**4. Methodological choices**

A review of the extant literature on theories relating to authentication and mobile government security also did not lead to any hypotheses per se, but broadened the considerations relevant to this work. What was needed was a method for determining the full range of stakeholder considerations that would influence the adoption of m-government with biometric security. A review of methods available for an interpretive study with the main purpose of creating a substantive theory to guide development, indicated that Grounded Theory methodology (Strauss and Corbin 1990) was the ideal vehicle for investigating actualities from the real world to generate or discover theory grounded in context specific data that has been systematically gathered and analysed (Creswell, 1998).

The investigation part of this study was carried out by the use of questionnaire and semistructured interviews for the data collection. By conducting the interviews and questionnaires, we explored the factors influencing the adoption of biometrics in mgovernment through the concerns and perceptions of mobile communication users', service providers', and network operators' about applying biometric authentication into mobile devices for government services. Data were analysed following Strauss and Corbin's (1990) approach of Grounded Theory. The use of Grounded Theory helped to develop a substantive theory that identifies and describes the factors influencing the adoption of biometric authentication in m-government in Saudi Arabia.

#### **4.1 Grounded theory methodology**

188 Security Enhanced Applications for Information Systems

users. Kaasinen (2007) found that perceived value, ease of use, trust and ease of adoption are important factors that influence user acceptance of mobile Internet services. AlGhamdi et al. (2011) pointed out that the provision of trustworthy and secure online payment options is a critical key determining the decision for online customers to accept/reject buying online

Thus, highly similar acceptance factors appear under various theories and models covering innovation acceptance and adoption. Moreover, the set of factors that proposed in TAM variants and UTAUT correspond closely with factors identified in DOI theory. For instance, Moore and Benbasat (1991) indicated that while developing an instrument based on DOI concepts to determine an individual's perceptions regarding the acceptance and adoption of an information technology innovation recognised the similarity between the construct of perceived usefulness with perceived relative advantage, and between perceived ease of use

Although there are a lack of academic studies concentrating on the factors that influence the adoption of biometric authentication systems, most of the published papers in this area (Harris and Yen 2002; Kleist et al. 2005; Lease 2005; Uzoka and Ndzinge 2009) identified different factors that are quite dissimilar to those discussed in the technology adoption theories and models outlined in previous section. For example, Lease (2005) found that managers' positive perceptions of security effectiveness, need, reliability, and costeffectiveness correlate with their willingness to recommend the use of biometric technology, while Uzoka and Ndzinge (2009) indicated that ease of use, communication, and size and type of organisation are the most important factors affecting the intention to adopt biometric technology in organisations. However, Harris and Yen (2002) stated that the adoption of biometric systems can be influenced by managerial, economical, operational and processrelated factors. Kleist et al. (2005) also indicated different affecting factors of biometric systems including users, administration, environment, infrastructure, cost, communication

As a result, the review of the relevant literature on the technology adoption factors did not lead to any hypotheses, but rather helped to enhance awareness of the existing factors and to identify the gap in relevant knowledge. The case in this chapter discusses the adoption of biometric authentication in the m-government context and in particular, in Saudi Arabia,

A review of the extant literature on theories relating to authentication and mobile government security also did not lead to any hypotheses per se, but broadened the considerations relevant to this work. What was needed was a method for determining the full range of stakeholder considerations that would influence the adoption of m-government with biometric security. A review of methods available for an interpretive study with the main purpose of creating a substantive theory to guide development, indicated that Grounded Theory methodology (Strauss and Corbin 1990) was the ideal vehicle for investigating actualities from the real world to generate or discover theory grounded in context specific data that has been systematically gathered and analysed (Creswell, 1998).

which adds some specificity to the area of biometric technology adoption.

from a specific retailer.

with perceived complexity.

**3.2 Biometric adoption among empirical studies** 

system, as well as security needs and requirements.

**4. Methodological choices** 

Grounded Theory is one of the most widely used methodologies in qualitative research (McLeod 1999). It originated in nursing research by Glaser and Strauss (1967) and then has been adopted in several areas of research such as sociology, business, management, and information systems (Mansourian 2006). More specifically, Grounded Theory was first developed by Barney Glaser and Anselm Strauss in 1967 in their book "The Discovery of Grounded Theory". They defined Grounded Theory as "the discovery of theory from data – systematically obtained and analysed in social research" (Glaser and Strauss 1967, p. 1).

In subsequent years two different approaches of Grounded Theory have emerged, one by Glaser and the other by Strauss and Corbin. These two approaches became more visible by the publication of Strauss and Corbin's book in 1990. The Grounded Theory approach, according to Strauss and Corbin (1990), is a "qualitative research method that uses a systematic set of procedures to develop an inductively derived Grounded Theory about a phenomenon" (p. 24). However, Glaser (1992) clarified that "Grounded Theory is based on the systematic generating of theory from data, that itself is systematically obtained from social research" (p. 2).

Glaser (1992) thought that the research should allow the theory to emerge during the observation of the codes and data analysis. Glaser's approach concerns with a classic philosophy emphasizing an inductive emergence of the theory as well as the researcher's role within that process (Heath and Cowley, 2004). Glaser (1992) focuses on the importance of letting the theory emerge from the data by allowing the data to speak for itself and avoiding imprinting preconceived ideas onto the theory (Creswell 2008). By contrast, Strauss and Corbin's (1990) perspective emphasised more on a systematic approach involving validity and verification (Heath and Cowley, 2004). Strauss and Corbin's (1990) approach indicated that Grounded Theory should be inductively derived from the study of the phenomenon it represents. It should be discovered, developed, and verified through systematic data collection and analysis of the data that pertaining to the phenomenon.

It emerges that the Strauss and Corbin (1990) approach is significantly more prescriptive in specifying the steps to be done during the coding and data analysis. More specifically, Strauss and Corbin (1994) identified Grounded Theory as "a general methodology for developing theory that is grounded in data systematically gathered and analysed. Theory evolves during actual research, and it does this through continuous interplay between analysis and data collection" (Strauss and Corbin 1994, p. 273).

Developing a Theoretical Framework

**5. Context of the study** 

(World Fact Book 2011).

growth rate of 22% (Sadad 2008).

widely acknowledged in the research community.

for the Adoption of Biometrics in M-Government Applications Using Grounded Theory 191

help generate theories in that research area. Furthermore, Urquhart and Fernandez (2006) stated that the value of Grounded Theory in the field of information system has become

Accordingly, the Grounded Theory approach fits the purpose of this study, which should lead to the development of a substantive theory for the adoption of biometric authentication in m-government security in KSA. Through the interviews and questionnaires, the researchers explore the factors that influence the adoption of biometrics in m-government through users', service providers', and network operators' concerns and perceptions regarding applying biometric authentication into mobile devices for government services.

This study was supported by Saudi government and data collection primarily took place in the Kingdom of Saudi Arabia. Therefore, Saudi and Islamic cultural issues needed to be considered throughout this study. The Kingdom of Saudi Arabia is located in the southeastern part of the Asian continent. It occupies 2,240,000 sq km (about 865,000 sq mi). The total population reached 28.5 million in mid-2009 with an annual growth rate of 2.9 percent; however, it is estimated that approximately 5.5 million of the population are non-Saudis

The need for the services, means and methods of e-government in Saudi Arabia has emerged by responding to the developments and changes of the modern world in all fields. Saudi Arabia, like other countries, is seeking to make use of the great technological advancements in communication means and information due to their importance in providing services which are better, faster, more accurate, and with stricter controls. Particular attention has therefore been given to e-government as an international approach and a general trend that requires a response to and the use of modern technology as a means for its success. Based on this, the e-government program was introduced in 2005 and was called "Yesser", an Arabic word meaning "facilitator". This program was set as a result of the execution of the communications and information technology national plan through the support of electronic transactions and applications by government organisations. It plays the role of the enabler/facilitator of the implementation of e-government in the public sector. Moreover, it aims to raise the public sector's efficiency and effectiveness, offer better and faster government services, and ensure availability of the required information in a

Due to the enormous significance of e-government applications, there are now more than 180 electronic services being offered by 50 different organisations. An example of a most successful e-government service is the payment system called "Sadad". Sadad was implemented by the Saudi Arabian Monetary Agency in order to facilitate and streamline the bill payment transactions of end consumers via all banking channels, including bank branches, ATMs, telephone banking, and Internet banking. In 2008, the number of transactions conducted by Sadad exceeded 5 million transactions per month, with a monthly

The use of mobile devices is rapidly increasing among the people in the KSA. According to a recent report in 2010 by Communications and Information Technology Commission (CITC) in Saudi Arabia, the latest statistics in 2010 indicated that there were 4.3 million telephones

timely and accurate fashion (E-government program "Yesser" 2011).

Glaser (1992) and Strauss and Corbin (1990) differed on the role of the literature review as an influence on the methodology. Glaser (1992) believed that specific reading related to the area under study before or during data collection could strongly influence the emerging theory, thus, it should not be reviewed until the theory begins to emerge. While Strauss and Corbin (1990) believed that the researcher will come to the research area with a background about the relevant literature which is a basis of professional knowledge and it is important to acknowledge and use it, as will be discussed in the next section. They believe that some understanding of the research area through the literature review will enhance the theoretical sensitivity of the researcher when generating theory.

However, Grounded Theory has been presented as a general methodology applicable for both qualitative and quantitative studies (Strauss and Corbin 1994). Strauss and Corbin (1998, p.27) stated that "briefly, we maintain that the aim of theorizing is to develop useful theories. So, any methodology, whether qualitative or quantitative, is only a means for accomplishing that aim. We do not believe in the primacy of either mode of doing research"

The study related in this chapter adopted Grounded Theory methodology to develop a substantive theory for the adoption of biometric authentication in m-government security in Saudi Arabia. In particular, this study followed Strauss and Corbin's (1990) approach as it allows researchers to take into account previous relevant theories and literatures to help gain insights into the data. It also provides extensive guidance and a comprehensive framework for researchers, while, Glaser's approach is much less structured. Further justifications for the use of Grounded Theory are provided in the following section.

#### **4.2 Justification for using grounded theory**

According to Goulding (2002), the usefulness of the application of Grounded Theory appears where there is a lack of integrated theory in the literature. From the initial literature review provided in the earlier in the chapter, it can be noted that there was a lack existing theories regarding the utilization of biometric authentication and mobile government security, especially which might be applied in developing countries such as Saudi Arabia. Combining this finding with the main application of Grounded Theory for investigating actualities in the real world, the researchers use Grounded Theory to develop a substantive theory that describes how biometric authentication can play an integral role in providing secure mgovernment services by investigating the phenomenon within the real world entities involved in m-government which are mobile users, service providers, and network operators.

Moreover, comparing with other qualitative analysis methods, Grounded Theory provides systematic method of analysis including open, axial, and selective coding that helps to develop a theory that is grounded in data. This is consistent with Charmaz's (2006) indication that the main strength of Grounded Theory is that it provides means for the analyzing processes including specific steps for developing concepts, categories, and theory. Piantanada et al. (2002) point out the usefulness of the Grounded Theory in such interpretive research. They note "the procedures of Grounded Theory provide interpretive researchers with a disciplined process, not simply for generating concepts, but more importantly for coming to see possible and plausible relationships between them" (p. 3).

Urquhart et al. (2009) indicated that Grounded Theory has been proved to be extremely useful in the field of information systems, which led them to recommend its application to help generate theories in that research area. Furthermore, Urquhart and Fernandez (2006) stated that the value of Grounded Theory in the field of information system has become widely acknowledged in the research community.

Accordingly, the Grounded Theory approach fits the purpose of this study, which should lead to the development of a substantive theory for the adoption of biometric authentication in m-government security in KSA. Through the interviews and questionnaires, the researchers explore the factors that influence the adoption of biometrics in m-government through users', service providers', and network operators' concerns and perceptions regarding applying biometric authentication into mobile devices for government services.
