{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T03:29:40Z","timestamp":1766719780106,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T00:00:00Z","timestamp":1556496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data"],"abstract":"<jats:p>The increase in terrorism and identity fraud has forced governments worldwide to make a combined effort to enhance the security of national borders. Biometric passports are the emergent identity travel document deployed in guaranteeing the safekeeping of the entry point of the border and limiting the usage of counterfeit documents. This study analyzes users\u2019 concerns and threats to the biometric passport delivery system in Uganda, where the first biometric passports are planned for rollout in 2019. We used a mixed approach to compute and articulate the results. Factors impacting fear of technology like disclosure of personal data, improper data transmission, and data abuse were determined. Relevance knowledge of preferred technology such as the personal experience of the technology, data privacy awareness and perceived usefulness was confirmed. Threats and attacks on the technology such as counterfeit and brute-force were identified. It is important for policymakers and security expertise to understand that biometric technologies evoke fears of privacy and public liberties infringements. Therefore, end user\u2019s acceptance of biometric passports will be dependent on the degree of trust in the technology itself and in those operating the applications.<\/jats:p>","DOI":"10.3390\/data4020058","type":"journal-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T03:25:38Z","timestamp":1556508338000},"page":"58","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Evaluation of Users\u2019 Knowledge and Concerns of Biometric Passport Systems"],"prefix":"10.3390","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7328-9528","authenticated-orcid":false,"given":"Taban","family":"Habibu","sequence":"first","affiliation":[{"name":"Department of Applied Mathematics and Computational Sciences (AMCS), Nelson Mandela African Institution of Science and Technology (NM-AIST), 447 Arusha, Tanzania"}]},{"given":"Edith Talina","family":"Luhanga","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics and Computational Sciences (AMCS), Nelson Mandela African Institution of Science and Technology (NM-AIST), 447 Arusha, Tanzania"}]},{"given":"Anael Elikana","family":"Sam","sequence":"additional","affiliation":[{"name":"Department of Communication Science and Engineering (CoSE), Nelson Mandela African Institution of Science and Technology (NM-AIST), 447 Arusha, Tanzania"}]}],"member":"1968","published-online":{"date-parts":[[2019,4,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Kundra, S., Dureja, A., and Bhatnagar, R. (2014, January 26\u201327). The study of recent technologies used in E-passport system. Proceedings of the 2014 IEEE Glob Humanit Technol Conference\u2014South Asia Satell GHTC-SAS 2014, Trivandrum, India. Available online: http:\/\/bensmyth.com\/research.php%5Cnhttp:\/\/bensmyth.com\/publications\/10thesis\/%5Cnhttps:\/\/vsm.cs.utwente.nl\/~mostowskiwi\/papers\/nluug2008.pdf%5Cnhttp:\/\/ink.library.smu.edu.sg\/etd_coll\/52\/%5Cnhttp:\/\/dx.doi.org\/10.1016\/j.enconman.2015.12.039%5Cnhttp:\/\/arxiv.","DOI":"10.1016\/j.enconman.2015.12.039"},{"key":"ref_2","unstructured":"Ntungwe, V.N. (2018). ILO Convention 185 on Seafarers\u2019 Identity Document Thirteen Years after Entering Into Force: Analysing Implementation Challenges and Future Outlook. [Master\u2019s Thesis, World Maritime University]."},{"key":"ref_3","first-page":"552","article-title":"European integration and the governance of migration","volume":"12","author":"Caviedes","year":"2016","journal-title":"J. Contemp. Eur. Res."},{"key":"ref_4","unstructured":"East African Community (2012). Ministry of East African Community Affairs in Conjunction with the Directorate of Citizenship and Immigration Control M of IA, East African Community."},{"key":"ref_5","first-page":"661","article-title":"Customers\u2019 adoption of biometric systems in restaurants: An extension of the technology acceptance model","volume":"20","author":"Morosan","year":"2011","journal-title":"J. Hosp. Mark. Manag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/1378727.1389971","article-title":"Understanding user perspectives on biometric technology","volume":"51","author":"Pons","year":"2008","journal-title":"Commun. ACM"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.dss.2013.05.010","article-title":"Determinants of end-user acceptance of biometrics: Integrating the \u201cbig 3\u201d of technology acceptance with privacy context","volume":"56","author":"Miltgen","year":"2013","journal-title":"Decis. Support Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"12","DOI":"10.3390\/jtaer1020010","article-title":"Biometrics and e-identity (e-passport) in the European Union: End-user perspectives on the adoption of a controversial innovation","volume":"1","author":"Swatman","year":"2006","journal-title":"J. Theor. Appl. Electron. Commer. Res."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"243","DOI":"10.19101\/IJATEE.2018.544003","article-title":"Assessment of vulnerabilities of the biometric template protection mechanism","volume":"5","author":"Habibu","year":"2018","journal-title":"Int. J. Adv. Technol. Eng. Explor."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3233\/JCS-2010-0407","article-title":"Practical eavesdropping and skimming attacks on high-frequency RFID tokens","volume":"19","author":"Hancke","year":"2011","journal-title":"J. Comput. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"5066","DOI":"10.1016\/j.eswa.2014.02.044","article-title":"Cloning and tampering threats in e-passports","volume":"41","author":"Calderoni","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.ijcip.2015.08.001","article-title":"Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems","volume":"11","author":"Jannati","year":"2015","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1049\/iet-bmt.2013.0054","article-title":"Measuring and mitigating targeted biometric impersonation","volume":"3","author":"Nixon","year":"2014","journal-title":"IET Biom."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s10796-016-9667-5","article-title":"Privacy and biometrics: An empirical examination of employee concerns","volume":"20","author":"Carpenter","year":"2018","journal-title":"Inf. Syst. Front."},{"key":"ref_15","first-page":"103","article-title":"Securing e-governance services through biometrics","volume":"8","author":"Gudavalli","year":"2014","journal-title":"Int. J. Secur. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Antoni, D., Herdiansyah, M.I., and Akbar, M. (2017, January 1\u20133). Critical factors of transparency and trust for evaluating e-government services for the poor. Proceedings of the 2017 Second International Conference on IEEE Informatics and Computing (ICIC), Jayapura, Indonesia.","DOI":"10.1109\/IAC.2017.8280612"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"203","DOI":"10.3233\/JCS-2010-0414","article-title":"A survey of system security in contactless electronic passports","volume":"19","author":"Sinha","year":"2011","journal-title":"J. Comput. Secur."},{"key":"ref_18","first-page":"93","article-title":"The extended access control for machine readable travel documents","volume":"155","author":"Chaabouni","year":"2009","journal-title":"BIOSIG"},{"key":"ref_19","unstructured":"Shalabh, K. (2019, April 26). Chapter 4 stratified sampling. Available online: http:\/\/home.iitk.ac.in\/~shalab\/sampling\/chapter4-sampling-stratified-sampling.pdf."},{"key":"ref_20","unstructured":"NIRA-Uganda (2015). Mass Registration of Pupils and Students, NIRA-Uganda."},{"key":"ref_21","first-page":"313","article-title":"Confidentiality and disclosure in the practice of medicine and healthcare services","volume":"1","author":"Singh","year":"2014","journal-title":"Inst. Dev. Manag."},{"key":"ref_22","unstructured":"NPA (2017). Pharmacy2U Is NOT Your Local Pharmacy and Has Nothing to Do with Us, NPA."},{"key":"ref_23","unstructured":"Vava, R.C. (2016). Biometric Voter Registration: Lessons from Ugandan Polls, ZESN."},{"key":"ref_24","unstructured":"McLean, A. (2019, April 25). IoT Malware and Ransomware Attacks on the Incline: Intel Security. Available online: https:\/\/www.zdnet.com\/article\/iot-malware-and-ransomware-attacks-on-the-incline-intel-security\/."}],"container-title":["Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2306-5729\/4\/2\/58\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:47:53Z","timestamp":1760186873000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2306-5729\/4\/2\/58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,29]]},"references-count":24,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,6]]}},"alternative-id":["data4020058"],"URL":"https:\/\/doi.org\/10.3390\/data4020058","relation":{},"ISSN":["2306-5729"],"issn-type":[{"type":"electronic","value":"2306-5729"}],"subject":[],"published":{"date-parts":[[2019,4,29]]}}}