{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T02:21:26Z","timestamp":1774491686582,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2009,6,23]],"date-time":"2009-06-23T00:00:00Z","timestamp":1245715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1007\/s00146-009-0218-1","type":"journal-article","created":{"date-parts":[[2009,6,22]],"date-time":"2009-06-22T05:04:36Z","timestamp":1245647076000},"page":"295-306","source":"Crossref","is-referenced-by-count":38,"title":["Culture &amp; biometrics: regional differences in the perception of biometric authentication technologies"],"prefix":"10.1007","volume":"24","author":[{"given":"Chris","family":"Riley","sequence":"first","affiliation":[]},{"given":"Kathy","family":"Buckner","sequence":"additional","affiliation":[]},{"given":"Graham","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"David","family":"Benyon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,23]]},"reference":[{"key":"218_CR1","unstructured":"Acuity (2007) The future of biometrics. Acuity Market Intelligence"},{"key":"218_CR2","doi-asserted-by":"crossref","unstructured":"Al-Gahtani S (2002) Extending the technology acceptance model beyond its country of origin: a cultural test in Western Europe. In: Khosrowpour M (ed) Advanced topics in information resources management. Idea Group Inc","DOI":"10.4018\/978-1-930708-44-0.ch010"},{"key":"218_CR3","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1023\/B:ETIN.0000006918.22060.1f","volume":"5","author":"A Alterman","year":"2003","unstructured":"Alterman A (2003) \u201cA piece of yourself\u201d: ethical issues in biometric identification. Ethics Inf Technol 5:139\u2013150","journal-title":"Ethics Inf Technol"},{"key":"218_CR4","doi-asserted-by":"crossref","unstructured":"Ashbourn J (2000) Biometrics: advanced identity management. Springer","DOI":"10.1007\/978-1-4471-0747-7"},{"key":"218_CR36","unstructured":"Aziz M, Riley C, Johnson GI (2008) Usability challenges in emerging markets. Paper presented at the international conference on enterprise and information systems, Barcelona"},{"key":"218_CR6","unstructured":"BBC (2007) Hackers target TK Maxx customers. http:\/\/news.bbc.co.uk\/1\/hi\/business\/6508983.stm . Accessed 12 Sep 2008"},{"key":"218_CR7","unstructured":"Benyon D, Turner P, Turner S (2005) Designing interactive systems. Pearson Education"},{"key":"218_CR8","unstructured":"BioSec (2004) Report on results of first phase usability testing and guidelines for developers. BioSec Consortium"},{"issue":"12","key":"218_CR9","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1101779.1101784","volume":"34","author":"A Chandra","year":"2005","unstructured":"Chandra A, Calderon T (2005) Challenges and constraints to the diffusion of biometrics in information systems. Commun ACM 34(12):101\u2013106","journal-title":"Commun ACM"},{"key":"218_CR23","unstructured":"CNN Money (2007) T.J. Maxx owner: 46M card numbers stolen. http:\/\/money.cnn.com\/2007\/03\/29\/news\/companies\/tjx\/index.htm?cnn=yes . Accessed 12 Sept 2008"},{"key":"218_CR10","unstructured":"Coventry L, DeAngeli A, Johnson G (2003) Honest it\u2019s me! Self service verification. Paper presented at the ACM CHI conference 2003, Workshop on Human-Computer Interaction and Security Systems"},{"key":"218_CR11","unstructured":"Coventry L, DeAngeli A, Johnson G (2003) Biometric verification at a self service interface. Paper presented at the British Ergonomics Society Conference, Edinburgh"},{"issue":"3","key":"218_CR12","doi-asserted-by":"crossref","first-page":"318","DOI":"10.2307\/249008","volume":"13","author":"F Davis","year":"1989","unstructured":"Davis F (1989) Perceived usefulness, perceived ease of use, and end user acceptance of information technology. MIS Q 13(3):318\u2013339","journal-title":"MIS Q"},{"key":"218_CR13","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/0167-4048(95)00005-S","volume":"14","author":"F Deane","year":"1995","unstructured":"Deane F, Barrelle K, Henderson R, Mahar D (1995) Perceived acceptability of biometric security systems. Comput Secur 14:225\u2013231","journal-title":"Comput Secur"},{"key":"218_CR14","doi-asserted-by":"crossref","unstructured":"DeAngeli A, Kyriakoullis L (2006) Globalisation vs. localisation in e-commerce: cultural-aware interaction design. Paper presented at the Advanced Visual Interfaces Conference, Venezia, Italy","DOI":"10.1145\/1133265.1133314"},{"key":"218_CR17","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/j.jwb.2006.08.005","volume":"41","author":"AA Erumban","year":"2006","unstructured":"Erumban AA, Jong SB (2006) Cross-country differences in ICT adoption: a consequence of culture? J World Bus 41:302\u2013314","journal-title":"J World Bus"},{"issue":"3","key":"218_CR18","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1023\/A:1027452919403","volume":"14","author":"Y Mv Everdingen","year":"2004","unstructured":"Everdingen Y Mv, Waarts E (2004) The effect of national culture on the adoption of innovations. Mark Lett 14(3):217\u2013232","journal-title":"Mark Lett"},{"key":"218_CR19","unstructured":"Frick A, B\u00e4chtiger M, Reips U-D (1999) Financial incentives, personal information, and dropout in online studies. In: Reips U-D, Bosnjak M (eds) Dimensions of internet science. Pabst Science, pp 209\u2013219"},{"key":"218_CR20","doi-asserted-by":"crossref","unstructured":"Han S (2006) Effects of alphanumerical display formatting on search time among Chinese and American users. Paper presented at the SIGCHI conference on human factors in computing systems, Montreal, Canada","DOI":"10.1145\/1125451.1125616"},{"key":"218_CR21","unstructured":"Hofstede G (1984) Culture\u2019s consequences: comparing values, behaviours, institutions, and organizations across nations, 1st edn. Sage Publications"},{"key":"218_CR22","unstructured":"Hofstede G (2001) Culture\u2019s consequences: comparing values, behaviours, institutions, and organizations across nations, 2nd edn. Sage Publications"},{"key":"218_CR24","unstructured":"IBG (2007) biometrics market and industry report 2007-2012. International Biometrics Group"},{"issue":"2","key":"218_CR25","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/328236.328110","volume":"43","author":"A Jain","year":"2000","unstructured":"Jain A, Hong L, Pankanti S (2000) Biometric identification. Commun ACM 43(2):91\u201398","journal-title":"Commun ACM"},{"key":"218_CR26","doi-asserted-by":"crossref","unstructured":"Jhangiani I, Smith-Jackson T (2006) Comparison of mobile phone user interface design preferences: perspectives from nationality and disability culture. Paper presented at the mobile technology, applications and systems conference (Mobility 2007), Singapore","DOI":"10.1145\/1378063.1378146"},{"key":"218_CR27","doi-asserted-by":"crossref","unstructured":"Joinson AN, Paine C, Buchanan T, Reips U-D (2006) Watching me, watching you: privacy attitudes and reactions to identity card implementation scenarios in the United Kingdom. J Inf Sci 32(4):334\u2013343","DOI":"10.1177\/0165551506064902"},{"key":"218_CR28","first-page":"407","volume":"9","author":"M Jones","year":"2007","unstructured":"Jones M, Alony I (2007) The cultural impact of information systems\u2014through the eyes of Hofstede\u2014a critical journey. Issues Inf Sci Inf Technol 9:407\u2013419","journal-title":"Issues Inf Sci Inf Technol"},{"key":"218_CR29","doi-asserted-by":"crossref","unstructured":"Kamppuri M, Bednarik R, Tukiainen M (2006) The expanding focus of HCI: case culture. Paper presented at the NordiCHI, Oslo","DOI":"10.1145\/1182475.1182523"},{"issue":"2","key":"218_CR30","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1111\/j.1745-6606.2005.00017.x","volume":"39","author":"J Langenderfer","year":"2005","unstructured":"Langenderfer J, Linnhoff S (2005) The emergence of biometrics and its effect on consumers. J Consum Aff 39(2):314","journal-title":"J Consum Aff"},{"issue":"2","key":"218_CR31","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1177\/0018726702055001602","volume":"55","author":"B McSweeney","year":"2002","unstructured":"McSweeney B (2002) Hofstede\u2019s model of national cultural differences and their consequences: a triumph of faith\u2014a failure of analysis. Hum Relat 55(2):89\u2013118","journal-title":"Hum Relat"},{"key":"218_CR32","unstructured":"Michaels L (2008) Biometric security for mobile banking. World Resources Institute"},{"key":"218_CR34","unstructured":"NASSCOM (2008) Indian IT\/ITES industry: impacting economy and society 2007-08. National Association of Software and Service Companies"},{"key":"218_CR35","unstructured":"Renaud K (2005) Evaluating authentication mechanisms. In: Cranor LF, Garfinkel S (eds) Security and usability. O\u2019Reilly"},{"key":"218_CR37","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1136\/jech.54.1.71","volume":"54","author":"P-J Roberts","year":"2000","unstructured":"Roberts P-J, Roberts C, Sibbald B, Torgerson DJ (2000) The effect of a direct payment or a lottery on questionnaire response rates: a randomised controlled trial. J Epidemiol Community Health 54:71\u201372","journal-title":"J Epidemiol Community Health"},{"key":"218_CR38","unstructured":"Royal Society (2006) A degree of concern? UK first degrees in science, technology and mathematics. Royal Society"},{"key":"218_CR39","unstructured":"Ruttenburg B, Jones A (2006) Biometrics: industry overview for the investment community. Morgan Keegan"},{"key":"218_CR40","unstructured":"Sasse A (2004) Usability and trust in information systems, University College London"},{"key":"218_CR41","unstructured":"Shukla R (2001) Peoples\u2019 perception towards science and technology. National Council of Applied Economic Research (NCAER)"},{"issue":"1","key":"218_CR42","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/506740.506744","volume":"32","author":"SJ Simon","year":"2001","unstructured":"Simon SJ (2001) The impact of culture and gender on web sites: an empirical study. DATA BASE Adv Inf Syst 32(1):18\u201338","journal-title":"DATA BASE Adv Inf Syst"},{"issue":"3","key":"218_CR43","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1177\/017084069401500307","volume":"15","author":"M Sondergaard","year":"1994","unstructured":"Sondergaard M (1994) Hofstede\u2019s consequences: a study of reviews, citations and replications. Organ Stud 15(3):447\u2013456","journal-title":"Organ Stud"},{"key":"218_CR44","unstructured":"Stewart OT, Chakraborty J (2008) Did Hofstede get it right? Enculturating automatic speech recognition systems. Paper presented at the enculturating interfaces workshop on IUI, Canary Islands"},{"key":"218_CR45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0378-7206(97)00026-8","volume":"33","author":"D Straub","year":"1997","unstructured":"Straub D, Keil M, Brenner W (1997) Testing the technology acceptance model across cultures: a three country study. Inf Manag 33:1\u201311","journal-title":"Inf Manag"},{"key":"218_CR46","unstructured":"Sun H (2002) Exploring cultural usability. Paper presented at the professional communication conference, New York"},{"key":"218_CR47","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0148-2963(02)00480-0","volume":"58","author":"S Sundqvist","year":"2005","unstructured":"Sundqvist S, Frank L, Puumalainen K (2005) The effects of country characteristics, cultural similarity and adoption timing on the diffusion of wireless communications. J Bus Res 58:107\u2013110","journal-title":"J Bus Res"},{"key":"218_CR48","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.intcom.2006.01.004","volume":"18","author":"DT Toledano","year":"2006","unstructured":"Toledano DT, Pozo RF, Trapote AH, Gomez LH (2006) Usability evaluation of multi-modal biometric verification systems. Interact Comput 18:1101\u20131122","journal-title":"Interact Comput"},{"key":"218_CR49","doi-asserted-by":"crossref","unstructured":"Tractinsky N (1997) Aesthetics and apparent usability: empirically assessing cultural and methodological issues. Paper presented at the AMC CHI conference, 1997","DOI":"10.1145\/258549.258626"},{"key":"218_CR50","unstructured":"UKPS (2005) UK passport service biometrics enrolment trial. Atos Origin"},{"key":"218_CR51","unstructured":"United Nations (2002) The Eighth United Nations survey on crime trends and the operations of criminal justice systems (2001\u20132002). United Nations"},{"key":"218_CR52","unstructured":"United Nations (2006) Human development report 2006. Beyond scarcity: power, poverty and the global water crisis. United Nations Development Programme"},{"issue":"3","key":"218_CR53","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425\u2013478","journal-title":"MIS Q"},{"key":"218_CR54","doi-asserted-by":"crossref","unstructured":"Yeo A (2001) Global-software development lifecycle: an exploratory study. Paper presented at the CHI, Seattle","DOI":"10.1145\/365024.365060"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-009-0218-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00146-009-0218-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-009-0218-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T12:25:34Z","timestamp":1558700734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00146-009-0218-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,23]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["218"],"URL":"https:\/\/doi.org\/10.1007\/s00146-009-0218-1","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6,23]]}}}