology Challenges in experiments with biometrics Before moving to experiments with actual systems, seek better understanding of the acceptance of such systems by the users (Venkatesh et al., 2003) Users’ perceived usefulness and ease-of-use are strong predictors of technology acceptance (Davis, 1989; Simon & Paper, 2007; Venkatesh et al., 2003; Viswanath & Hillol, 2008). –Theory of Reasoned Action (TRA) (Ajzen & Fishbein, 1980). Intention to use a technology is a significant predictor of actual use (Bagozzi, 2007; Gefen et al., 2003)

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Ethical Decision Making Users’ ethical decisions making Ethical issues with the use of e-learning systems have been a growing concern Users who are more ethically driven will be open to accept multi-biometrics Learners who are more ethically driven will be more inclined to use multi-biometrics during e- exams.

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Familiarity with Code of Conduct Users’ familiarity with code of conduct (Chonko, 2003; Harris, 2002). Users who are more familiar with the organization’s code of conduct will be open to accept security devices as they understand the need to maintain proper conduct (Wotruba et al., 2001).

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Proposed Initial Model

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Propositions P1: Learners’ familiarity with university’s code of conduct will have a significant positive contribution to their intention to use multi-biometrics for authentication during e-learning exams. P2: Learners’ perceived ease-of-use will have a significant positive contribution to their intention to use multi- biometrics for authentication during e-learning exams. P3: Learners’ perceived usefulness will have a significant positive contribution to their intention to use multi- biometrics for authentication during e-learning exams. P4: Learners’ ethical decision making will have a significant positive contribution to their intention to use multi- biometrics for authentication during e-learning exams.

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Methodology Use of validated measures from prior literature –Perceived ease-of-use, perceived usefulness, and intention to use were adopted (Gefen et al., 2003; James et al., 2006). –Familiarity with the code of conduct and ethical decision making (Ramim, 2007). All items used 5-point Likert-type scale. Survey items were specifically in the context of intention to use multi-biometrics for authentication during e-learning exams. Used Ordinal Logistic Regression (OLR) for initial data. Plan to use Structural Equations Modeling (SEM) in the future.

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Sample The sample: 97 entry level managers from service oriented organization and government agencies in USA who attended e-learning Masters of Business Administration (MBA) and Masters of Public Administration (MPA) courses. Gender distribution: 61% males and 39% females About 60% between the ages of Majority (above 81%) had previously taken two or more e-learning courses

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Data Analysis and Results Overall Ordinal Logistic Regression Model Fit (N= 97) Ordinal Logistic Regression Parameter Estimates Results (N= 97)

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Data Analysis and Results (Cont.)

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Proposed Revised Model

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Thank you! Questions?

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Michelle M. Ramim, Ph.D. Part-time Professor Nova Southeastern University H. Wayne Huizenga School of Business and Entrepreneurship The DeSantis Building 3301 College Avenue Ft. Lauderdale, FL Site: Contact Information - Michelle

 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Yair Levy, Ph.D. Associate Professor Nova Southeastern University Graduate School of Computer and Information Sciences The DeSantis Building - Room College Avenue Fort Lauderdale, FL Tel.: Fax: Site: Contact Information - Yair