Skip to main content

Biometric Authentication and Authorization Infrastructures in Trusted Intra-Organizational Relationships

  • Conference paper
  • First Online:
Book cover Management of the Interconnected World

Abstract

Today, the lives of both people and organizations are strongly focused on the creation, development and maintenance of relationships. These are influenced by several factors, amongst which trust plays an important role. Same as in traditional relationships, trust is considered crucial in their digital equivalent; here we can speak of the concept of trust in technology. An example for trust in technology is given by biometric authentication and authorization infrastructures. A possible approach is the use of typing behavior biometrics as authentication method. This provides a higher security, considering several biometric specific problems like replay attacks or template aging. The intra-organizational environment allows an interesting solution to these problems, namely the synchronization of biometric data within a federation of applications running in the same company. This paper presents the influence of the proposed authentication model on trust by means of the technical-formal-informal model inside an organization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chiles TH, McMackin J (1996) Integrating variable risk preferences, trust, and transaction cost economics. Acad Manage Rev 21(1):73–99

    Article  Google Scholar 

  2. Rousseau MT, Stikin SB, Burt SB, Carmerer C (1998) Not so different after all: across-discipline view of trust. Acad Manage Rev 23(3): 393–404

    Google Scholar 

  3. Kramer RM (1999) Trust and distrust in organizations: emerging perspectives, enduring questions. Ann Rev Psychol 50(1):569–598

    Article  Google Scholar 

  4. Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manage Rev 20(3):709–734

    Article  Google Scholar 

  5. McKnight DH, Chervany NL (2001) Trust and distrust definitions: one bite at a time. In: Falcone R, Singh MP, Tan Y (eds) In Proceedings of the workshop on deception, fraud, and trust in agent societies held during the autonomous agents conference: trust in cyber-societies, integrating the human and artificial perspectives lecture notes in computer science, vol. 2246. Springer, London, pp 27–54

    Google Scholar 

  6. Levi M (1996) Social and unsocial capital: a review essay of Robert Putnam’s “making democracy work”. Polit Soc 24(1):45–55

    Article  Google Scholar 

  7. Bhattacherjee A (2002) Individual trust in online firms: scale development and initial test. J Manage Inf Syst 19(1):211–242

    Google Scholar 

  8. Williamson OE (1985) The economic institutions of capitalism. Free Press, New York

    Google Scholar 

  9. Eisenhardt K (1985) Control: organizational and economic approaches. Manage Sci 31(2):134–149

    Article  Google Scholar 

  10. McKnight DH, Cummings LL, Chervany NL (1998) Initial trust formation in new organizational relationships. Acad Manage Rev 23(3): 473–491

    Article  Google Scholar 

  11. Granovetter M (1985) Economic action and social structure: the problem of embeddedness. Am J Sociol 91(November): 481–510

    Google Scholar 

  12. Misiolek NI, Zakaria N, Zhang P, (2002) Trust in organizational acceptance of information technology: a conceptual model and preliminary evidence. In Proceedings of the decision sciences institute 33rd annual meeting 2002, San Diego

    Google Scholar 

  13. Ratnasingam P, Pavlou P (2002) Technology trust: the next value creator in B2B electronic commerce. International resources management association conference, Washington, Seattle

    Google Scholar 

  14. Reeves B, Nass C (1996) The media equation. How people treat computers, television, and new media like real people and places. Cambridge University Press, New York

    Google Scholar 

  15. Schläger C, Sojer M, Muschall B, Pernul G (2006) Attribute-Based authentication and au-thorisation infrastructures for e-commerce providers. Springer, Krakow, pp 132–141

    Google Scholar 

  16. Liebenau J, Backhouse J (1990) Understanding information: an introduction. Macmillan, London

    Google Scholar 

  17. Gambetta D (1988) Trust: making and breaking cooperative relations. Basil Blackwell, Oxford

    Google Scholar 

  18. Kumar K, Becerra-Fernandez I (2007) Interaction technology: speech act based information technology support for building collaborative relationships and trust. Decis Support Syst 43(2):584–606. DOI= http://dx.doi.org/10.1016/j.dss.2005.05.017

  19. Ba S, Whinston AB, Zhang H (1999) Building trust in the electronic market through an economic incentive mechanism. In: Proceedings of the 20th international conference on information systems (Charlotte, North Carolina, United States, December 12–15, 1999). International conference on information systems. Association for Information Systems. Atlanta, GA, pp 208–213

    Google Scholar 

  20. Ratnasingam P (2002) The importance of technology trust in web services security. Inf Manage Comput Secur 10(5):255–260

    Google Scholar 

  21. Koller M (1988) Risk as a determinant of trust. Basic Appl Soc Psychol 9(4):265–276

    Article  Google Scholar 

  22. Lewicki RJ, Bunker BB (1996) Developing and maintaining trust in work relationships. In: Kramer RM, Tyler TR (eds) Trust in organizations: frontiers of theory and research. Sage Publications, Thousand Oaks, pp 114–139

    Google Scholar 

  23. Pavlou P, Tan YH, Gefen D (2003) Institutional trust and familiarity in online interorganizational relationship. In Proceedings of the 11th European conference on information systems, Naples, Italy, June 19–21, 2003

    Google Scholar 

  24. Spagnoletti P, Za S, D’Atri A (2007) Institutional Trust and security, new boundaries for virtual enterprises. In Proceedings of 2nd international workshop on interoperability solutions to trust, security, policies and QoS for enhanced enterprise systems, IS-TSPQ2007, Funchal, Portugal

    Google Scholar 

  25. Tyler TR, Degoey P (1996) Trust in organizational authorities. The influence of motive attributions on willingness to accept decisions. In Kramer RM, Tyler TR (eds) Trust in organizations: frontiers of theory and research. Sage Publications, Thousand Oaks, pp 331–350

    Google Scholar 

  26. Qarchive (2008) Database synchronization, database-synchonization.qarchive.org. Retrieved 1 Oct 2008

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthias Olden .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Olden, M., Za, S. (2010). Biometric Authentication and Authorization Infrastructures in Trusted Intra-Organizational Relationships. In: D'Atri, A., De Marco, M., Braccini, A., Cabiddu, F. (eds) Management of the Interconnected World. Physica-Verlag HD. https://doi.org/10.1007/978-3-7908-2404-9_7

Download citation

Publish with us

Policies and ethics