{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T06:34:39Z","timestamp":1769063679459,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,7,11]],"date-time":"2014-07-11T00:00:00Z","timestamp":1405036800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Tourism"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s40558-014-0014-8","type":"journal-article","created":{"date-parts":[[2014,7,10]],"date-time":"2014-07-10T17:52:44Z","timestamp":1405014764000},"page":"219-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Biometric technology and privacy: a perspective from tourist satisfaction"],"prefix":"10.1007","volume":"14","author":[{"given":"Han-Foon","family":"Neo","sequence":"first","affiliation":[]},{"given":"Devinaga","family":"Rasiah","sequence":"additional","affiliation":[]},{"given":"David Yoon Kin","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Chuan-Chin","family":"Teo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,11]]},"reference":[{"key":"14_CR1","unstructured":"Albright M (2006) No cash? No card? Just stick in finger\u201d. Retrieved from: http:\/\/www.sptimes.com\/2006\/06\/20\/Business\/No_cash_No_card_Just_.shtml . Accessed 15 June 2010"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Bilgihan A, Beldona, S, Cobanoglu C (2009) The Adoption of Fingerprint Payment Technology Mechanisms at the Customer End. In: Information and Communication Technologies in Tourism, pp 261\u2013272","DOI":"10.1007\/978-3-211-93971-0_22"},{"key":"14_CR3","unstructured":"Biometric Passport (2014) Retrieved from: https:\/\/en.wikipedia.org\/wiki\/Biometric_passport . Accessed 10 Jan 2011"},{"key":"14_CR4","unstructured":"Breward M, Head M, Hassanein K (2009) Consumer acceptance of biometrics for identity verification in financial transactions. In: ECIS 2009 Proceedings of Paper 294. http:\/\/aisel.aisnet.org\/ecis2009\/294"},{"key":"14_CR5","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1057\/palgrave.ejis.3000438","volume":"11","author":"SA Brown","year":"2002","unstructured":"Brown SA, Massey AP, Montoya-Weiss MM, Burkman JR (2002) Do I really have to? User acceptance of mandated technology. Eur J Inf Syst 11:283\u2013295","journal-title":"Eur J Inf Syst"},{"key":"14_CR6","unstructured":"Carpenter DR, Mcleod AJ, Clark JG (2008) Using biometric authentication to improve fire ground accountability: an assessment of firefighter privacy concerns. In: Americans Conference on Information Systems, pp 1\u201310"},{"issue":"10","key":"14_CR7","first-page":"519","volume":"11","author":"FKY Chan","year":"2010","unstructured":"Chan FKY, Thong JYL, Venkatesh V, Brown SA, Hu PJ-H, Tam KY (2010) Modeling citizen satisfaction with mandatory adoption of an E-Government Technology. J Assoc for Inf Syst 11(10):519\u2013549","journal-title":"J Assoc for Inf Syst"},{"issue":"3","key":"14_CR8","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319\u2013340","journal-title":"MIS Q"},{"key":"14_CR9","unstructured":"Faster Entry into Australia with E-Passport (2014) The Star, p 42. Retrieved from: http:\/\/www.thestar.com.my\/News\/Regional\/2014\/02\/27\/Faster-entry-into-Australia-withepassport\/ . Accessed 27 Feb 2014"},{"key":"14_CR10","unstructured":"Fightglobal (2012) Airport Security. Retrieved from: http:\/\/www.flightglobal.com\/features\/9-11\/airport-security\/ . Accessed 5 May 2012"},{"key":"14_CR11","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","volume":"48","author":"C Fornell","year":"1981","unstructured":"Fornell C, Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 48:39\u201350","journal-title":"J Mark Res"},{"key":"14_CR12","unstructured":"Frederick SL (2009) American privacy: the 400-Year History of Our Most Contested Right Beacon. ISBN: 9780807044414"},{"issue":"2","key":"14_CR13","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/0160-7383(91)90002-S","volume":"18","author":"A Geva","year":"1991","unstructured":"Geva A, Goldman A (1991) Satisfaction measurement in guided tours. Ann Tour Res 18(2):177\u2013185","journal-title":"Ann Tour Res"},{"key":"14_CR14","volume-title":"Multivariate data analysis","author":"JF Hair","year":"2010","unstructured":"Hair JF, Black WC, Babin BJ, Anderson RE (2010) Multivariate data analysis, 7th edn. Prentice Hall, Upper Saddle River, New Jersey","edition":"7"},{"key":"14_CR15","unstructured":"Ho G, Stephens G, Jamieson R (2003) Biometric Authentication Adoption Issues. In: Australasian Conference on Information Systems, pp 1\u201312"},{"issue":"1","key":"14_CR16","first-page":"76","volume":"3","author":"SL Hoe","year":"2008","unstructured":"Hoe SL (2008) Issues and procedures in adopting structural equation modeling technique. J Appl Quant Methods 3(1):76\u201383","journal-title":"J Appl Quant Methods"},{"key":"14_CR17","unstructured":"Immigration Malaysia (2011) Immigration Department of Malaysia. Retrieved from: www.imi.gov.my . Accessed 15 June 2010"},{"key":"14_CR18","unstructured":"IRIS (2013) Iris Recognition Immigration System. Retrieved from: http:\/\/www.ukba.homeoffice.gov.uk\/customs-travel\/Enteringtheuk\/usingiris\/ . Accessed 16 June 2013"},{"issue":"1","key":"14_CR19","first-page":"1","volume":"14","author":"A Jain","year":"2004","unstructured":"Jain A, Ross A, Pankanti S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol Spec Issue Image Video Based Biom 14(1):1\u201329","journal-title":"IEEE Trans Circuits Syst Video Technol Spec Issue Image Video Based Biom"},{"issue":"2","key":"14_CR20","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"A Jain","year":"2006","unstructured":"Jain A, Ross A, Pankanti S (2006) Biometrics: a tool for information security. IEEE Trans Inf Forensics Secur 1(2):125\u2013143","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"14_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/joeuc.2006070101","volume":"18","author":"T James","year":"2006","unstructured":"James T, Pirim T, Boswell K, Reithel B, Barkhi R (2006) Determining the intention to use biometric devices: an application and extension of the technology acceptance model. J Organ End User Comput 18(3):1\u201324","journal-title":"J Organ End User Comput"},{"issue":"1\u20132","key":"14_CR22","first-page":"162","volume":"17","author":"JS Kim","year":"2008","unstructured":"Kim JS, Brewer P, Bernhard B (2008) Hotel customer perceptions of biometric door locks: convenience and security factors. J Hosp Leis Mark 17(1\u20132):162\u2013183","journal-title":"J Hosp Leis Mark"},{"issue":"3","key":"14_CR23","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/0160-7383(90)90004-B","volume":"17","author":"N Leiper","year":"1990","unstructured":"Leiper N (1990) Tourist attraction systems. Ann Tour Res 17(3):367\u2013384","journal-title":"Ann Tour Res"},{"key":"14_CR24","volume-title":"The limits to satisfaction","author":"W Leiss","year":"1979","unstructured":"Leiss W (1979) The limits to satisfaction. University of Toronto Press, Toronto"},{"key":"14_CR25","unstructured":"Loh FF (2014) Tourism sector rakes in more money for nation. The Star, p 4"},{"key":"14_CR26","unstructured":"Longino C (2006) Pull my finger for payment. Retrieved from: http:\/\/www.techdirt.com\/articles\/20060125\/0922251.shtml . Accessed 15 June 2010"},{"issue":"4","key":"14_CR27","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1016\/j.lisr.2007.07.001","volume":"29","author":"T Magi","year":"2007","unstructured":"Magi T (2007) The gap between theory and practice: a study of the prevalence and strength of patron confidentiality policies in public and academic libraries. Libr Inf Sci Res 29(4):455\u2013470","journal-title":"Libr Inf Sci Res"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Matsumoto T, Matsumoto H, Yamada K, Hoshino S (2002) Impact of Artificial Gummy Fingers on Fingerprint Systems. In: Proceedings of SPIE, vol. 4677, Optical Security and Counterfeit Deterrence Techniques IV","DOI":"10.1117\/12.462719"},{"key":"14_CR29","doi-asserted-by":"crossref","first-page":"1269","DOI":"10.1068\/a121269","volume":"12","author":"PA McCarthy","year":"1980","unstructured":"McCarthy PA (1980) A study of the importance of generalized attributes in shopping centre behavior. Environ Plan 12:1269\u20131286","journal-title":"Environ Plan"},{"issue":"2","key":"14_CR30","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/S0148-2963(01)00301-0","volume":"57","author":"S McQuitty","year":"2004","unstructured":"McQuitty S (2004) Statistical power and structural equation models in business research. J Bus Res 57(2):175\u2013183","journal-title":"J Bus Res"},{"issue":"6","key":"14_CR31","first-page":"661","volume":"20","author":"C Morosan","year":"2012","unstructured":"Morosan C (2012) Customers\u2019 adoption of biometric systems in restaurants: an extension of the technology acceptance model. J Hosp Mark Manag 20(6):661\u2013690","journal-title":"J Hosp Mark Manag"},{"issue":"2","key":"14_CR32","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1108\/09596110910935697","volume":"21","author":"HC Murphy","year":"2009","unstructured":"Murphy HC, Rottet D (2009) An exploration of the key hotel processes implicated in biometric adoption. Int J Contemp Hosp Manag 21(2):201\u2013212","journal-title":"Int J Contemp Hosp Manag"},{"key":"14_CR33","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1177\/0047287507312434","volume":"47","author":"JD Neal","year":"2008","unstructured":"Neal JD, Gursoy D (2008) A multifaceted analysis of tourism satisfaction. J Travel Res 47:53\u201362","journal-title":"J Travel Res"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Perakslis C, Wolk R (2005) Social acceptance of RFID as a biometric security method. In: IEEE International Symposium on Technology and Society (ISTAS) weapons and wires: prevention and safety in a time of Fear, pp 79\u201387","DOI":"10.1109\/ISTAS.2005.1452716"},{"issue":"1","key":"14_CR35","first-page":"111","volume":"3","author":"L Pranic","year":"2009","unstructured":"Pranic L, Roehl WS, West DB (2009) Acceptance and perceived effectiveness of biometrics and other airport security procedures. Acta Tur Nova 3(1):111\u2013136","journal-title":"Acta Tur Nova"},{"issue":"6","key":"14_CR36","doi-asserted-by":"crossref","first-page":"323","DOI":"10.3200\/JOER.99.6.323-338","volume":"99","author":"JB Schreiber","year":"2006","unstructured":"Schreiber JB, Nora A, Stage FK, Barlow EA, King J (2006) Reporting structural equation modelling and confirmatory factor analysis results: a review. J Educ Res 99(6):323\u2013337","journal-title":"J Educ Res"},{"key":"14_CR37","volume-title":"Research methods for business","author":"U Sekaran","year":"2003","unstructured":"Sekaran U (2003) Research methods for business, 4th edn. Wiley, United States","edition":"4"},{"issue":"2","key":"14_CR38","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith HJ, Milberg SJ, Burke SJ (1996) Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Q 20(2):167\u2013196","journal-title":"MIS Q"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Elliott SJ, Massie SA, Sutton, MJ (2007) The perception of biometric technology: a survey. In: IEEE Workshop on Automatic Identification Advanced Technologies, pp 259\u2013264","DOI":"10.1109\/AUTOID.2007.380630"},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Tassabehji R, Kamala MA (2009) Improving e-Banking Security with Biometrics: Modeling User Attitudes and Acceptance. In: IEEE International Conference on New Technologies, Mobility and Security, pp 1\u20136","DOI":"10.1109\/NTMS.2009.5384806"},{"key":"14_CR41","unstructured":"The New York Times (2004) Summary of Final Report. Retrieved from: www.nytimes.com\/2004\/07\/22\/politics\/22CND-EXEC-SUMM.html . Accessed 15 June 2010"},{"key":"14_CR42","unstructured":"Thieme M (2010) Privacy concerns and biometric technologies. Retrieved from: http:\/\/www.bioprivacy.org\/privacy_fears.htm . Accessed 15 June 2010"},{"issue":"3","key":"14_CR43","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425\u2013478","journal-title":"MIS Q"},{"key":"14_CR44","unstructured":"VMY (2014) Visit Malaysia 2014. Retrieved from http:\/\/www.tourism.gov.my\/en\/my . Accessed 10 Jan 2014"},{"key":"14_CR45","volume-title":"Biometrics: personal identification in networked society","author":"JD Woodward","year":"1999","unstructured":"Woodward JD (1999) Biometrics: identifying law and policy concerns. In: Jain AK, Bolle R, Pankanti S (eds) Biometrics: personal identification in networked society. Springer, Berlin"},{"key":"14_CR46","unstructured":"Yahoo! News (2011) New System Causes Long Delays at JB Checkpoints\u201d. Retrieved from: http:\/\/sg.news.yahoo.com\/blogs\/singaporescene\/system-causes-long-delays-jb-checkpoints-050832546.html . Accessed 18 April 2012"},{"issue":"1","key":"14_CR47","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1108\/09685220410518883","volume":"12","author":"V Zorkadis","year":"2004","unstructured":"Zorkadis V, Donos P (2004) On biometrics-based authentication and identification from a privacy-protection perspective: deriving privacy-enhancing requirements. Inf Manag Comput Secur 12(1):125\u2013137","journal-title":"Inf Manag Comput Secur"}],"container-title":["Information Technology &amp; Tourism"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40558-014-0014-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40558-014-0014-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40558-014-0014-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T14:05:55Z","timestamp":1565618755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40558-014-0014-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,11]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["14"],"URL":"https:\/\/doi.org\/10.1007\/s40558-014-0014-8","relation":{},"ISSN":["1098-3058","1943-4294"],"issn-type":[{"value":"1098-3058","type":"print"},{"value":"1943-4294","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,11]]}}}