Main Article Content

Suguna Sinniah Sinniah
Zafir Khan Mohamed Makhbul
Muthaloo Subramaniam
Gopal Perumal
Ramesh Kumar Moona Haji Mohamed


Perceived Usefulness, Relative Advantage, Perceived Ease of Use, Fingerprint system, on-value added practices


Purpose: The aim of this study is to assist the Malaysian electronics companies in reducing the non-value added practices and in return, will minimize the cost and improves productivity with the use of the fingerprint system.

Methodology: This study uses a quantitative research approach and data were sampled from 137 front-line employees using simple random sampling technique.

Result: The empirical findings of the study confirm that perceived usefulness and perceived ease of use significantly affect the intention to use the fingerprint system. However, there was not enough evidence that relative advantage has any effect on the intention to use the system. 

Implications: The study results affirmed that business organizations, especially electronic companies should transform their use of conventional attendance system to fingerprint system in improving efficiencies and effectiveness within the human resource practices.


Download data is not yet available.


Metrics Loading ...
Abstract 45 | PDF Downloads 45 XML Downloads 1 ePUB Downloads 7


1. Agarwal, R. (2000). Individual Acceptance of Information Technologies. Educational Technology Research and Development.<2266:MOITDV>2.0.CO;2
2. Alalwan, A. A., Dwivedi, Y. K., Rana, N. P. P., & Williams, M. D. (2016). Consumer adoption of mobile banking in Jordan: Examining the role of usefulness, ease of use, perceived risk and self-efficacy. Journal of Enterprise Information Management.
3. Anderson, J. C., & Gerbing, D. W. (1988). Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach. Psychological Bulletin.
4. Arif, A., Li, T., & Cheng, C. H. (2017). Blurred fingerprint image enhancement: algorithm analysis and performance evaluation. Signal, Image and Video Processing.
5. Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the academy of marketing science, 16(1), 74-94.
6. Byun, S., & Byun, S. E. (2013). Exploring perceptions toward biometric technology in service encounters: A comparison of current users and potential adopters. Behaviour and Information Technology.
7. Chew, J., & Chan, C. C. (2008). Human resource practices, organizational commitment and intention to stay. International journal of manpower, 29(6), 503-522.Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly.
8. Choudhary, P. K., & Nagaraja, H. N. (2017). Measuring Agreement: Models, Methods, and Applications (Vol. 891). John Wiley & Sons.
9. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 319-340.
10. Davis, F.D, Bagozzi, R. P., Warshaw, P, R. (1989). "Use acceptance of computer technology: A comparison of two theoretical models”, Management Science, 35, 982 – 1003.
11. Dijkstra, T. K., & Henseler, J. (2015). Consistent Partial Least Squares Path Modeling. MIS quarterly, 39(2).
12. Dooley, K. J. (2011). Organizational psychology. In Chaos and Complexity in Psychology: The Theory of Nonlinear Dynamical Systems.
13. Eriksson, K., Kerem, K., & Nilsson, D. (2005). Customer acceptance of internet banking in Estonia. International Journal of Bank Marketing., A. (2005). Discovering Statistics Using SPSS. London: Sage Publications.
14. Fornell, C., & Larcker, D.F. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18, 39 –50.
15. Guriting, P., & Oly Ndubisi, N. (2006). Borneo online banking: Evaluating customer perceptions and behavioural intention. Management Research News.
16. Gold, A. H., Malhotra, A., & Segars, A. H. (2001). Knowledge management: An organizational capabilities perspective. Journal of Management Information Systems.
17. Hair J. F., Hult, G. T. M., Ringle, C., & Sarstedt, M. (2016). A primer on partial least squares structural equation modeling (PLS-SEM). Sage Publications, Thousand Oaks.
18. Hair, J. F. (2007). Research methods for business.
19. Hair, J. F. Jr., Money, A.H., Samouel, P., & Page, M. (2007). Research methods for business. Chichester, West Sussex: John Wilet & Sons, Inc.
20. Henseler, J., Hubona, G., & Ray, P. A. (2016). Using PLS path modeling in new technology research: updated guidelines. Industrial management & data systems, 116(1), 2-20.
21. Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135.
22. Hernandez, J. M. C., & Mazzon, J. A. (2007). Adoption of internet banking: proposition and implementation of an integrated methodology approach. International Journal of Bank Marketing.
23. Hoelter, J. W. (1983). The analysis of covariance structures: Goodness-of-fit indices. Sociological Methods and Research, 11, 325-344.
24. Hu, L. T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal, 6(1), 1-55.
25. Hamid, A. A., Razak, F. Z. A., Bakar, A. A., & Abdullah, W. S. W. (2016). The Effects of Perceived Usefulness and Perceived Ease of Use on Continuance Intention to Use E-Government. Procedia Economics and Finance.
26. Igbaria, M., & Iivari, J. (1995). The effects of self-efficacy on computer usage. Omega.
27. Igbaria, M., Zinatelli, N., Cragg, P., & Cavaye, A. L. M. (1997). Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model. MIS Quarterly.
28. James, T., Pirim, T., & Boswell, K. (2006). Determining the intention to use biometric devices: An application and extension of the technology acceptance model. Journal of Organizational and End User Computing.
29. Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on circuits and systems for video technology, 14(1), 4-20.
30. Jiang, P., Zhang, Y., Fu, W., Liu, H., & Su, X. (2015). Indoor mobile localization based on Wi-Fi fingerprint’s important access point. International Journal of Distributed Sensor Networks.
31. John W. Bond. (2009). The value of fingerprint evidence in detecting crime. International Journal of Police Science & Management, 11(1), 77–84.
32. Johnson, S. M., Kraft, M. A., & Papay, J. P. (2012). How context matters in high-need schools: The effects of teachers’ working conditions on their professional satisfaction and their students’ achievement. Teachers College Record, 114(10), 1-39.
33. Kepha, A. O. (2015). Influence of Human Resource Management Practices on the Performance of Employees in Research Institutes in Kenya (Doctoral dissertation).
34. Kline, R.B. (2015). Principles and practice of structural equation modeling (4th ed.). New York: Guilford Publications.
35. Kumar, N.R. & Krishnaveni, R. (2008). Role of HRD practices in building organizational commitment, Journal of Contemporary Research in Management, April-June, 59-68.
36. Kucukusta, D., Law, R., Besbes, A., & Legohérel, P. (2015). Re-examining perceived usefulness and ease of use in online booking the case of Hong Kong online users. International Journal of Contemporary Hospitality Management.
37. Lancelot Miltgen, C., Popovič, A., & Oliveira, T. (2013). Determinants of end-user acceptance of biometrics: Integrating the “big 3” of technology acceptance with privacy context. Decision Support Systems.
38. Lee, H. C., Ramotowski, R., & Gaensslen, R. E. (Eds.). (2001). Advances in fingerprint technology. CRC press.
39. Lian, L. K., & Tui, L. G. (2012). The mediating effect of downward influence tactics on the relationship between leadership style and organizational citizenship behavior. Jurnal Pengurusan.
40. Mattila, M. (2015). Factors affecting the adoption of mobile banking services. The Journal of Internet Banking and Commerce, 2003.
41. McEvoy, T. G., Robinson, J. J., Aitken, R. P., Findlay, P. A., & Robertson, I. S. (1997). Dietary excesses of urea influence the viability and metabolism of preimplantation sheep embryos and may affect fetal growth among survivors. Animal reproduction science, 47(1), 71-90.
42. McGrath, R. G., Tsai, M.-H., Venkataraman, S., & MacMillan, I. C. (1996). Innovation, Competitive Advantage and Rent: A Model and Test. Management Science, 42(3), 389–403.
43. Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information systems research, 2(3), 192-222.
44. O’Gorman, L., & Chatham, N. J. (1999). 2 Fingerprint Verification. Personal Identification in Networked Society.
45. O'Hair, D., Friedrich, G. W., & Dixon, L. D. (2007). Strategic communication in business and the professions. Allyn & Bacon.
46. Ogbanufe, O., & Kim, D. J. (2018). Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decision Support Systems.
47. Pankanti, S., Prabhakar, S., & Jain, A. K. (2002). On the individuality of fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence.
48. Park, H. M. (2015). Univariate analysis and normality test using SAS, Stata, and SPSS.
49. Paul, A. K., & Anantharaman, R. N. (2004). Influence of HRM practices on organizational commitment: A study among software professionals in India.Human Resource Development Quarterly, 15(1), 77-88.
50. Podsakoff, P.M., & Organ, D.W. (1986). "Self-reports in organizational research: Problems and prospects " Journal of Management, 12(4), 531–544.
51. Podsakoff, P.M., MacKenzie, S.B., Lee, J.-Y., & Podsakoff, N.P. (2003) “Common methods biases in behavioral research: a critical review of the literature and recommended remedies," Journal of Applied Psychology 88(5), 879–903.
52. Porter, M. E. (1985). Technology and competitive advantage. Journal of business strategy, 5(3), 60-78.
53. Preacher, K.J., & Hayes, A.F. (2008). Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models. Behavior Research Methods, 40(3), 879–891.
54. Ramayah, T., Yeap, J. A. L., & Ignatius, J. (2013). An Empirical Inquiry on Knowledge Sharing Among Academicians in Higher Learning Institutions. Minerva.
55. Ratha, N., & Bolle, R. (Eds.). (2007). Automatic fingerprint recognition systems. Springer Science & Business Media.
56. Rogers, E. M. (1995). Diffusion of Innovations-Fourth Edition. Everett M. Rogers. id:126680
57. Rogers, E. M. (2015). Evolution: Diffusion of Innovations. In International Encyclopedia of the Social & Behavioral Sciences: Second Edition.
58. Sekaran, U., & Bougie, R. (2010). Theoretical framework In theoretical framework and hypothesis development. Research Methods for Business: A Skill Building Approach, United Kingdom: Wiley, 80.
59. Silaparasetti, V., Srinivasarao, G. V. R., & Khan, F. R. (2017). Structural Equation Modeling Analysis Using Smart Pls To Assess The Occupational Health And Safety (Ohs) Factors On Workers’behavior. Humanities & Social Sciences Reviews, 5(2), 88-97.
60. Soh, K. L., Wongand, W. P., & Chan, K. L. (2010). Adoption of biometric technology in online applications. International Journal of Business and Management Science.
61. Teo, T. S., Lim, G. S., & Fedric, S. A. (2007). The adoption and diffusion of human resources information systems in Singapore. Asia Pacific Journal of Human Resources, 45(1), 44-62.
62. Thomas, M. (2004). Is Malaysia's Mykad the One Card to Rule Them All-The Urgent Need to Develop a Proper Legal Framework for the Protection of Personal Information in Malaysia. Melb. UL Rev., 28, 474.
63. Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: toward a conceptual model of utilization. MIS quarterly, 125-143.
64. Venkatesh, V. (2000). Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model. Information Systems Research.
65. Vroom, V. H. (1964). Work and motivation. John Wiley and Sons.
66. Wang, Y. S., Wang, Y. M., Lin, H. H., & Tang, T. I. (2003). Determinants of user acceptance of Internet banking: An empirical study. In International Journal of Service Industry Management.
67. Weiers, R. M. (2008). Introduction to Statistics.
68. Yong, A. G., & Pearce, S. (2013). A beginner’s guide to factor analysis: Focusing on exploratory factor analysis. Tutorials in quantitative methods for psychology, 9(2), 79-94.
69. Zikmund, G., Babin, B. J., & Carr, J. C. M. Griffin (2010). Business Research Method.
70. Zikmund, W. G., McLeod, R., & Gilbert, F. W. (2003). Customer relationship management: Integrating marketing strategy and information technology. New York, NY: Wiley.