ISSN: 2222-6990
Open access
The aim of this study was to assess the factors influencing the use of Biometric Fingerprint Technology in criminal identification in Kenya. The specific objectives for the study were toassess the effect of Ease of use and fallibility of biometric fingerprint technology on Criminal Identification in Kenya. The study was grounded on probability theory and technology acceptance model. The study used a census. The study targeted140 fingerprint officers working at the National Registration Bureau at the Huduma Centers, National Registration Bureau headquarters, and Langata, Kariakor, Pumwani and Makadara stations. Primary data was collected using a self-administered semi-structured questionnaire. SPSS software version 22 was used to analyze the data. Descriptive and regression analysis were used. Multiplelinear regressions were used to examine the effect of the variables on criminal identification. All the statistical tests were carried out at 5% level of significance.Correlation results revealed that Ease of useand fallibility of BFTpositively and significantly influence criminal identification. Regression results showed that Ease of use of BFT positively and significantly influencesCriminal Identification (? = 0.296, Sig = 0.000). Moreover, regression results revealed that Fallibility of biometric fingerprint technology had a positive and significant influence on Criminal Identification (? = 0.226, Sig = 0.000).The study recommends the management of National Registration Bureau to ensure that their fingerprint officers capture quality level fingerprintimpressions during the registration process using BFT in order to ensure that individuals are accurately authenticated thereby preventing and detecting criminal activities.Othermeans identification such as DNA should be incorporated as a change in environmental conditions causes fingerprints to be unrecognizable and in cases of cuts or burns or extreme weight gain or loss, higher level of deformity of fingers.
Al-Raisi, A and Al-Khouri, A. (2008). Iris recognition and the challenge of homeland and border control security in UAE. Journal of Telematicsand Informatic,25(2): 117-132.
Burns, N., & Grove, S. K. (2010). Understanding Nursing Research-eBook: Building an Evidence-Based Practice. Elsevier Health Sciences.
Bustard, J. D., Carter, J. N., & Nixon, M. S. (2013). Targeted impersonation as a tool for the detection of biometric system vulnerabilities. In Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference. IEEE.
Creswell, J. W., &Poth, C. N. (2017).Qualitative inquiry and research design: Choosing among five approaches. Sage publications.
Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly, 13(3), 319–339. Giné, X., Goldberg, J., & Yang, D. (2010). Identification strategy: A field experiment on dynamic incentives in rural credit markets.
Indrayani E. (2014). The Effectiveness and the Efficiency of the Use of Biometric Systems in Supporting National Database Based on Single ID Card Number. The Implementation of Electronik ID Card in Bandung. Journal of Information Technology & Software Engeneering. Vol. 4: 129. doi:10.4172/2165-7866.1000129
Kothari C.R. (2004). Research Methodology, Methods and Techniques. New Delhi New Age International publishers.
Kothari, C. (2013). Research Methods & Techniques. New Delhi: New Age Publications. Kowalczyk, S., & Shankar, K. (2011). Data sharing in the sciences. Annual review of information science and technology, 45(1), 247-294. Kwakye, M. M., Boforo, H. Y., &Badzongoly, E. L. Adoption of Biometric Fingerprint Identification an Accessible, Secured form of ATM Transaction Authentication.
Malla, A. H. (2018). A Gaze-Based Authentication System: From Authentication to Intrusion Detection. (Doctoral dissertation).
International Journal of Academic Research in Business and Social Sciences
Vol. 9 , No. 3, March, 2019, E-ISSN: 2 22 2 -6990 © 2019 HRMARS
859
Mugenda, O., &Mugenda, A. (2003). Research methods: Quantitative and Qualitative methods. Revised in Nairobi. Mulumba, M. (2012). Biometric authentication systems and service delivery in healthcare sector in Kenya.
Murphy, C. H., &Rottet, D. (2009). An exploration of the key hotel processes implicated in biometric adoption. International Journal of Contemporary Hospitality Management, 21(2), 201–212.
National Institute of Standards and Technology, (2009). Accuracy of Computerized Fingerprint Matching.
National Registration Bureau 2010 operational manual
National Registration Bureau 2016.Unpublished manuals.
Saini, M., Kapoor, A.K. (2016). Biometrics in Forensic Identification: Applications and Challenges. Journal of Forensic Med 1: 108. Do. ISSN: 2472-1026. Volume 1 • Issue 2 • 1000108
Saunders, M. L., & Lewis, P. and Thornhill, A. (2009).Research methods for business students,
Saunders. (2003). Research methods for business students (3rd edition) . New York : Prentice Hall. Upagade, V., &Shende, A. (2012). Research methodology. S. Chand & Company Ltd. New Delhi, India.
Venkatesh, V. & Bala, H. (2008). Technology Acceptance Model 3 and a Research Agenda onInterventions. Decision Science, 39 (2), 273-312.
Venkatesh, V. (2000). Determinants of perceived ease of use: integrating control, intrinsicmotivation, and emotion into the technology acceptance model. Information Systems Research,11(4), 342-365.
Zuniga, A.E., Win, K.T., & Susilo, W. (2010). Biometrics for electronic health records. Journal of Medical Systems, 34(5).
In-Text Citation: (Tangai, Kaguta, & Yi, 2019)
To Cite this Article: Tangai, M. M., Kaguta, J., & Yi, Y. (2019). Effect of Ease of Use and Fallibility of Biometric Fingerprint Technology in Criminal Identification in Kenya. International Journal of Academic Research in Business and Social Sciences, 9(3), 842–859.
Copyright: © 2019 The Author(s)
Published by Human Resource Management Academic Research Society (www.hrmars.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode