The Intention of Passengers towards Repeat Use of Biometric Security for Sustainable Airport Management
Abstract
:1. Introduction
2. Theoretical Background and Hypotheses
2.1. Aviation Security and Biometrics for Sustainable Airport Management
2.2. Perceived Risk and Passengers’ Use Intention
2.3. Perceived Benefit and Passengers’ Use Intention
2.4. Initial Use and Repeat Use
2.5. Research Model
3. Research Method
3.1. Sampling & Surveying
3.2. Survey Questions
3.3. Measures
4. Results
4.1. Assessing the First-Order Constructs
4.2. Assessing the Second-Order Constructs
4.3. Assessing the Final Research Model
5. Conclusions
5.1. Discussion and Implications
5.2. Limitations & Suggestions for Future Studies
Author Contributions
Funding
Conflicts of Interest
References
- Lee, J.H. Study on future airport security screening. Korea Civ. Aviat. Dev. Assoc. 2012, 1, 115–134. [Google Scholar]
- Price, J.; Forrest, J. Practical Aviation Security: Predicting and Preventing Future Threats; Butterworth-Heinemann: Oxford, UK, 2016. [Google Scholar]
- Goo, S. Fliers to be rated for risk level: New system will scrutinize each passenger, assign color code. The Washington Post, 9 September 2003; A01. [Google Scholar]
- Schwaninger, A. Increasing efficiency in airport security screening. WIT Trans. Built Environ. 2005, 82, 405–416. [Google Scholar]
- Hong, J.; Oh, J.; Lee, H. Smart Airport and Next Generation Security Screening Technology. Electron. Telecommun. Trends 2019, 34, 73–82. [Google Scholar]
- ACI. Annual World Airport Traffic Forecast 2019–2040. Available online: https://aci.aero/wp-content/uploads/2019/10/WATF_2019-2040.pdf (accessed on 3 May 2020).
- Negri, N.A.R.; Borille, G.M.R.; Falcão, V.A. Acceptance of biometric technology in airport check-in. J. Air Transp. Manag. 2019, 81, 101720. [Google Scholar] [CrossRef]
- Kalakou, S.; Psaraki-Kalouptsidi, V.; Moura, F. Future airport terminals: New technologies promise capacity gains. J. Air Transp. Manag. 2015, 42, 203–212. [Google Scholar] [CrossRef]
- Jain, A.K.; Kumar, A. Biometric recognition: An overview. In Second Generation Biometrics: The Ethical, Legal and Social Context; Springer: Berlin, Germany, 2012; pp. 49–79. [Google Scholar]
- John, G.D.; Stephen, B.J.; Clayton, L. Making usable, useful, productivity-enhancing computer applications. Commun. ACM 1991, 34, 74–85. [Google Scholar]
- McCarroll, T. What new age. Time 1991, 138, 44–46. [Google Scholar]
- Nickerson, R.S. Why interactive computer systems are sometimes not used by people who might benefit from them. Int. J. Man-Mach. Stud. 1981, 15, 469–483. [Google Scholar] [CrossRef]
- Rogers, E.M. Diffusion of Innovations, 5th ed.; Free Press: New York, NY, USA, 2003; p. xxi. 551p. [Google Scholar]
- Stone, R.N.; Grønhaug, K. Perceived risk: Further considerations for the marketing discipline. Eur. J. Mark. 1993, 27, 39–50. [Google Scholar] [CrossRef]
- Featherman, M.S.; Pavlou, P.A. Predicting e-services adoption: A perceived risk facets perspective. Int. J. Hum. -Comput. Stud. 2003, 59, 451–474. [Google Scholar] [CrossRef] [Green Version]
- Garner, S.J. Perceived risk and information sources in services purchasing. Mid-Atl. J. Bus. 1986, 24, 49–58. [Google Scholar]
- Raymond, M.A.; Tanner, J.F., Jr. Selling and sales management in action: Maintaining customer relationships in direct sales: Stimulating repeat purchase behavior. J. Pers. Sell. Sales Manag. 1994, 14, 67–76. [Google Scholar]
- Chiu, C.M.; Wang, E.T.; Fang, Y.H.; Huang, H.Y. Understanding customers’ repeat purchase intentions in B2C e-commerce: The roles of utilitarian value, hedonic value and perceived risk. Inf. Syst. J. 2014, 24, 85–114. [Google Scholar] [CrossRef]
- Fang, Y.-H.; Chiu, C.-M.; Wang, E.T. Understanding customers’ satisfaction and repurchase intentions: An integration of IS success model, trust, and justice. Internet Res. 2011, 21, 479–503. [Google Scholar] [CrossRef]
- James, T.; Pirim, T.; Boswell, K.; Reithel, B.; Barkhi, R. Determining the intention to use biometric devices: An application and extension of the technology acceptance model. J. Organ. End User Comput. (JOEUC) 2006, 18, 1–24. [Google Scholar] [CrossRef] [Green Version]
- Morosan, C. Theoretical and empirical considerations of guests’ perceptions of biometric systems in hotels: Extending the technology acceptance model. J. Hosp. Tour. Res. 2012, 36, 52–84. [Google Scholar] [CrossRef]
- Morosan, C. Voluntary Steps toward Air Travel Security: An Examination of Travelers’ Attitudes and Intentions to Use Biometric Systems. J. Travel Res. 2012, 51, 436–450. [Google Scholar] [CrossRef]
- Choi, J.T. Terror, Terrorists & Terrorism; Dae Young Co.: Seoul, Korea, 1997. [Google Scholar]
- Lee, K.S. Review of legal and institutional changes in the global aviation security environment. J. Aerosp. Ind. 2010, 72, 22–41. [Google Scholar]
- Hoffman, B. Aviation Security and Terrorism: An analysis of the potential threat to air cargo integrators. Terror. Political Violence 1998, 10, 54–69. [Google Scholar] [CrossRef]
- Lyon, D. Surveillance, security and social sorting: Emerging research priorities. Int. Crim. Justice Rev. 2007, 17, 161–170. [Google Scholar] [CrossRef]
- Blalock, G.; Kadiyali, V.; Simon, D.H. The impact of post-9/11 airport security measures on the demand for air travel. J. Law Econ. 2007, 50, 731–755. [Google Scholar] [CrossRef]
- Kim, J.W. Risk Management and Strategies in Airport Security Check. Korea Secur. Sci. Assoc. 2013, 34, 89–113. [Google Scholar]
- Kim, J.H. Improving Aviation Security Equipment Performance Standards and Activating Domestic Development; The Korea Transport Institute: Sejong City, Korea, 2013. [Google Scholar]
- Butcher, L. Aviation: Security; House of Commons Library: London, UK, 2011. [Google Scholar]
- Wong, S.; Brooks, N. Evolving risk-based security: A review of current issues and emerging trends impacting security screening in the aviation industry. J. Air Transp. Manag. 2015, 48, 60–64. [Google Scholar] [CrossRef]
- SITA. Passenger IT Trends Survey 2015; SITA: Brussels, Belgium, 2015. [Google Scholar]
- Hopkins, R. An introduction to biometrics and large scale civilian identification. Int. Rev. Law Comput. Technol. 1999, 13, 337–363. [Google Scholar] [CrossRef]
- Prabhakar, S.; Pankanti, S.; Jain, A.K. Biometric recognition: Security and privacy concerns. IEEE Secur. Priv. 2003, 1, 33–42. [Google Scholar] [CrossRef]
- Kim, C.; Costello, F.J.; Lee, K.C. Integrating Qualitative Comparative Analysis and Support Vector Machine Methods to Reduce Passengers’ Resistance to Biometric E-Gates for Sustainable Airport Operations. Sustainability 2019, 11, 5349. [Google Scholar] [CrossRef] [Green Version]
- Bauer, R.A. Consumer Behavior as Risk Taking; Taylor & Francis: Chicago, IL, USA, 1960; pp. 384–398. [Google Scholar]
- Hussain, S.; Ahmed, W.; Jafar, R.M.S.; Rabnawaz, A.; Jianzhou, Y. eWOM source credibility, perceived risk and food product customer’s information adoption. Comput. Hum. Behav. 2017, 66, 96–102. [Google Scholar] [CrossRef]
- De Kerviler, G.; Demoulin, N.T.; Zidda, P. Adoption of in-store mobile payment: Are perceived risk and convenience the only drivers? J. Retail. Consum. Serv. 2016, 31, 334–344. [Google Scholar] [CrossRef]
- Roy, S.K.; Balaji, M.; Kesharwani, A.; Sekhon, H. Predicting Internet banking adoption in India: A perceived risk perspective. J. Strateg. Mark. 2017, 25, 418–438. [Google Scholar] [CrossRef]
- Dong, P.; Zhong, C.-B. RETRACTED: Visual Darkness Reduces Perceived Risk of Contagious-Disease Transmission From Interpersonal Interaction. Psychol. Sci. 2018, 29, 1049–1061. [Google Scholar] [CrossRef]
- Butler, K.M.; Rayens, M.K.; Wiggins, A.T.; Rademacher, K.B.; Hahn, E.J. Association of Smoking in the Home with Lung Cancer Worry, Perceived Risk, and Synergistic Risk. Oncol. Nurs. Forum 2017, 44, E55. [Google Scholar]
- Park, S.; Tussyadiah, I.P. Multidimensional facets of perceived risk in mobile travel booking. J. Travel Res. 2017, 56, 854–867. [Google Scholar] [CrossRef] [Green Version]
- Holm, M.R.; Lugosi, P.; Croes, R.R.; Torres, E.N. Risk-tourism, risk-taking and subjective well-being: A review and synthesis. Tour. Manag. 2017, 63, 115–122. [Google Scholar] [CrossRef] [Green Version]
- Curras-Perez, R.; Ruiz, C.; Sanchez-Garcia, I.; Sanz, S. Determinants of customer retention in virtual environments. The role of perceived risk in a tourism services context. Span. J. Mark. -ESIC 2017, 21, 131–145. [Google Scholar] [CrossRef]
- Jin, N.; Line, N.D.; Merkebu, J. The impact of brand prestige on trust, perceived risk, satisfaction, and loyalty in upscale restaurants. J. Hosp. Mark. Manag. 2016, 25, 523–546. [Google Scholar] [CrossRef]
- Pappas, N. Marketing strategies, perceived risks, and consumer trust in online buying behaviour. J. Retail. Consum. Serv. 2016, 29, 92–103. [Google Scholar] [CrossRef]
- Wang, S.; Wang, J.; Li, J.; Wang, J.; Liang, L. Policy implications for promoting the adoption of electric vehicles: Do consumer’s knowledge, perceived risk and financial incentive policy matter? Transp. Res. Part A Policy Pract. 2018, 117, 58–69. [Google Scholar] [CrossRef]
- Wang, S.; Wang, J.; Lin, S.; Li, J. Public perceptions and acceptance of nuclear energy in China: The role of public knowledge, perceived benefit, perceived risk and public engagement. Energy Policy 2019, 126, 352–360. [Google Scholar] [CrossRef]
- Ariffin, S.K.; Mohan, T.; Goh, Y.-N. Influence of consumers’ perceived risk on consumers’ online purchase intention. J. Res. Interact. Mark. 2018, 12, 309–327. [Google Scholar] [CrossRef]
- Lee, M.-C. Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electron. Commer. Res. Appl. 2009, 8, 130–141. [Google Scholar] [CrossRef]
- Copeland, A.L.; Peltier, M.R.; Waldo, K. Perceived risk and benefits of e-cigarette use among college students. Addict. Behav. 2017, 71, 31–37. [Google Scholar] [CrossRef] [PubMed]
- Cho, S.-H.; Ali, F.; Manhas, P.S. Examining the impact of risk perceptions on intentions to travel by air: A comparison of full-service carriers and low-cost carriers. J. Air Transp. Manag. 2018, 71, 20–27. [Google Scholar] [CrossRef]
- Biemans, W. Managing Innovation within Networks; Routledge: Abingdon, UK, 2018; Volume 7. [Google Scholar]
- Shuen, A. Web 2.0: A Strategy Guide: Business Thinking and Strategies behind Successful Web 2.0 Implementations; O’Reilly Media: Sebastopol, CA, USA, 2018. [Google Scholar]
- Selwyn, N. Education and Technology: Key Issues and Debates; Bloomsbury Publishing: London, UK, 2016. [Google Scholar]
- Nicholls, A. Managing Educational Innovations; Routledge: Abingdon, UK, 2018. [Google Scholar]
- Hartley, J. Communication, Cultural and Media Studies: The Key Concepts; Routledge: Abingdon, UK, 2019. [Google Scholar]
- Perse, E.M.; Lambe, J. Media Effects and Society; Routledge: Abingdon, UK, 2016. [Google Scholar]
- Lai, P. The literature review of technology adoption models and theories for the novelty technology. JISTEM-J. Inf. Syst. Technol. Manag. 2017, 14, 21–38. [Google Scholar] [CrossRef] [Green Version]
- Flodgren, G.; O’Brien, M.A.; Parmelli, E.; Grimshaw, J.M. Local opinion leaders: Effects on professional practice and healthcare outcomes. Cochrane Database Syst. Rev. 2019. [Google Scholar] [CrossRef] [Green Version]
- Van Aken, J.E.; Berends, H. Problem Solving in Organizations; Cambridge University Press: Cambridge, UK, 2018. [Google Scholar]
- Dwivedi, Y.K.; Rana, N.P.; Jeyaraj, A.; Clement, M.; Williams, M.D. Re-examining the unified theory of acceptance and use of technology (UTAUT): Towards a revised theoretical model. Inf. Syst. Front. 2019, 21, 719–734. [Google Scholar] [CrossRef] [Green Version]
- Buttle, F.; Maklan, S. Customer Relationship Management: Concepts and Technologies; Routledge: Abingdon, UK, 2019. [Google Scholar]
- Charter, M.; Polonsky, M.J. Greener Marketing: A Global Perspective on Greening Marketing Practice; Routledge: Abingdon, UK, 2017. [Google Scholar]
- Berry, F.S.; Berry, W.D. Innovation and Diusion Models in Policy Research. In Theories of the Policy Process; Routledge: Abingdon, UK, 2018; pp. 263–308. [Google Scholar]
- Ikenberry, G.J. The International Spread of Privatization Policies: Inducements, Learning, and “Policy Bandwagoning”. In The Political Economy of Public Sector Reform and Privatization; Routledge: Abingdon, UK, 2019; pp. 88–110. [Google Scholar]
- Landsverk, J. Beyond Common Sense: Child Welfare, Child Well-Being, and the Evidence for Policy Reform; Routledge: Abingdon, UK, 2017. [Google Scholar]
- Islam, A. The role of perceived system quality as educators’ motivation to continue e-learning system use. AIS Trans. Hum. -Comput. Interact. 2012, 4, 25–43. [Google Scholar] [CrossRef] [Green Version]
- Lee, S.; Cho, M. Social media use in a mobile broadband environment: Examination of determinants of Twitter and Facebook use. Int. J. Mob. Mark. 2011, 6, 71–87. [Google Scholar]
- Smith, E.R.; Mackie, D.M.; Claypool, H.M. Social Psychology; Psychology Press: Philadelphia, PA, USA, 2000. [Google Scholar]
- King, A.J.; Lazard, A.J.; White, S.R. The influence of visual complexity on initial user impressions: Testing the persuasive model of web design. Behav. Inf. Technol. 2019, 39, 1–14. [Google Scholar] [CrossRef]
- King, R.C.; Schilhavy, R.A.; Chowa, C.; Chin, W.W. Do customers identify with our website? The effects of website identification on repeat purchase intention. Int. J. Electron. Commer. 2016, 20, 319–354. [Google Scholar] [CrossRef]
- Das, S.; Mishra, A.; Cyr, D. Opportunity gone in a flash: Measurement of e-commerce service failure and justice with recovery as a source of e-loyalty. Decis. Support Syst. 2019, 125, 113130. [Google Scholar] [CrossRef]
- Chen, J.; Shen, X.-L. Consumers’ decisions in social commerce context: An empirical investigation. Decis. Support Syst. 2015, 79, 55–64. [Google Scholar] [CrossRef]
- Kim, D.J.; Ferrin, D.L.; Rao, H.R. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decis. Support Syst. 2008, 44, 544–564. [Google Scholar] [CrossRef]
- Yoo, C.W.; Sanders, G.L.; Moon, J. Exploring the effect of e-WOM participation on e-Loyalty in e-commerce. Decis. Support Syst. 2013, 55, 669–678. [Google Scholar] [CrossRef]
- Anderson, R.E.; Swaminathan, S. Customer satisfaction and loyalty in e-markets: A PLS path modeling approach. J. Mark. Theory Pract. 2011, 19, 221–234. [Google Scholar] [CrossRef]
- Gefen, D. Customer loyalty in e-commerce. J. Assoc. Inf. Syst. 2002, 3, 2. [Google Scholar] [CrossRef]
- Gefen, D.; Straub, D.W. Consumer trust in B2C e-Commerce and the importance of social presence: Experiments in e-Products and e-Services. Omega 2004, 32, 407–424. [Google Scholar] [CrossRef]
- Fornell, C.R.; Lacker, D.F. Two structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
- Wold, S.; Sjöström, M.; Eriksson, L. PLS-regression: A basic tool of chemometrics. Chemom. Intell. Lab. Syst. 2001, 58, 109–130. [Google Scholar] [CrossRef]
- Chin, W.W.; Marcolin, B.L.; Newsted, P.R. A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Inf. Syst. Res. 2003, 14, 189–217. [Google Scholar] [CrossRef] [Green Version]
- Marakas, G.; Johnson, R.; Clay, P.F. The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time. J. Assoc. Inf. Syst. 2007, 8, 2. [Google Scholar] [CrossRef]
- Loch, K.D.; Straub, D.W.; Kamel, S. Diffusing the Internet in the Arab world: The role of social norms and technological culturation. IEEE Trans. Eng. Manag. 2003, 50, 45–63. [Google Scholar] [CrossRef]
- Gaskin, J.; Godfrey, S. Successful System-Use: It’s Not Just Who You Are, But What You Do. AIS Trans. Hum.-Comput. Interact. 2018, 10, 57–81. [Google Scholar] [CrossRef] [Green Version]
- Podsakoff, P.M.; Organ, D.W. Selfreports in Organizational Research: Problems and Prospects. J. Manag. 1986, 12, 531–544. [Google Scholar]
- Podsakoff, P.M.; MacKenzie, S.B.; Lee, J.-Y.; Podsakoff, N.P. Common method biases in behavioral research: A critical review of the literature and recommended remedies. J. Appl. Psychol. 2003, 88, 879. [Google Scholar] [CrossRef]
- Podsakoff, P.M.; MacKenzie, S.B.; Podsakoff, N.P. Sources of method bias in social science research and recommendations on how to control it. Annu. Rev. Psychol. 2012, 63, 539–569. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Nunnally, J.C. Psychometric Theory 3E; Tata McGraw-Hill Education: New York, NY, USA, 1994. [Google Scholar]
- Kline, E.; Wilson, C.; Ereshefsky, S.; Tsuji, T.; Schiffman, J.; Pitts, S.; Reeves, G. Convergent and discriminant validity of attenuated psychosis screening tools. Schizophr. Res. 2012, 134, 49–53. [Google Scholar] [CrossRef]
- Henseler, J.; Ringle, C.M.; Sarstedt, M. A new criterion for assessing discriminant validity in variance-based structural equation modeling. J. Acad. Mark. Sci. 2015, 43, 115–135. [Google Scholar] [CrossRef] [Green Version]
- Patel, V. Airport Passenger Processing Technology: A Biometric Airport Journey. Available online: https://commons.erau.edu/cgi/viewcontent.cgi?article=1384&context=edt (accessed on 4 May 2020).
Variables | Frequency | % | |
---|---|---|---|
Gender | Female | 163 | 49.8% |
Male | 164 | 50.2% | |
Age | 20s | 78 | 23.8% |
30s | 84 | 25.7% | |
40s | 80 | 24.5% | |
50s~ | 85 | 26.0% | |
Education | ~High School | 84 | 25.7% |
Undergraduate | 225 | 68.8% | |
Postgraduate | 18 | 5.5% | |
Monthly Income (KRW) | ~2M | 48 | 14.7% |
2M~5M | 157 | 48.0% | |
5M~8M | 98 | 30.0% | |
8M~ | 24 | 7.3% |
Type (the Number of Questions) | Avg. (SD) | Question | Source | |
---|---|---|---|---|
Perceived Risk | Temporal Risk (3) | 3.27 (0.876) | It will take too much time to learn how to use biometric security. | Stone and Grønhaug [14] |
3.40 (0.897) | If I use biometric security, I think it will require more unnecessary procedures. It will take more time. | |||
3.33 (0.883) | I think I will waste even more time since I have to learn how to use biometric security. | |||
Social Risk (3) | 3.44 (0.866) | Using biometric security will have a negative impact on my perception/reputation. | Featherman and Pavlou [15] | |
3.80 (0.891) | If I use biometric security, I’m sure that other people will find me strange. | |||
3.12 (0.956) | I’ll use biometric security after seeing other people using it without going through any trouble. | |||
Physical Risk (3) | 3.41 (0.932) | I am concerned about the physical fatigue caused by the use of biometric security. | Stone and Grønhaug [14] | |
3.25 (0.970) | I’m worried that biometric security might cause physical discomfort or other physical side effects. | |||
2.94 (0.962) | Since biometric security has yet to be verified as safe, I am concerned about the physical risks using the system. | |||
Functional Risk (3) | 2.52 (0.909) | I’m not sure whether the biometric security system will work as well as it is said. | ||
2.86 (0.868) | I’m not sure if biometric security will provide me with as much convenience and benefits as I’d expect. | |||
2.86 (0.877) | I’m not sure if the speed and convenience offered by biometric security will be practical enough. | |||
Perceived Benefits | Relative Advantage (3) | 2.45 (0.845) | Biometric security will be more interesting compared to the conventional boarding system. | Rogers [13] |
2.59 (1.014) | If I use biometric security, other people will think of me as being smart. | |||
2.68 (0.971) | The use of biometric security will require less work from my side compared to the conventional boarding procedure. | |||
Compatibility (3) | 3.03 (0.748) | Using biometric security is in line with my values. | ||
3.17 (0.864) | Biometric security is not much different from the conventional boarding system. | |||
2.69 (0.770) | Introducing the biometric security procedure to the current boarding system is not a big problem. | |||
Trialability (3) | 2.41 (0.781) | If I could try biometric security right now, I think it would make me more open to the idea of using it in the future. | ||
2.42 (0.847) | If airlines or airports hold events about using biometric security, it would definitely motivate me to use the system in the future. | |||
2.28 (0.796) | If there are more types of biometric security in the future, it would be helpful for us to use the system with ease. | |||
Initial Use Intention (3) | 2.60 (0.869) | I would use biometric security for my airport security procedure. | Lee [50] | |
2.77 (0.807) | Using biometric security for dealing with my airport security procedures is something I would do. | |||
2.65 (0.808) | I would see myself using biometric security for dealing with my airport security procedure. | |||
Repeat Use Intention (3) | 2.35 (0.893) | I plan to continue using biometric security for airport security procedures. | Chiu, Wang, Fang and Huang [18] | |
2.39 (0.865) | I consider biometric security to be my first choice for airport security procedures in the future. | |||
2.26 (0.830) | It is likely that I will continue using biometric security in the future. |
Construct | Cronbach’s α | Composite Reliability | AVE | |
---|---|---|---|---|
PR | TI | 0.800 | 0.882 | 0.714 |
SO | 0.762 | 0.863 | 0.679 | |
PH | 0.828 | 0.897 | 0.745 | |
FU | 0.781 | 0.873 | 0.697 | |
PB | RA | 0.763 | 0.863 | 0.68 |
CO | 0.726 | 0.844 | 0.644 | |
TR | 0.810 | 0.887 | 0.724 | |
IUI | 0.775 | 0.868 | 0.689 | |
RUI | 0.885 | 0.929 | 0.813 |
Construct | TI | SO | PH | FU | RA | CO | TR | IUI | RUI | |
---|---|---|---|---|---|---|---|---|---|---|
PR | TI | 0.845 | ||||||||
SO | 0.600 | 0.824 | ||||||||
PH | 0.453 | 0.541 | 0.863 | |||||||
FU | 0.346 | 0.331 | 0.430 | 0.835 | ||||||
PB | RA | −0.119 | −0.262 | −0.151 | −0.089 | 0.825 | ||||
CO | −0.111 | −0.275 | −0.198 | −0.243 | 0.290 | 0.803 | ||||
TR | −0.253 | −0.447 | −0.301 | 0.346 | 0.475 | 0.450 | 0.851 | |||
IUI | −0.351 | −0.543 | −0.485 | −0.332 | 0.397 | 0.392 | 0.463 | 0.830 | ||
RUI | −0.486 | −0.611 | −0.532 | −0.277 | 0.352 | 0.289 | 0.672 | 0.672 | 0.902 |
Construct | Original β | Mean β | STDEV | t-Value | p-Value | |
---|---|---|---|---|---|---|
PR | TI → PR | 0.335 | 0.332 | 0.022 | 15.490 | 0.000 |
SO → PR | 0.390 | 0.395 | 0.027 | 14.684 | 0.000 | |
PH → PR | 0.355 | 0.353 | 0.020 | 18.098 | 0.000 | |
FU → PR | 0.265 | 0.264 | 0.018 | 14.640 | 0.000 | |
PB | RA → PB | 0.422 | 0.421 | 0.031 | 13.715 | 0.000 |
CO → PB | 0.423 | 0.421 | 0.031 | 13.829 | 0.000 | |
TR → PB | 0.559 | 0.560 | 0.041 | 13.590 | 0.000 |
Construct | PR | PB | IUI | RUI |
---|---|---|---|---|
PR | ||||
PB | 0.377 | |||
IUI | 0.570 | 0.539 | ||
RUI | 0.642 | 0.529 | 0.672 |
Hypothesis | Results | |
---|---|---|
H1 | Perceived risk influences passengers’ initial use intention of biometric security negatively. | Accepted |
H2 | Perceived risk influences passengers’ repeat use intention of biometric security negatively. | Accepted |
H3 | Perceived benefit influences passengers’ initial use intention of biometric security positively. | Accepted |
H4 | Perceived benefit influences passengers’ repeat use intention of biometric security positively. | Accepted |
H5 | Initial use intention influences passengers’ repeat use intention of biometric security positively | Accepted |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, C.; Lee, K.C.; Costello, F.J. The Intention of Passengers towards Repeat Use of Biometric Security for Sustainable Airport Management. Sustainability 2020, 12, 4528. https://doi.org/10.3390/su12114528
Kim C, Lee KC, Costello FJ. The Intention of Passengers towards Repeat Use of Biometric Security for Sustainable Airport Management. Sustainability. 2020; 12(11):4528. https://doi.org/10.3390/su12114528
Chicago/Turabian StyleKim, Cheong, Kun Chang Lee, and Francis Joseph Costello. 2020. "The Intention of Passengers towards Repeat Use of Biometric Security for Sustainable Airport Management" Sustainability 12, no. 11: 4528. https://doi.org/10.3390/su12114528