Which of the following conclusions can be drawn from the existing data on face recognition?

Introduction

Face recognition is a biometric recognition technology that uses pattern matching to recognize individual identities based on facial feature data. Compared to traditional non-biological recognition and physiological feature recognition technology, face recognition technology has specific technical advantage (Jiang, 2019). Nowadays, relying on ubiquitous mobile camera devices, face recognition technology has been widely used in various fields, including face attendance, face payment, smart campus, access control system, and security system, which demonstrate the advances in the face recognition service level in the intelligent hardware system. Face recognition technology has dramatically improved the intelligence level of business systems in these fields. The human face is rich in features. In the society of acquaintances in the past, the face was the foundation for us to involve emotional communication and social relations with others.

Technology has been one of the most important factors that changed the way of life and commercial activities of human society. With continuous innovation and the development of technology, human society is changing rapidly. Technological innovation has changed people’s lifestyles in the spheres of shopping, education, medical services, business organizations, and so on. “Technology is not only an essential tool for finding out new ways to join different actors in service innovation processes, but also as an element able to foster the emergence of new and ongoing innovations” (Ciasullo et al., 2017). For example, in the healthcare service ecosystem, health care providers adapt to the innovative medical service ecosystem so that patients can obtain better medical services. Medical service innovation has had a great impact on the continuous reconstruction of the service ecosystem (Ciasullo et al., 2017). Technology forces the market to change constantly, and the changing market leads business organizations to innovate. “The contemporary world is characterized by a fast changing environment. Business organizations are faced with the challenge of keeping pace with developments in the field of technology, markets, cultural and socio-economic structures” (Kaur et al., 2019). In the era of big data and information, business organizations must “to explore how cognitive computing technology can act as potential enabler of knowledge integration-based collaborations with global strategic partnerships as a special case” (Kaur et al., 2019).

At present, innovations in network technology provide the greatest convenience and advantages for organizations dealing with such networks. “Small and medium-sized enterprises (SMEs) have been considered the most innovative oriented businesses in developed countries even in emerging markets acting as pioneer in the digital transformational word.” Meanwhile, it is important for technology upgrading, knowledge spillover, and technology transfer to explore SMEs’ competitiveness (Del Giudice et al., 2019).

Knowledge and technology transfer is a “pathway” for accelerating economic system growth and advancement. Technology transfer can be explored from theory to practice for knowledge and technology. From the users’ perspective, technology transfer affects their sense of use and experience (Elias et al., 2017). Big data analytics capabilities (BDAC) represent critical tools for business competitiveness in highly dynamic markets. BDAC has both direct and indirect positive effects on business model innovation (BMI), and they influence strategic company logics and objectives (Ciampi et al., 2021). “In the world of Big Data, innovation, technology transfer, collaborative approaches, and the contribution of human resources have a direct impact on a company’s economic performance.” Therefore, big data companies should make corresponding changes in management and strategy. Moreover, skilled human resources have a positive contribution to the company’s economic performance. “Information and knowledge are the foundation on which act for aligning company’s strategies to market expectations and needs” (Caputo et al., 2020).

With the arrival of the era of artificial intelligence, intelligent social life has become a reality, and artificial intelligence has become a new engine for China’s economic and social development. According to the latest data released by the China Internet Information Center, the number of artificial intelligence enterprises in China ranks second in the world (CNNIC, 2020). As a new technology, face recognition—a typical application of artificial intelligence—rises with the construction of a smart city According to the statistics presented in the Report on In-depth Market Research and Future Development Trend of China’s Face Recognition Industry (2018–2024) released by the Intelligence Research Group, it is estimated that the face recognition industry in China will reach 5.316 billion Yuan by 2021 (Biometrics Identity Standardization [BIS], 2020). As the gateway connecting humans and intelligence face recognition has excellent development potential.

Given that the modern era emphasizes looks, the face remains socially functional, but technology has given it new meaning and a mission. The attributes and features of a facial image are enough to convey a person’s identity. When our face is tied to our personal information and even used as a password substitute, it is no longer the traditional concept of face. Face recognition technology can extract personally identifiable information, such as age, gender, and race, from images. To some extent, in the Internet age, almost everyone’s personal information is displayed without any protection.

With the technical support of big data, user portraits based on facial recognition and a variety of personal data have increasingly become identification for individuals in this day and age (Guo, 2020). From face-swapping apps, access by face recognition to Hangzhou Safari Park, the application of face recognition in subway security checks, to the formulation of the Personal Information Protection Law of the People’s Republic of China (PRC), a series of public opinions have brought face recognition to the forefront. On the other hand, Internet privacy, which has been neglected so far, is increasingly taken seriously by the public.

The issues of face recognition and privacy have been studied extensively by experts and scholars in their respective fields, but there are few empirical studies on the combination of the use of face recognition and personal privacy security. At present, most scholars’ research on face recognition focuses on face recognition algorithms, recognition systems, legal supervision and security, users’ willingness to accept face payments, and the application of face recognition in the library. No quantitative research has been conducted on the relationship between the use of face recognition technology and people’s attitudes toward privacy issues. Therefore, based on the two main determinants of the technology acceptance model (TAM) and according to public attitudes toward privacy and the specific context of the use of face recognition in the current networked environment, variables such as privacy concerns, risk perception, and trust are introduced in this study to build the hypothesis model of the actual use of face recognition. The concept of privacy concerns is applied to the research on personal information security behavior of facial recognition users, which further expands the practical scope of the privacy theory and provides suggestions to promote the development of facial recognition applications.

This research makes two contributions. First, it demonstrates the impact of privacy concerns, perceived risk, trust, social cognition, and cross-cultural aspects on facial recognition. This result enriches face recognition literature, and a hypothesis model based on perceived ease of use and perceived usefulness—the two determinants of user behavior—is created. Second, this research confirms that the privacy paradox still exists. In the digital information age, most users will still choose to provide personal information in exchange for the services and applications they need. Trust, social cognition, and culture play a vital role in intelligent societies and virtual interactions. Meanwhile, when technology applications can provide users with diversified and user-friendly functions, their perceived usefulness is significantly improved.

The structure of the article is as follows. In section “Theoretical Basis and Research Hypothesis,” we examine the theoretical basis and research hypothesis. Section “Variable Measurement and Data Collection” describes variable measurement and data collection, including questionnaire design and data collection. Section “Data Analysis” presents the results of the data analysis. Section “Conclusion” discusses the key findings of the research along with the final remarks.

Theoretical Basis and Research Hypothesis

Privacy

In the era of mobile data services based on big data, “the nature of economic exchange is more inclined to exchange personal information for personalized services. Privacy violations may occur in the acquisition, storage, use and transaction of personal information, thus giving rise to problems in information privacy” (Chen and Cliquet, 2020). Moreover, in the Internet environment, information privacy security in intelligent society is increasingly threatened. Since facial recognition is based on the acquisition of human face image information and face information demands privacy, face information security becomes the focus of the public when choosing whether to use facial recognition technology. On the one hand, human faces are rich in features, which provide powerful biometric features for identifying individuals; thus, a third party can identify individuals through face positioning, and so it is necessary to prevent the malicious collection and abuse of such information. On the other hand, through image storage and feature extraction, a variety of demographic and private information can be obtained, such as facial age, health status, and even relatives, which leads to unnecessary privacy invasion (Zahid and Ajita, 2017). Therefore, in view of the uniqueness of human face and information privacy, the focus of this paper will be whether the public’s actual use of face recognition is affected by their attitudes toward personal privacy and the perceived risk of personal data.

Privacy Concerns

Privacy concerns are widely used to explain the behavior intention of users (Zhang and Li, 2018). In the Internet field, privacy concerns of users include people’s perceptions and concerns about improper access, illegal acquisition, illegal analysis, illegal monitoring, illegal transmission, illegal storage, and illegal use of private information (Wang et al., 1998). Users do not have full control over the use of their personal information. Thus, users become concerned about privacy when it may be violated due to security loopholes or inappropriate use or when individuals perceive the risk of privacy infringement.

Personal privacy in the age of mobile data services involves both online and offline domains. The extensive use of various personal biological information applications poses new challenges to personal privacy security. Specifically, with the progress of computer algorithms, the Internet of Things, and other technologies, the threshold of information collection becomes increasingly lower, and computerized information may be easily copied and shared, resulting in problems such as secondary data mining and inadequate privacy (Qi and Li, 2018). In the existing research on privacy concerns, Cha found that there is a negative correlation between users’ concerns regarding the information privacy of a technology-driven platform and the frequency of users using the media (Cha, 2010). McKnight conducted research on Facebook, whereby they found that the greater the concern about privacy is in a medium, the less willing people are to continue using the medium for fear of personal information being abused (McKnight et al., 2011). In the context of big data, the privacy concerns of face recognition users originate from the risk of facial image information being collected and used without personal knowledge or consent or the risk of personal biometrics being transmitted or leaked. In other words, the cautious choice of face recognition application is influenced by the extent of individual concerns regarding privacy. Considering these notions, the following hypothesis is proposed:

Hypothesis 1: Privacy concerns have a negative impact on the actual use of face recognition.

Perceived Risk

Due to the virtuality or uncertainty of a network, perceived risk is an individual’s perception of the risk of information breach. The perceived risk of facial recognition may arise from the disclosure or improper use of face information. Chen conducted an empirical study on this and believed that the degree of individuals’ concerns for information security is affected by the perceived network risk (Chen, 2013). Norberg et al. (2007) showed in their study that the negative effect of perceived disclosure is affected by perceived risk. In other words, the more users perceive that the disclosure of personal information will lead to the illegal breach of privacy and other adverse effects, the more they will be concerned about the security of personal privacy. Not only is the degree of privacy concerns positively affected by perceived risk, but studies have also shown that perceived risk also affects actual use behavior (Zhang and Li, 2018). Hichang’s (2010) research results show that the degree of severity of privacy risks perceived by users is positively correlated with the degree of their self-protection behaviors. When people realize that their personal information is at risk, they take active preventive actions. Therefore, in this paper, regarding the intention to use facial recognition, it is believed that the higher the risk perceived by users, the more users will pay attention to the breach of personal privacy, thus affecting the actual use of facial recognition. In this vein, the following hypotheses are proposed:

Hypothesis 2: Perceived risk has a positive effect on privacy concerns.

Hypothesis 3: Perceived risk has a negative influence on the actual use of face recognition.

Trust Theory

Simmel (2002) pioneered the sociological study of trust, believing that trust is an essential comprehensive social force. Putnam (2001) believed that trust is an essential social capital and can improve social efficiency through actions that promote coordination and communication. In an intelligent social environment, social transactions cannot occur without trust. Hence, trust has also become an essential factor in the study of privacy issues. In the context of face recognition, trust is defined as users’ belief in the ability of face recognition technology and application platforms to protect their personal information. Joinson et al. (2010) found in his study that users’ perceived risk to personal privacy is affected by their degree of trust. Moreover, through research on the behavioral intention of intelligent media use, some scholars present that trust will directly affect the use intention, and there is a significant correlation between trust and users’ use intention. Therefore, the following hypotheses are proposed:

Hypothesis 4: Trust negatively affects the perceived risk of users with face recognition.

Hypothesis 5: Trust positively affects the actual use of face recognition.

Technology Acceptance Model

The TAM is widely used to explain users “acceptance of new technologies and products, and it is the most influential and commonly used theory to describe individuals” degree of acceptance to information systems (Lee et al., 2003). The TAM is used for research in different fields: education (Scherer et al., 2019), hospitals and healthcare (Nasir and Yurder, 2015; Fletcher-Brown et al., 2020; Hsieh and Lai, 2020; Papa et al., 2020), sports and fitness (Lunney et al., 2016; Lee and Lee, 2018; Reyes-Mercado, 2018), fashion (Turhan, 2013; Chuah et al., 2016), consumer behavior (Wang and Sun, 2016; Yang et al., 2016; Kalantari and Rauschnabel, 2018), gender and knowledge sharing (Nguyen and Malik, 2021), wearable devices (Magni et al., 2021), human resource management (Del Giudice et al., 2021), Internet of Things (Caputo et al., 2018), technophobia and emotional intelligence influence on technology acceptance (Khasawneh, 2018).

In this study, a hypothesis model is developed based on perceived ease of use and perceived usefulness, two determinants of user behavior.

Perceived usefulness refers to the extent to which users believe that using a specific system will improve their job performance. Perceived ease of use refers to the ease with which users think a particular system can be used, which also affects their perceived usefulness of technology (Davis, 1989). The easier it is to use face recognition, the more useful it is considered be. For the purpose of this study, face recognition aims to realize multiple functions, such as providing efficient and convenient services. Therefore, the definition of perceived usefulness should be extended to users think face recognition can improve the degree of convenience and service. In this paper, the ease of using a face recognition application refers to users’ perceived ease of use of the technology. Previously, Davis (1989) conducted an empirical study on the e-mail system and concluded that perceived ease of use has a positive impact on the use of applications. In a study on the adoption and use of information systems in the workplace, Venkatesh and Davis (2000) demonstrated that perceived usefulness has a positive impact on people’s usage behavior. With the extensive application of the TAM in the information system, the face recognition technology studied in this paper also comprises intelligent media. Perceived usefulness is an important variable that affects the use of face recognition. Thus, the following hypotheses are proposed:

Hypothesis 6: Perceived ease of use has a positive impact on perceived usefulness.

Hypothesis 7: Perceived ease of use has a positive influence on the actual use of face recognition.

Hypothesis 8: Perceived usefulness has a positive impact on the actual use of face recognition.

The research model of this paper is shown in Figure 1.

Which of the following conclusions can be drawn from the existing data on face recognition?

Figure 1. Structural equation model.

Variable Measurement and Data Collection

Questionnaire Design

In order to ensure the scientificity and credibility of the measurement variables, this study modified the mature scale in previous studies and combined it with the information concerns of current users on the use of face recognition and developed a questionnaire. This questionnaire consists of two parts. The first part investigates the demographic characteristics of users, such as gender and age. The second part is measured by a Likert scale. The options of each measurement item include “Strongly disagree,” “Disagree,” “Neither agree nor disagree,” “Agree,” and “Strongly agree.” The survey included seven latent variables and 21 measured variables. Latent variables included perceived ease of use, perceived usefulness, privacy concerns, risk perception, trust, and actual use. The contents of the scale are shown in Table 1.

Which of the following conclusions can be drawn from the existing data on face recognition?

Table 1. Design of measurement items for variables studied.

Data Collection

In this study, the questionnaire was designed on the survey platform1 and distributed in the form of links through WeChat, QQ, and other channels. The survey was conducted from May 26 to June 10, 2020, and a total of 635 questionnaires were recovered. The subjects of the questionnaire were users of face recognition technology. After the second screening, 518 valid questionnaires remained after the elimination of incomplete questionnaires and all the questionnaires with the same options. The specific statistics are shown in Table 2.

Which of the following conclusions can be drawn from the existing data on face recognition?

Table 2. Statistical analysis of demographic characteristics (N = 518).

From the reported statistics, it can be seen that the gender ratio of the sample data is balanced. The age structure of the respondents is mainly between 18 and 35 years old, so it is an overall young sample, conforming to the age characteristics of the main user group of facial recognition. The respondents mostly have a high level of education, with a bachelor’s degree or above. In terms of urban distribution, 58.7% of respondents came from first-tier cities and new first-tier cities. The sample coverage is reasonable and thus representative. As for privacy, more than 86.1% of respondents believe that face information is private. Consequently, the sample data collected in this questionnaire applies to the relevant research on the privacy problems of face recognition users.

Data Analysis

Reliability and Validity Analysis

For this study, SPSS 25.0 was used to analyze the collected data and evaluate the reliability of the data. Cronbach’s alpha (α coefficient) was used to measure the data in this study. With 0.7 as the critical value, it is generally believed that when Cronbach’s α coefficient is greater than 0.7, the scale has considerable reliability. Based on the test results, the overall Cronbach’s α coefficients of privacy concerns, perceived risk, perceived ease of use, perceived use, trust, and actual use are between 0.876 and 0.907, all of which are greater than 0.7. This indicates that the measurement of each latent variable shows excellent internal consistency and that the questionnaire is reliable as a whole.

Structural validity refers to the corresponding relationship between measurement dimensions and measurement items. It is often used in research to analyze questionnaire items. According to the results of AMOS 24.0 for confirmatory factor analysis, the fitting index of confirmatory factor analysis in this study was X2/df = 2.722, which is less than 3, thus indicating that the fit was ideal. RMSEA = 0.058, which is less than 0.08, indicating that the model is acceptable. It is generally believed that when the fitting index of NFI, IFI, and CFI is greater than 0.9, it indicates that the model fits well; in this regard, NFI = 0.938, RFI = 0.925, IFI = 0.960, TLI = 0.951, CFI = 0.959. Therefore, the fitting index of this model conforms to the common standard, and the fitting degree of the model is proper.

Exploratory factor analysis is utilized to determine whether each measurement item converges to the corresponding factor, and the number of selected factors is determined by the number of factors whose eigenvalue exceeds 1. If the value of factor loading is greater than 0.6, it is generally considered that each latent variable corresponds to a representative subject (Gerbing and Anderson, 1988; Gefen and Straub, 2005).

As shown in Table 3, the values of factor loading of the latent variables, including privacy concerns, perceived risk, perceived ease of use, perceived usefulness, trust, and actual use, were all greater than 0.7, which shows that the corresponding topic of latent variables is highly representative.

Which of the following conclusions can be drawn from the existing data on face recognition?

Table 3. Factor load and variable combination reliability.

Combined reliability (CR) and average variance extracted (AVE) were used for the convergent validity analysis. Generally, the recommended threshold of CR is greater than 0.8 or higher (Werts et al., 1974; Nunnally and Bernstein, 1994). AVE is recommended to be above 0.5 (Fornell and Larcker, 1981). As shown in Table 3, the AVE of each latent variable was greater than 0.5, and CR was greater than 0.8, indicating that the convergence validity was ideal.

According to the results in Table 4, there was a significant correlation between actual use and privacy concerns, perceived risk, perceived ease of use, perceived usefulness, and trust (p < 0.001). In addition, the absolute value of the correlation coefficient corresponding to each variable was less than 0.5 and was less than the corresponding AVE square root. It indicates that there was a specific correlation between latent variables and a certain degree of differentiation among them, so the scale has an ideal level of discriminant validity.

Which of the following conclusions can be drawn from the existing data on face recognition?

Table 4. Correlation coefficient and AVE square root.

Correlation Analysis

Correlation analysis studies whether there is a correlation between variables and uses the correlation coefficient to measure the degree of closeness between variables. The three statistical correlation coefficients are the Pearson correlation coefficient, the Spearman correlation coefficient, and the Kendall correlation coefficient, of which the Pearson correlation coefficient is commonly used in questionnaire and scale studies (Qi and Li, 2018). In this study, SPSS 25.0 and Pearson’s correlation analysis were used to study whether there is a significant correlation between privacy concerns, perceived risk, perceived ease of use, perceived use, trust, and actual use in a hypothetical model to validate the validity of the research hypotheses.

Table 5 shows the means and standard deviations of privacy concerns, perceived risk, perceived ease of use, perceived usefulness, trust, and actual use and the Pearson correlation coefficient between the variables. From the mean, users had a higher perceived risk and a lower degree of trust. The results of correlation coefficient matrix showed that perceived risk and privacy concerns are significantly and positively correlated, and H2 was initially verified; privacy concerns, persistent risk, and actual use were negatively correlated (r = –0.158, p < 0.01), and the correlation degree was weak, preliminarily supporting H1 and H3. There was a positive correlation between perceived ease of use, perceived usefulness, and actual use (p < 0.01). Among these, perceived ease of use had a weak correlation with actual use (r = 0.292) and perceived usefulness showed a moderate correlation with actual use (r = 0.494); thus, H6, H7, and H8 were preliminarily verified. There was a significantly strong correlation between trust and actual use (p < 0.01, r = 0.608), so H5 was preliminarily verified. In addition, trust was also negatively correlated with perceived risk, due to which H4 was preliminarily verified.

Which of the following conclusions can be drawn from the existing data on face recognition?

Table 5. Correlation coefficient matrix and mean and standard deviation of variables.

Path Analysis and Hypothesis Testing

The correlation analysis results showed that there was a correlation between the variables, so these hypotheses were preliminarily supported. Nevertheless, it could not adequately explain the systematic relationship between variables. Thus, AMOS 24.0 and the structural equation model were further employed in this study to explore the systematic relationship between the variables. As shown in Figure 2.

Which of the following conclusions can be drawn from the existing data on face recognition?

Figure 2. Path analysis diagram of the structural equation model.

As can be seen from Table 6, the ratio of chi-square to the degree of freedom in the structural equation was less than 5, which is within the acceptable range. RFI, CFI, NFI, TLI, IFI, and GFI indexes were all significantly greater than 0.9, and the root mean square error of approximation (RMSEA) was less than 0.08. Thus, it shows that the structural equation model fits well.

Which of the following conclusions can be drawn from the existing data on face recognition?

Table 6. Fitting of the structural equation model (N = 518).

According to Table 7, the hypotheses H2, H4, H5, H6, and H8 were verified, which shows that trust and perceived usefulness both positively influence the actual use intentions of face recognition users and that perceived risk also has a significant positive impact on privacy concerns. This indicates that the higher the public’s awareness of privacy is, the more risks it will perceive and the higher the public’s concerns about privacy will be. However, H1 and H3 were not accepted. From the test results, it can be seen that privacy concerns and perceived risk had a negative influence on the actual use of face recognition, but the influence was not significant. In addition, H7 was not supported, indicating that perceived ease of use had no significant influence on the actual use of face recognition.

Which of the following conclusions can be drawn from the existing data on face recognition?

Table 7. Results of the hypothesis test.

Hypotheses H1, H3, and H7 were not supported for the following reasons:

1. H1 and H3 were not supported: Perceived risk and privacy concerns had no significant adverse effect on the actual use of face recognition. It shows that the public chooses to use face recognition despite their concern and perception of privacy and risk. Some scholars have called this contradictory phenomenon a privacy paradox (Xue et al., 2016). In other words, although users are worried that face recognition may lead to improper use or disclosure of personal information, they still choose to use face recognition in the field of mobile networks. An important reason is that the application of intelligent media technology, facial recognition, is becoming increasingly prevalent in our daily lives, which is reflected in all aspects of our lives. Especially in the field of public services, relying on the digital platform has improved effectiveness and efficiency via face scanning.

2. H7 was not supported: The positive influence of perceived ease of use on the actual use of face recognition was not significant. This conclusion is not consistent with previous research, but to some extent, it confirms the correlation between perceived ease of use and the use of information systems. In other words, since ease of use involves self-efficacy cognition, technology anxiety can make users perceive it to be difficult to operate and reduce their evaluation of the ease of use of the system, thus further affecting the use of face recognition technology (Bhattacherjee, 2001). Affected by external factors such as light and image clarity, the maturity of face recognition technology is not high, and the algorithm is not accurate, which affects the public’s perceived ease of use. It also reflects that, for the face recognition technology, perceived usefulness has a more substantial impact on the actual use, and those users value the functional benefits brought by face recognition applications.

Robustness Test of the Model

In this paper, gender, age, educational background, and city of the respondents were introduced into the model as control variables to test the robustness of the hypothesis model. The test results are shown in the figure below.

It can be seen from Figure 3 that despite introducing control variables, such as gender, age, education background, and city, the relationship and significance level of each factor of the model were consistent with the conclusion of hypothesis test results above. Meanwhile, the test results of the influence of each control variable on the actual use of face recognition were not significant, indicating that the model passed the robustness test.

Which of the following conclusions can be drawn from the existing data on face recognition?

Figure 3. Robustness test.

Conclusion

In this study, taking the users of face recognition as the research objects, the TAM was integrated, and variables such as privacy concerns, perceived risk, and trust were added to the model to analyze the mechanism of how they affect the actual use of face recognition and explain the determinants for the use of facial recognition by the public. The results showed that the model fit well and that most of the hypotheses were supported.

Based on the results of the model analysis, this paper draws the following conclusions:

1. In the context of big data, the concept of information privacy has been continuously expanded. When users perceive the risk of their private information being disclosed through face recognition, they will have greater privacy concerns. However, although users’ privacy concerns are deep, the privacy paradox still exists. In the digital information age, most users will still choose to provide personal information in exchange for the services and applications they need.

2. Trust plays a vital role in intelligent societies and virtual interactions. In this paper, users’ trust in face recognition applications includes trust in the technology application platforms and trust in the face recognition technology itself. This study shows that the trust of technology and platform will reduce the user’s intention to safeguard themselves against it. Users believe that face recognition platforms can provide secure conditions for the use of the technology, and thus, they show a higher tendency to use such technology. On the other hand, users’ trust in face recognition technology improves, so their perceived risk of privacy information leakage is significantly reduced. In this regard, in the information age, users are willing to disclose personal information more out of their trust in face recognition technology and the related platforms.

3. In the context of face recognition as an emerging technique, the TAM still has excellent explanatory power. Although perceived ease of use has no significant positive impact on the actual use of face recognition due to other external factors, such as accuracy and technology maturity, perceived usefulness still has a significantly positive impact on the actual use of face recognition. To an extent, when technology applications can provide users with diversified and user-friendly functions, their perceived usefulness will be significantly improved.

4. The final consideration is the use management of government and technical ethics of enterprises. When developing face recognition, enterprises must pay attention to technical ethics, as well as privacy, to ensure personal privacy and protect against biological information leakage. The government must also strengthen its management of face recognition technology on a large scale to prevent enterprises and individuals from using technology to affect social security and personal privacy.

Limitations

There are some limitations to this study. First, the sample data in the model are mostly from a young group. In future research, survey data of other age groups can be explored to discuss whether the privacy concerns of users of different age groups will affect their use of facial recognition. Second, this study focuses on the influence of privacy concerns, perceived risk, perceived ease of use, perceived usefulness, and trust on the actual use of face recognition but has not assessed whether other factors, such as user experience and usage habits, affect the actual use of face recognition. In addition, this study only analyzes the direct impact of the research variables on the actual use but fails to account for the impact of the mediating variables or moderator variables.

Future Research Directions

Although this research provides some interesting insights, it has some significant limitations. First, future research should conduct research on different age groups to study the acceptance of face use and attention to privacy at different ages.

Second, privacy is one of the most critical ethical issues in the era of mobile data services. In the current age dominated by big data, privacy issues have become more prominent due to over-identification, technical flaws, and lagging legal construction. In this information era, the connection characteristics of the Internet pose a particularly unique information privacy threat, and many databases and records have led to the privacy boundary continually expanding. How do we balance technological enabling with privacy protection? What should users do about the privacy paradox? The different social cultures and psychology between China and the West cause people to use face recognition differently.

In terms of the impact of Western culture on face recognition, the culture pays attention to privacy and freedom, and politics and social culture affect the use of face recognition. The error and discrimination of face recognition algorithm will cause great psychological harm, coupled with the impact of social culture, and lead to social contradictions. For example, after testing the face recognition systems of Microsoft, Facebook, IBM, and other companies at MIT, it was found that the error rate of women with darker skin color is 35% higher than that of men with lighter skin color. In this regard, the algorithm was suspected to exhibit gender and racial discrimination. The algorithm is designed by people. Developers may embed their values in the algorithm, so there are artificial bias factors, which will lead to social contradictions. Therefore, politics, society, and culture have affected the governance attitude of the West. In terms of social background, religious contradictions and ethnic contradictions in Western society have intensified, and ethnic minorities have been discriminated against for a long time. The West is highly sensitive to prejudices caused by differences in religious beliefs, ethnic groups, and gender. Culturally and psychologically, the West attaches great importance to personal privacy and absolute freedom. Europeans regard privacy as dignity, and Americans regard privacy as freedom. These are some of the new problems we should focus on resolving now.

The core element of cognitive science is cognition, which is also known as information processing. Cognitive science and artificial intelligence are closely linked. The American philosopher J.R. Searle indicated that in the history of cognitive science, computers are key. Without digital computers, there would be no cognitive science (Baumgartner and Payr, 1995). It is particularly important in the research of face recognition and cognitive science. Whether people use face or not has a great relationship with their cognition, consciousness, psychology, and culture. The global workspace theory of Baars, a psychologist, posits that the brain is a modular information processing device composed of many neurons, and the information processing process is composed of different neurons with different divisions of labor and functions. The distributed operation process of specialized modules. The rapidly changing neuronal activity process constructs a virtual space called the global workspace at any given time through competition and cooperation between modules. Consciousness and unintentional state are generated through competition in the workspace. The generation of consciousness refers to all specialized modules in the brain responding to these new stimuli at the same time and analyzing and integrating this stimulus information in the global workspace through competition and cooperation until the best matching effect is achieved in the information processing between modules (Baars, 1988). Andrejevic and Volcic (2019) believes that exposing his face to the machine is in the interest of “efficiency” in this new world situation, creating contradictions with religious and cultural traditions. Face recognition largely depends on the exact meaning given to them by a wide range of actors, such as government, businesses, and civil society organizations (Norval and Prasopoulou, 2017).

Finally, there is the consideration of face recognition and privacy management. Governments and enterprises should strengthen the management and design of face recognition technology. The technology itself is neutral, and the intelligent measures developing from online to offline, as in the case of facial recognition, are targeted at efficient, convenient, and humanized services. Thus, the public must be willing to disclose their personal information to experience the benefits of the use of intelligent media entirely. As scholars have declared, “It is the default transaction rule in the data age to give up part of privacy for the fast operation” (Mao, 2019). Therefore, for the technology of face recognition at a crossroads, on the one hand, one cannot give up the application of technology because of privacy security. Instead, we should rely on smart hardware systems to empower cities and life with innovative technologies.

On the other hand, we cannot abuse this facial recognition technology after only viewing its bright prospects. Data security is always a crucial factor. Therefore, we believe that for face recognition technology, we must balance security, convenience, and privacy, strengthen the research on privacy issues in the field of big data networks, pay attention to the data flow behind it, constrain the technology with other evolving technologies, and cultivate the privacy literacy of the public.

Data Availability Statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author/s.

Ethics Statement

The studies involving human participants were reviewed and approved by the Secretariat of Academic Committee, Hangzhou Dianzi University. The participants provided their written informed consent to participate in this study.

Author Contributions

TL and BY: conceptualization, software, and formal analysis. TL, SD, and YG: methodology and validation. TL and SD: investigation, resources, and data curation. TL, YG, and BY: writing—original draft preparation and visualization. TL, BY, and SD: writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Funding

We are grateful for the financial support from the Zhejiang Social Science Planning “Zhijiang Youth Project” Academic Research and Exchange Project: Social Science Research in the Era of AI (22ZJQN06YB), the Special Fund of Fundamental Research Funds for Universities Directly Under the Zhejiang Provincial Government (GK199900299012-207), and Excellent Backbone Teacher Support Program of Hangzhou Dianzi University (YXGGJS).

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Acknowledgments

We are highly appreciative of the invaluable comments and advice from the editor and the reviewers.

Footnotes

  1. ^ www.wjx.cn

References

Andrejevic, M., and Volcic, Z. (2019). “smart” cameras and the operational enclosure. Telev. New Media 22, 1–17.

Google Scholar

Baars, B. J. (1988). A Cognitive Theory of Consciousness. Cambridge: Cambridge University Press.

Google Scholar

Baumgartner, P., and Payr, S. (1995). Speaking Minds: interviews with Twenty Eminent Cognitive Scientists. New Jersey: Princeton University Press. 204.

Google Scholar

Bhattacherjee, A. (2001). Understanding information systems continuance: an expectation-confirmation model. Mis Q. 25, 351–370. doi: 10.2307/3250921

CrossRef Full Text | Google Scholar

Caputo, F., Mazzoleni, A., Pellicellic, A. C., and Muller, J. (2020). Over the mask of innovation management in the world of Big Data. J. Bus. Res. 119, 330–338. doi: 10.1016/j.jbusres.2019.03.040

CrossRef Full Text | Google Scholar

Caputo, F., Scuotto, V., Carayannis, E., and Cillo, V. (2018). Intertwining the internet of things and consumers’ behaviour science: future promises for businesses. Technol. Forecast. Soc. Change 136, 277–284. doi: 10.1016/j.techfore.2018.03.019

CrossRef Full Text | Google Scholar

Cha, J. (2010). Factors affecting the frequency and amount of social networking site use: motivations, perceptions, and privacy concerns. First Monday 15, 12–16. doi: 10.5210/fm.v15i12.2889

CrossRef Full Text | Google Scholar

Chen, R. (2013). Living a private life in public social networks: an exploration of member self-disclosure. Decis. Supp. Syst. 55, 661–668. doi: 10.1016/j.dss.2012.12.003

CrossRef Full Text | Google Scholar

Chen, X. Y., and Cliquet, G. (2020). The blocking effect of privacy concerns in the “Quantified Self” movement–a case study of the adoption behavior of smart bracelet users. Enterpr. Econ. 4:109.

Google Scholar

Chuah, S. H. W., Rauschnabel, P. A., Krey, N., Nguyen, B., Ramayah, T., and Lade, S. (2016). Wearable technologies: the role of usefulness and visibility in smartwatch adoption. Comp. Hum. Behav. 65, 276–284. doi: 10.1016/j.chb.2016.07.047

CrossRef Full Text | Google Scholar

Ciampi, F., Demi, S., Magrini, A., Marzi, G., and Papa, A. (2021). Exploring the impact of big data analytics capabilities on business model innovation: the mediating role of entrepreneurial orientation. J. Bus. Res. 123, 1–13. doi: 10.1016/j.jbusres.2020.09.023

CrossRef Full Text | Google Scholar

Ciasullo, M. V., Cosimato, S., and Pellicano, M. (2017). Service Innovations in the Healthcare Service Ecosystem: a Case Study. Systems 5, 2–19.

Google Scholar

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Mis. Q. 13, 319–340. doi: 10.2307/249008

CrossRef Full Text | Google Scholar

Del Giudice, M., Scuottoc, V., Garcia-Perezd, A., and Messeni Petruzzellie, A. (2019). Shifting wealth II in Chinese economy. the effect of the horizontal technology spillover for SEMs for international growth. Technol. Forecast. Soc. Change 145, 307–316. doi: 10.1016/j.techfore.2018.03.013

CrossRef Full Text | Google Scholar

Del Giudice, M., Scuottoc, V., Orlando, B., and Mustilli, M. (2021). Toward the human-Centered approach. A revised model of individual acceptance of AI. Hum. Resour. Manag. Rev. 100856. doi: 10.1016/j.hrmr.2021.100856

CrossRef Full Text | Google Scholar

Elias, C., Francesco, C., and Del Giudice, M. (2017). “Technology transfer as driver of smart growth: a quadruple/quintuple innovation framework approach,” Proceedings of the 10th Annual Conference of the EuroMed Academy of Business (Cyprus: EuroMed Press) 313–333.

Google Scholar

Fletcher-Brown, J., Carter, D., Pereira, V., and Chandwani, R. (2020). Mobile technology to give a resource-based knowledge management advantage to community health nurses in an emerging economies context. J. Knowledge Manag. 25, 525–544. doi: 10.1108/jkm-01-2020-0018

CrossRef Full Text | Google Scholar

Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18, 39–50. doi: 10.2307/3151312

CrossRef Full Text | Google Scholar

Gefen, D., and Straub, D. (2005). A practical guide to factorial validity using PLS-Graph: tutorial and annotated example. Commun. Assoc. Inform. Syst. 16, 91–109.

Google Scholar

Gerbing, D. W., and Anderson, J. C. (1988). An updated paradigm for scale development incorporating unidimensionality and its assessment. J. Market. Res. 25, 186–192. doi: 10.1177/002224378802500207

CrossRef Full Text | Google Scholar

Guo, R. (2020). Face recognition, equal protection and contract society. Ningbo Econ. 02:42.

Google Scholar

He, J. P., and Huang, X. X. (2020). The smartphone use and eudaimonic well-being of urban elderly: based on intergenerational support and TAM. J. Int. Commun. 03, 49–73.

Google Scholar

Hichang, C. (2010). Determinants of behavioral responses to online privacy: the effects of concern, risk beliefs, self-efficacy, and communication sources on self-protection strategies. J. Inform. Privacy Secur. 1, 3–27. doi: 10.1080/15536548.2010.10855879

CrossRef Full Text | Google Scholar

Hsieh, P. J., and Lai, H. M. (2020). Exploring people’s intentions to use the health passbook in self-management: an extension of the technology acceptance and health behavior theoretical perspectives in health literacy. Technol. Forecast. Soc. Change 161:120328. doi: 10.1016/j.techfore.2020.120328

CrossRef Full Text | Google Scholar

Jiang, J. (2019). Infringement risks and control strategies on the application of face recognition technology. Library Inform. 5:59.

Google Scholar

Joinson, A. N., Reips, U. D., Buchanan, T., and Schofield, C. B. P. (2010). Privacy, trust, and self-disclosure online. Hum. Comp. Interact. 25, 1–24. doi: 10.1080/07370020903586662

CrossRef Full Text | Google Scholar

Kalantari, M., and Rauschnabel, P. (2018). “Exploring the Early Adopters of Augmented Reality Smart Glasses: the Case of Microsoft Hololens” in Augmented Reality and Virtual Reality. Ed T. Jung and M. Tom Dieck (Germany: Springer). 229–245. doi: 10.1007/978-3-319-64027-3_16

CrossRef Full Text | Google Scholar

Kaur, S., Gupta, S., Singh, S. K., and Perano, M. (2019). Organizational ambidexterity through global strategic partnerships: a cognitive computing perspective. Technol. Forecast. Soc. Change 145, 43–54. doi: 10.1016/j.techfore.2019.04.027

CrossRef Full Text | Google Scholar

Khasawneh, O. Y. (2018). Technophobia without boarders: the influence of technophobia and emotional intelligence on technology acceptance and the moderating influence of organizational climate. Comp. Hum. Behav. 88, 210–218. doi: 10.1016/j.chb.2018.07.007

CrossRef Full Text | Google Scholar

Lee, S. Y., and Lee, K. (2018). Factors that influence an individual’s intention to adopt a wearable healthcare device: the case of a wearable fitness tracker. Technol. Forecast. Soc. Change 129, 154–163. doi: 10.1016/j.techfore.2018.01.002

CrossRef Full Text | Google Scholar

Lee, Y., Kozar, K. A., and Larsen, K. R. T. (2003). The technology acceptance model: past, present, and future. Commun. Assoc. Inform. Syst. 12, 752–780.

Google Scholar

Liu, W. W. (2013). Research on the Influence of Privacy Concerns on Users’ Intention to Use Mobile Payment. Beijing: Beijing University of Posts and Telecommunications.

Google Scholar

Lunney, A., Cunningham, N. R., and Eastin, M. S. (2016). Wearable fitness technology: a structural investigation into acceptance and perceived fitness outcomes. Comp. Hum. Behav. 65, 114–120. doi: 10.1016/j.chb.2016.08.007

CrossRef Full Text | Google Scholar

Magni, D., Scuotto, V., Pezzi, A., and Del Giudice, M. (2021). Employees’ acceptance of wearable devices: Towards a predictive model. Technol. Forecast. Soc. Change 172:121022. doi: 10.1016/j.techfore.2021.121022

CrossRef Full Text | Google Scholar

Mao, Y. N. (2019). The first case of face recognition: what is the complaint? Fangyuan Mag. 24, 14–17.

Google Scholar

McKnight, D. H., Lankton, N., and Tripp, J. (2011). “Social Networking Information Disclosure and Continuance Intention: a Disconnect” in 2011 44th Hawaii International Conference on System Sciences (HICSS 2011). (United States: IEEE).

Google Scholar

Nasir, S., and Yurder, Y. (2015). Consumers’ and physicians’ perceptions about high tech wearable health products. Proc. Soc. Behav. Sci. 195, 1261–1267.

Google Scholar

Nguyen, T.-M., and Malik, A. (2021). Employee acceptance of online platforms for knowledge sharing: exploring differences in usage behavior. J. Knowledge Manag. Epub online ahead of print. doi: 10.1108/JKM-06-2021-0420

CrossRef Full Text | Google Scholar

Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The Privacy Paradox: personal Information Disclosure Intentions versus Behaviors. J. Consum. Affairs 41, 100–126. doi: 10.1111/j.1745-6606.2006.00070.x

CrossRef Full Text | Google Scholar

Norval, A., and Prasopoulou, E. (2017). Public faces? A critical exploration of the diffusion of face recognition technologies in online social network. New Media Soc. 4, 637–654. doi: 10.1177/1461444816688896

CrossRef Full Text | Google Scholar

Nunnally, J. C., and Bernstein, I. H. (1994). Psychometric Theory. New York: McGraw-Hill.

Google Scholar

Papa, A., Mital, M., Pisano, P., and Del Giudice, M. (2020). E-health and wellbeing monitoring using smart healthcare devices: an empirical investigation. Technol. Forecast. Soc. Change 153:119226. doi: 10.1016/j.techfore.2018.02.018

CrossRef Full Text | Google Scholar

Putnam, R. D. (2001). Making Democracy Work: civic Traditions in Modern Italy (trans. by Wang L & Lai H R). Nanchang: Jiangxi People’s Publishing House. 195.

Google Scholar

Qi, K. P., and Li, Z. Z. (2018). A Study on Privacy Concerns of Chinese Public and Its Influencing Factors. Sci. Soc. 2, 36–58.

Google Scholar

Reyes-Mercado, P. (2018). Adoption of fitness wearables: insights from Partial Least Squares and Qualitative Comparative Analysis. J. Syst. Inform. Technol. 20, 103–127. doi: 10.1108/jsit-04-2017-0025

CrossRef Full Text | Google Scholar

Scherer, R., Siddiq, F., and Tondeur, J. (2019). The technology acceptance model (TAM): a meta-analytic structural equation modeling approach to explaining teachers’ adoption of digital technology in education. Comp. Educ. 128, 13–35. doi: 10.1016/j.compedu.2018.09.009

CrossRef Full Text | Google Scholar

Simmel, G. (2002). Sociology: investigations on the Forms of Sociation (trans. by Lin R Y). Beijing: Huaxia Publishing House. 244–275.

Google Scholar

Turhan, G. (2013). An assessment towards the acceptance of wearable technology to consumers in Turkey: the application to smart bra and t-shirt products. J. Textile Inst. 104, 375–395. doi: 10.1080/00405000.2012.736191

CrossRef Full Text | Google Scholar

Venkatesh, V., and Davis, F. D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 46, 186–204. doi: 10.1287/mnsc.46.2.186.11926

PubMed Abstract | CrossRef Full Text | Google Scholar

Wang, H., Lee, M. K. O., and Wang, C. (1998). Consumer privacy concerns about Internet marketing. Commun. ACM 41, 63–70. doi: 10.1145/272287.272299

CrossRef Full Text | Google Scholar

Wang, Q., and Sun, X. (2016). Investigating gameplay intention of the elderly using an extended technology acceptance model (ETAM). Technol. Forecast. Soc. Change 107, 59–68. doi: 10.1016/j.techfore.2015.10.024

CrossRef Full Text | Google Scholar

Werts, C. E., Linn, R. L., and Jöreskog, K. G. (1974). Intraclass reliability estimates: testing structural assumptions. Educ. Psychol. Measur. 34, 25–33. doi: 10.1177/001316447403400104

CrossRef Full Text | Google Scholar

Xue, K., He, J., and Yu, M. Y. (2016). Research on Influencing Factors of Privacy Paradox in Social Media. Contempor. Commun. 1:5.

Google Scholar

Yang, H., Yu, J., Zo, H., and Choi, M. (2016). User acceptance of wearable devices: an extended perspective of perceived value. Elemat. Inform. 33, 256–269.

Google Scholar

Yu, J. (2018). Research on the Use Intention of VR Glasses Based on the Technology Acceptance Model. Shenzhen: Shenzhen University.

Google Scholar

Zahid, A., and Ajita, R. (2017). A Face in any Form: new Challenges and Opportunities for Face Recognition Technology. IEEE Comp. 50, 80–90. doi: 10.1109/mc.2017.119

CrossRef Full Text | Google Scholar

Zhang, Q. J., and Gong, H. S. (2018). An Empirical Study on Users Behavioral Intention of Face Identification Mobile Payment. Theor. Pract. Fin. Econom. 5, 109–115.

Google Scholar

Zhang, X. J., and Li, Z. Z. (2018). Research on the Influence of Privacy Concern on Smartphone Users’ Behavior Intention in Information Security. Inform. Stud. Theor. Appl. 2, 77–78.

Google Scholar

Which of the following conclusions can be drawn from existing data on facial recognition?

Which of the following conclusions can be drawn from the existing data on face recognition? Recognition of faces is heavily dependent on orientation.

What prediction could you make based on the recognition via multiple views approach to object recognition?

What prediction could you make on the basis of the recognition via multiple views approach to object recognition? It will be harder to recognize an object from some vantage points than from others.

Which of the following statements supports the theory that faces are treated by the brain as special kinds of objects when it comes to visual recognition?

Which of the following statements supports the theory that faces are treated by the brain as special kinds of objects when it comes to visual recognition? The inability to connect visual perceptions with semantic knowledge.

Which of the following is true about people with prosopagnosia?

People with prosopagnosia cannot perceive faces. People with prosopagnosia cannot perceive faces.