The Reliability and Acceptance of Biometric System in Bangladesh: Users Perspective

  IJCTT-book-cover
 
         
 
© 2021 by IJCTT Journal
Volume-69 Issue-6
Year of Publication : 2021
Authors : Shaykh Siddique, Monica Yasmin, Tasnova Bintee Taher, Mushfiqul Alam
DOI :  10.14445/22312803/IJCTT-V69I6P103

How to Cite?

Shaykh Siddique, Monica Yasmin, Tasnova Bintee Taher, Mushfiqul Alam, "The Reliability and Acceptance of Biometric System in Bangladesh: Users Perspective," International Journal of Computer Trends and Technology, vol. 69, no. 6, pp. 1-6, 2021. Crossref, https://doi.org/10.14445/22312803/IJCTT-V69I6P103

Abstract
Biometric systems are the latest technologies of unique identification. People all over the world prefer to use this unique identification technology for their authentication security. The goal of this research is to evaluate the biometric systems based on system reliability and user satisfaction. As technology fully depends on personal data, so in terms of the quality and reliability of biometric systems, user satisfaction is a principal factor. To walk with the digital era, it is extremely important to assess users’ concerns about data security as the systems are conducted the authentication by analyzing users’ personal data. The study shows that users are satisfied by using biometric systems rather than other security systems. Besides, hardware failure is a big issue faced by biometric systems users. Finally, a matrix is generated to compare the performance of popular biometric systems from the users’ opinions. As system reliability and user satisfaction are the focused issue of this research, biometric service providers can use these phenomena to find what aspect of improvement they need for their services. Also, this study can be a great visualizer for Bangladeshi users, so that they can easily realize which biometric system they have to choose.

Keywords
Biometric systems, User concern, Preference, Reliability, Acceptance, Security.

Reference

[1] R. E. O. Paderes, A Comparative Review of Biometric Security Systems, Proc. - 8th Int. Conf. Bio-Science Bio-Technology, BSBT 2015, 8–11, 2016.
[2] S. I. Ahmed, M. R. Hoque, S. Guha, M. R. Rifat, and N. Dell, Privacy, security, and surveillance in the global south: A study of biometric mobile SIM registration in Bangladesh, Conf. Hum. Factors Comput. Syst. - Proc., (2017) 906–918.
[3] V. Andronikou, D. S. Demetis, T. Varvarigou, I. Group, and H. Street, Biometric Implementations and the Implications for Security and Privacy, 1st in-house FIDIS J. (1)(2007) 1–20.
[4] Standard Chartered Bank - Touch Registration and Login. [Online]. Available: https://www.onlinebanking.standardchartered.com/login/IBank?ser=100&act=TouchId Registration.jsp&cntry=BD. [Accessed: 24-Sep-2019].
[5] Bangladesh Introduces ‘Smart’ National Identity Cards - Global Voices Advox. [Online]. Available: https://advox.globalvoices.org/2016/10/07/bangladesh-introducessmart-national-identity-cards/. [Accessed: 24-Sep-2019].
[6] Joy launches NID verification gateway server | Dhaka Tribune. [Online]. Available: https://www.dhakatribune.com/bangladesh/governmentaffairs/2019/07/17/joy-to-launch-nid-verification-gateway. [Accessed: 24-Sep-2019].
[7] Global Biometric System Market Research Report- Forecast 2023 | MRFR. [Online]. Available: https://www.marketresearchfuture.com/reports/biometric-systemmarket-3754. [Accessed: 24-Sep-2019].
[8] W. Yang, S. Wang, J. Hu, G. Zheng, and C. Valli, Security and accuracy of fingerprint-based biometrics: A review, Symmetry (Basel)., 11(2) (2019).
[9] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, Generating cancelable fingerprint templates, IEEE Trans. Pattern Anal. Mach. Intell., 29(4) (2007) 561–572.
[10] J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia, A high performance fingerprint liveness detection method based on quality related features, Futur. Gener. Comput. Syst., 28(1) (2012) 311–321.
[11] Y. Liu, Identifying legal concerns in the biometric context, J. Int. Commer. Law Technol., 3(1) (2008) 45–54.
[12] M. Faúndez-Zanuy, On the vulnerability of biometric security systems, IEEE Aerosp. Electron. Syst. Mag., 19(6) (2004) 3–8.
[13] Martyn Denscombe, The Good Research Guide for small-scale social research projects, Open Univ. Press. McGraw-Hill Educ., vol. Fourth Edi, (2012) 7–200.
[14] Mobile Phone Subscribers in Bangladesh March, 2019. | BTRC. [Online]. Available: http://www.btrc.gov.bd/content/mobile-phonesubscribers-bangladesh-march-2019. [Accessed: 29-Oct-2019].
[15] P. Ambalakat, Security of Biometric Authentication Systems, 21st Comput. Sci. Semin., no. SA1-T1-1.
[16] Computer Failure Leaves State Dept. Unable to Issue Visas - The New York Times. [Online]. Available: https://www.nytimes.com/2015/06/23/world/americas/computerfailure-leaves-state-dept-unable-to-issue-visas.html?smid=twnytimes. [Accessed: 26-Nov-2019].
[17] Troy Hunt: The 773 Million Record ‘Collection #1’ Data Breach. [Online]. Available: https://www.troyhunt.com/the-773-millionrecord-collection-1-data-reach/. [Accessed: 26-Nov-2019].