{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T16:50:43Z","timestamp":1778172643172,"version":"3.51.4"},"reference-count":63,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T00:00:00Z","timestamp":1647302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2022,10,20]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>For the success of future investments in the implementation of continuous authentication systems, we should explore the key factors that influence technology adoption. The authors investigate the effect of various factors of behavioral intention through the new incorporation of a modified technology acceptance model (TAM) and diffusion of innovation theory (DOI). Also, the authors have created a new theoretical framework with constructs such as security and privacy risks (SPR), biometrics privacy concerns (BPC) and perceived risk of using the technology (PROU). In this paper, the authors conducted a structural equation modeling empirical research. This research is designed in such a way to respond to the trade-off between users\u2019 concern for the protection of their biometrics privacy and their protection from risks.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The authors provide an extensive conceptual framework for both existing models (TAM and DOI) and the new constructs that the authors have added to the model. In addition, this research explores external factors, such as trust in technology (TT) and innovativeness (Innov). In addition, the authors have introduced significant constructs, to overcome the limitations of the TAM and to adapt it to the needs of the present research. The new theoretical framework the authors introduce in the present research concerns the constructs SPR, BPC and PROU.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The authors found that the main facilitators of behavioral intention to adopt the technology (BI) are TT, followed by compatibility (COMP), perceived usefulness (PU) and Innov. This research also shows that individuals are less interested in the ease of use of the technology and are willing to sacrifice it to achieve greater security. COMP and Innov also play a significant role. Individuals who believe that the usage of the behavioral biometrics continuous authentication (BBCA) technology would fit into their lifestyle and would like to experiment with new technologies have a positive intention to adopt the BBCA technology. The new constructs the authors have added are SPR, BPC and PROU. The authors\u2019 results support the hypotheses that SPR is a facilitator to PU and PU acts as a facilitator to BI. Consequently, the hypothesis that individuals do not feel adequately protected by classical methods will consider the usefulness of the BBCA as a technology for their extra protection against risks is confirmed by the model. Also, with the constructs BPC and PROU, the authors examined if individuals\u2019 concerns regarding their biometrics privacy act as inhibitors in the BI. The authors concluded that individuals consider that the benefits of using BBCA technology are much more important than the risks for their biometrics privacy since the hypothesis that the major inhibitor of BI is PROU is not supported by the model.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>To the best of the authors\u2019 knowledge, this research is among the first in the field that examines the factors that influence the individuals\u2019 decision to adopt BBCA technology.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-08-2021-0124","type":"journal-article","created":{"date-parts":[[2022,3,12]],"date-time":"2022-03-12T08:30:46Z","timestamp":1647073846000},"page":"562-582","source":"Crossref","is-referenced-by-count":21,"title":["Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research"],"prefix":"10.1108","volume":"30","author":[{"given":"Ioannis","family":"Stylios","sequence":"first","affiliation":[]},{"given":"Spyros","family":"Kokolakis","sequence":"additional","affiliation":[]},{"given":"Olga","family":"Thanou","sequence":"additional","affiliation":[]},{"given":"Sotirios","family":"Chatzis","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2022,3,15]]},"reference":[{"issue":"3","key":"key2022102015354740400_ref001","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1108\/02635571011030042","article-title":"Predicting e-procurement adoption in a developing country: an empirical integration of technology acceptance model and theory of planned behaviour","volume":"110","year":"2010","journal-title":"Industrial Management and Data Systems"},{"issue":"2","key":"key2022102015354740400_ref002","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1287\/isre.9.2.204","article-title":"A conceptual and operational definition of personal innovativeness in the domain of information technology","volume":"9","year":"1998","journal-title":"Information Systems Research"},{"key":"key2022102015354740400_ref003","volume-title":"Continuous Authentication Using Biometrics: Data, Models and Metrics","year":"2011"},{"key":"key2022102015354740400_ref004","first-page":"1","article-title":"Technology acceptance model limitations and criticisms: exploring the practical applications and use in technology-related studies, mixed-method, and qualitative researches","year":"(2018)","journal-title":"Library Philosophy and Practice (e-journal)"},{"issue":"4","key":"key2022102015354740400_ref006","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1016\/j.dss.2010.04.007","article-title":"Dynamic interaction in knowledge-based systems: an exploratory investigation and empirical evaluation","volume":"49","year":"2010","journal-title":"Decision Support Systems"},{"issue":"2","key":"key2022102015354740400_ref007","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.jsis.2007.12.002","article-title":"Trust and risk in e-government adoption","volume":"17","year":"2008","journal-title":"The Journal of Strategic Information Systems"},{"issue":"3","key":"key2022102015354740400_ref008","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/TEM.2009.2023111","article-title":"Clarifying the integration of trust and TAM in E-commerce environments: implications for systems design and management","volume":"57","year":"2010","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"3","key":"key2022102015354740400_ref009","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1037\/0033-2909.88.3.588","article-title":"Significance tests and goodness-of-fit in the analysis of covariance structures","volume":"88","year":"1980","journal-title":"Psychological Bulletin"},{"issue":"1","key":"key2022102015354740400_ref010","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1080\/08874417.2008.11645302","article-title":"Information technology continuance: a theoretical extension and empirical test","volume":"49","year":"2008","journal-title":"Journal of Computer Information Systems"},{"issue":"1","key":"key2022102015354740400_ref011","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1111\/j.1365-2575.2005.00183.x","article-title":"The utilization of e-government services: citizen trust, innovation and acceptance factors","volume":"15","year":"2005","journal-title":"Information Systems Journal"},{"issue":"5","key":"key2022102015354740400_ref012","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/j.trc.2007.04.004","article-title":"Predicting electronic toll collection service adoption: an integration of the technology acceptance model and the theory of planned behavior","volume":"15","year":"2007","journal-title":"Transportation Research Part C: Emerging Technologies"},{"issue":"3","key":"key2022102015354740400_ref013","doi-asserted-by":"crossref","first-page":"1558","DOI":"10.1016\/j.dss.2006.01.002","article-title":"Adoption of internet banking: an empirical study in Hong Kong","volume":"42","year":"2006","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2022102015354740400_ref015","first-page":"7","article-title":"Issues and opinion on structural equation modeling","volume":"22","year":"1998","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2022102015354740400_ref016","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1287\/isre.14.2.189.16018","article-title":"A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion\/adoption study","volume":"14","year":"2003","journal-title":"Information Systems Research"},{"key":"key2022102015354740400_ref014","article-title":"Measuring user confidence in smartphone security and privacy","year":"2012"},{"issue":"7","key":"key2022102015354740400_ref017","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.cose.2005.08.003","article-title":"Authentication of users on mobile telephones \u2013 a survey of attitudes and practices","volume":"24","year":"2005","journal-title":"Computers and Security"},{"issue":"2","key":"key2022102015354740400_ref018","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.cose.2006.08.008","article-title":"Advanced user authentication for mobile devices","volume":"26","year":"2007","journal-title":"Computers and Security"},{"issue":"3","key":"key2022102015354740400_ref019","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1177\/0092070302303001","article-title":"An attitudinal model of technology-based self-service: moderating effects of consumer traits and situational factors","volume":"30","year":"2002","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"3","key":"key2022102015354740400_ref020","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","year":"1989","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2022102015354740400_ref021","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S0378-7206(98)00101-3","article-title":"Extending the technology acceptance model with task\u2013technology fit constructs","volume":"36","year":"1999","journal-title":"Information and Management"},{"issue":"6","key":"key2022102015354740400_ref022","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1108\/09590559910278560","article-title":"Profiling potential adopters and non-adopters of an interactive electronic shopping medium","volume":"27","year":"1999","journal-title":"International Journal of Retail and Distribution Management"},{"issue":"5","key":"key2022102015354740400_ref023","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/S0268-4012(00)00026-8","article-title":"Expectations versus reality: a snapshot of consumer experiences with internet retailing","volume":"20","year":"2000","journal-title":"International Journal of Information Management"},{"issue":"1","key":"key2022102015354740400_ref024","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.chb.2008.08.006","article-title":"Internet social network communities: risk taking, trust, and privacy concerns","volume":"25","year":"2009","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2022102015354740400_ref025","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"key2022102015354740400_ref026","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1jais.00008","article-title":"The relative importance of perceived ease of use in is adoption: a study of e-commerce adoption","volume":"1","year":"2000","journal-title":"Journal of the Association for Information Systems"},{"issue":"5","key":"key2022102015354740400_ref027","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/j.jbusres.2008.06.016","article-title":"Consumer e-shopping acceptance: antecedents in a technology acceptance model","volume":"62","year":"2009","journal-title":"Journal of Business Research"},{"issue":"2","key":"key2022102015354740400_ref028","doi-asserted-by":"publisher","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","article-title":"PLS-sem: indeed a silver bullet","volume":"19","year":"2011","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"1","key":"key2022102015354740400_ref029","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jfbs.2014.01.002","article-title":"Partial least squares structural equation modelling (PLS-SEM): a useful tool for family business researchers","volume":"5","year":"2014","journal-title":"Journal of Family Business Strategy"},{"issue":"1","key":"key2022102015354740400_ref030","first-page":"53","article-title":"Structural equation modelling: guidelines for determining model fit","volume":"6","year":"2008","journal-title":"Electronic Journal of Business Research Methods"},{"issue":"4","key":"key2022102015354740400_ref031","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1037\/1082-989X.3.4.424","article-title":"Fit indices in covariance structure modelling: sensitivity to under parameterized model misspecification","volume":"3","year":"1998","journal-title":"Psychological Methods"},{"issue":"3","key":"key2022102015354740400_ref032","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1016\/j.chb.2009.10.013","article-title":"An empirical examination of factors influencing the intention to use mobile payment","volume":"26","year":"2010","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2022102015354740400_ref033","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","article-title":"A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents","volume":"44","year":"2008","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2022102015354740400_ref034","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.dss.2005.05.009","article-title":"Value-based adoption of mobile internet: an empirical investigation","volume":"43","year":"2007","journal-title":"Decision Support Systems"},{"issue":"5","key":"key2022102015354740400_ref035","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1108\/02652321011064917","article-title":"Predicting young consumers' take up of mobile banking services","volume":"28","year":"2010","journal-title":"International Journal of Bank Marketing"},{"key":"key2022102015354740400_ref036","first-page":"441","article-title":"Digital natives and mobile phones: a survey of practices and attitudes about privacy and security","year":"2010"},{"issue":"3","key":"key2022102015354740400_ref037","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1080\/10919392.2011.590111","article-title":"Adoption of biometric authentication systems: implications for research and practice in the deployment of end-user security systems","volume":"21","year":"2011","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"issue":"6","key":"key2022102015354740400_ref038","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.im.2008.05.001","article-title":"An assessment of advanced mobile services acceptance: contributions from TAM and diffusion theory models","volume":"45","year":"2008","journal-title":"Information and Management"},{"issue":"4","key":"key2022102015354740400_ref039","first-page":"1194","article-title":"A survey on knowledge-based authentication","volume":"2","year":"2015","journal-title":"International Journal of Emerging Technologies and Innovative Research"},{"issue":"3","key":"key2022102015354740400_ref040","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","article-title":"Surveying the development of biometric user authentication on mobile phones","volume":"17","year":"2015","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"key2022102015354740400_ref041","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.dss.2013.05.010","article-title":"Determinants of end-user acceptance of biometrics: integrating the \u2018big 3\u2019 of technology acceptance with privacy context","volume":"56","year":"2013","journal-title":"Decision Support Systems"},{"key":"key2022102015354740400_ref042","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1007\/978-0-387-34982-4_10","article-title":"Integrating diffusion of innovations and theory of reasoned action models to predict utilization of information technology by end-users","volume-title":"Diffusion and Adoption of Information Technology","year":"1996"},{"issue":"2","key":"key2022102015354740400_ref043","doi-asserted-by":"crossref","first-page":"12","DOI":"10.3390\/jtaer1020010","article-title":"Biometrics and e-identity (e-passport) in the European union: end-user perspectives on the adoption of a controversial innovation","volume":"1","year":"2006","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"key":"key2022102015354740400_ref044","doi-asserted-by":"crossref","first-page":"101283","DOI":"10.1016\/j.tele.2019.101283","article-title":"Factors driving the adoption of smart home technology: an empirical assessment","volume":"45","year":"2019","journal-title":"Telematics and Informatics"},{"key":"key2022102015354740400_ref045","volume-title":"Psychometric Theory","year":"1978"},{"issue":"3","key":"key2022102015354740400_ref046","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","article-title":"Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model","volume":"7","year":"2003","journal-title":"International Journal of Electronic Commerce"},{"issue":"9","key":"key2022102015354740400_ref047","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/1378727.1389971","article-title":"Understanding user perspectives on biometric technology","volume":"51","year":"2008","journal-title":"Communications of the ACM"},{"key":"key2022102015354740400_ref048","volume-title":"SmartPLS 3","year":"2015"},{"key":"key2022102015354740400_ref049","volume-title":"Diffusion of Innovations","year":"1962","edition":"1st ed."},{"key":"key2022102015354740400_ref050","article-title":"Mobile phones and behavioral modalities: surveying users\u2019 practices","year":"2015"},{"key":"key2022102015354740400_ref051","article-title":"User's attitudes on mobile devices: can users' practices protect their sensitive data?","year":"2016"},{"key":"key2022102015354740400_ref052","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.inffus.2020.08.021","article-title":"Behavioral biometrics and continuous user authentication on mobile devices: a survey","volume":"66","year":"2021","journal-title":"Information Fusion"},{"key":"key2022102015354740400_ref053","first-page":"73","article-title":"A review of continuous authentication using behavioral biometrics","year":"2016"},{"issue":"4","key":"key2022102015354740400_ref054","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1287\/isre.11.4.342.11872","article-title":"Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model","volume":"11","year":"2000","journal-title":"Information Systems Research"},{"issue":"2","key":"key2022102015354740400_ref055","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","article-title":"Technology acceptance model 3 and a research agenda on interventions","volume":"39","year":"2008","journal-title":"Decision Sciences"},{"issue":"2","key":"key2022102015354740400_ref056","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","article-title":"A theoretical extension of the technology acceptance model: four longitudinal field studies","volume":"46","year":"2000","journal-title":"Management Science"},{"key":"key2022102015354740400_ref057","first-page":"425","article-title":"User acceptance of information technology: toward a unified view","year":"2003","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2022102015354740400_ref058","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1016\/j.im.2003.08.011","article-title":"Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model","volume":"41","year":"2004","journal-title":"Information and Management"},{"issue":"2","key":"key2022102015354740400_ref059","doi-asserted-by":"crossref","first-page":"34","DOI":"10.2307\/41166074","article-title":"Shopping online for freedom, control, and fun","volume":"43","year":"2001","journal-title":"California Management Review"},{"issue":"6","key":"key2022102015354740400_ref060","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1016\/j.ijhcs.2005.03.003","article-title":"An extension of trust and TAM model with TPB in the initial adoption of on-line tax: an empirical study","volume":"62","year":"2005","journal-title":"International Journal of Human-Computer Studies"},{"issue":"5","key":"key2022102015354740400_ref062","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.im.2004.07.001","article-title":"What drives mobile commerce?: An empirical evaluation of the revised technology acceptance model","volume":"42","year":"2005","journal-title":"Information and Management"},{"issue":"3","key":"key2022102015354740400_ref061","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/j.dss.2011.03.003","article-title":"The adoption of mobile healthcare by hospital's professionals: an integrative perspective","volume":"51","year":"2011","journal-title":"Decision Support Systems"},{"issue":"3","key":"key2022102015354740400_ref063","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.im.2005.08.006","article-title":"Understanding information technology acceptance by individual professionals: toward an integrative view","volume":"43","year":"2006","journal-title":"Information and Management"},{"issue":"5","key":"key2022102015354740400_ref064","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1111\/j.1559-1816.2010.00615.x","article-title":"Explaining internet banking behavior: theory of reasoned action, theory of planned behavior, or technology acceptance model?","volume":"40","year":"2010","journal-title":"Journal of Applied Social Psychology"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-08-2021-0124\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-08-2021-0124\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:09Z","timestamp":1753406589000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/30\/4\/562-582\/107948"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,15]]},"references-count":63,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,3,15]]},"published-print":{"date-parts":[[2022,10,20]]}},"alternative-id":["10.1108\/ICS-08-2021-0124"],"URL":"https:\/\/doi.org\/10.1108\/ics-08-2021-0124","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,15]]}}}