**8. Considerations for the adoption of biometrics in m-government**

The theoretical framework proposed in Figure 3 can be used to understand the factors influencing the adoption of biometric authentication in m-government security. Based on the findings presented in this chapter, several considerations can be suggested for those who are involved the adoption of biometrics in m-government applications.

First, the findings of this study revealed that, to be effective, there is a need to provide mobile communication users and service providers with an advanced authentication system for m-government services; therefore, government and decision makers should consider this need in order to enhance the adoption and implementation of m-government services. Based on the viewpoints of the participants, the application of biometric authentication would play an integral role in enhancing the security of m-government. However, it will be important for decision makers to take into account that such legislation needs to be carefully crafted to safeguard the rights of the involved entities, and the people involved will need to be aware of the new laws and regulations. Similarly, it will be important that legislation is enforced and that all parties involved in the application are well informed. Technical support will be required to make mobile devices with biometric attachments available around the country at a reasonable cost on the normal users' level.

It would be appropriate that the application of biometric authentication is implemented along with the use of a Public Key Infrastructure (PKI), and that service providers apply biometrics with only the advanced m-services to enhance usability and user acceptance. It is also important to consider the security of the templates and databases as well as the management of biometric data during enrolment, transmission, storage and authentication. The enrolment process, which essentially introduces the user to the authentication system, needs to be considered as it would affect the adoption of biometrics in m-government. A high level of cooperation between government agencies will be required to effectively introduce biometrics in m-government services. Biometric standards and systems evaluation could effectively take place before and during the implementation process.

Developing a Theoretical Framework

UK.

*Government*, Brighton, UK.

5th of January 2009 at

California, pp. 146–154.

2nd March 2008 at available at

New York.

Hall.

for the Adoption of Biometrics in M-Government Applications Using Grounded Theory 205

Al-khamayseh, S, Lawrence, E, and Zmijewska, A 2006, Towards Understanding Success

Al-Shehry, A 2008, *Transformation towards e-government in the Kingdom of Saudi Arabia:* 

AlShihi, H 2007, M-government Services in Oman: Success and Failure Factors, viewed on

Antle, K 1986, *Writing and Evaluating the Grounded Theory Research Report. In From Practice to* 

Antovski, L and Gusev, M 2005, M-Government Framework, *Proceedings of the First European Conference on Mobile Government*, 10-12 July, University Sussex, Brighton, UK.

Bolle, R, Connell, J, Pankanti, S, Ratha, N and Senior, A 2004, *Guide to Biometrics*, Springer,

Bonsor, K and Johnson, R, *How Facial Recognition Systems Work, How Stuff Works*, viewed on

Chang, A and Kannan, P 2002, *Preparing for Wireless and Mobile Technologies in Government*,

Charmaz, K 2006, *Constructing Grounded Theory: A Practical Guide Through Qualitative* 

Clarke, N and Furnell, S 2005, Authentication of users on mobile telephones – A survey of attitudes and practices, *Computers & Security*, vol. 24, no. 7, pp. 519-527. Clarke, N and Furnell, S 2007, Advanced User Authentication for Mobile Devices, *Computers* 

Creswell, J 1998, *Qualitative inquiry and research design: Choosing among five traditions*,

Creswell, J 2008, *Educational research: planning, conducting, and evaluating quantitative and* 

Dankers, J, Garefalakis, R, Schaffelhofer, R and Wright, T 2004, PKI in mobile systems,

Davis, F 1989, Perceived usefulness, perceived ease of use, and user acceptance of

Department of Commerce (DC) 2003, *Information Security Guideline for NSW Government -* 

E-government Program (Yesser) 2011, The Ministry of Communications and Information

*qualitative research* (3rd ed.). Upper Saddle River, N.J., Pearson/Merrill Prentice

*Security for Mobility*, IEE Telecommunications 51, Mitchell, C. (ed.), The Institution

*Part 2 Examples of Threats and Vulnerabilities*, the Office of Information and

Ashbourn, J 2004, *Practical biometric from aspiration to implementation*, London: Springer. Beatty, R, Shim, J, and Jones, M 2001, Factors influencing corporate web site adoption: A time-based assessment. *Information & Management*, vol. 38, pp. 337-354. Bergstrom, R 1987, Critical issues in CIM implementation. *CIM Technology*, pp. 5-6.

www.csdms.in/mserve/2007/fullpapers/HafedhAlShihi.pdf

http://computer.howstuffworks.com/facialrecognition.htm

IBM Endowment for the Business of Government.

*Analysis*, Sage, Thousand Oaks, California.

*& Security*, vol. 26, no. 2, pp. 109-119.

Thousand Oaks, Calif.: Sage Publications.

of Electrical Engineers, UK, pp. 11-33, 2004.

Communications Technology, Australia.

information technology, *MIS Quarterly*, 13(3): 319-339.

Technology, available at http://www.yesser.gov.sa

Factors in Interactive Mobile Government*, Second European Conference on Mobile* 

*technological and organisational perspectives*, a PhD thesis, De Montfort University,

*Grounded Theory* (Chenitz W.C. & Swanson J.M., eds), Addison-Wesley, Mill Valley,

Furthermore, to encourage mobile users to adopt and use biometrics in their mobile devices for government services, it would be strategically advantageous for awareness programs to take place before the technology is introduced. In fact, education programs for both mobile users and service providers will help to ensure awareness of the new technology, the purpose of its implementation, and its benefits. It is also important to note that privacy, relative advantage, ease of use; trialability, compatibility, and observability, play a significant role in promoting the adoption of biometric authentication in m-government applications.
