Empirical analysis of biometric technology adoption and acceptance in Botswana
暂无分享,去创建一个
[1] D. Bailey,et al. Adoption of security systems by dairy farms to address bioterrorist threats in the intermountain United States. , 2006, Journal of dairy science.
[2] Margaret Tan,et al. Factors Influencing the Adoption of Internet Banking , 2000, J. Assoc. Inf. Syst..
[3] Jack Hollingum. They’ve got the measure of you , 1999 .
[4] Stephen M. Mutula,et al. E-readiness of SMEs in the ICT sector in Botswana with respect to information access , 2006, Electron. Libr..
[5] Blair H. Sheppard,et al. The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research , 1988 .
[6] Anil K. Jain. Biometric recognition: how do I know who you are? , 2004, Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, 2004..
[7] Mahmoud M. Yasin,et al. E-commerce implementation challenges: small to medium-sized versus large organisations , 2006, Int. J. Bus. Inf. Syst..
[8] Reza Barkhi,et al. Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..
[9] Alemayehu Molla,et al. Perceived E-Readiness Factors in E-Commerce Adoption: An Empirical Investigation in a Developing Country , 2005, Int. J. Electron. Commer..
[10] Vasilios Zorkadis,et al. On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements , 2004, Inf. Manag. Comput. Secur..
[11] Anna Kochan. Breakthrough in Biometrics , 2004 .
[12] Gail E. Torbet,et al. One in the eye to plastic card fraud , 1995 .
[13] Julian Ashbourn,et al. Biometrics - advanced identity verification: the complete guide , 2000 .
[14] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[15] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[16] Julian Ashbourn. Practical Biometrics: From Aspiration to Implementation , 2000 .
[17] Louis A. Lefebvre,et al. Firm innovativeness and CEO characteristics in small manufacturing firms , 1992 .
[18] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[19] Christine Connolly. Image processing algorithms underpinning iris and facial recognition systems , 2006 .
[20] Warren A. Whisenant. Using biometrics for sport venue management in a post 9‐11 era , 2003 .
[21] Kevin Grant,et al. An Investigation into Issues Influencing the Use of the Internet and Electronic Commerce among Small-Medium Sized Enterprises , 2003, J. Electron. Commer. Res..
[22] Stephen M. Mutula,et al. Use of cybercafés: study of Gaborone City, Botswana , 2004, Program.
[23] R. Dewar,et al. Elite Values Versus Organizational Structure in Predicting Innovation , 1973 .
[24] J. Britz,et al. Africa as a knowledge society: A reality check , 2006 .
[25] S. Liu,et al. A practical guide to biometric security technology , 2001 .
[26] I. Ajzen. The theory of planned behavior , 1991 .
[27] Nicole C. Krämer,et al. User acceptance: the BioSec approach , 2005 .
[28] Shearon Lowery. Milestones in mass communication research , 1983 .
[29] Yingzi Eliza Du. Review of iris recognition: cameras, systems, and their applications , 2006 .
[30] J. Britz,et al. Africa as a knowledge society , 2006 .
[31] Blair H. Sheppard,et al. THEORY OF REASONED ACTION , 2014 .
[32] Antonella De Angeli,et al. Honest, it’s me! Self-service verification , 2003 .
[33] Thomas L. Ainscough,et al. Characterizing consumer concerns about identification technology , 2006 .
[34] Sandra Giarimi,et al. Investigation of User Acceptance for Biometric Verification / Identification Methods in Mobile Units , 2004 .
[35] G. Vyver,et al. An Electronic Commerce Initiative in Regional Sri Lanka: The Vision for the Central Province Electronic Commerce Portal , 2004, Electron. J. Inf. Syst. Dev. Ctries..
[36] Don Braggins. Fingerprint sensing and analysis , 2001 .
[37] John N. Carter,et al. Automatic recognition by gait: progress and prospects , 2003 .
[38] Faith-Michael E. Uzoka,et al. E-commerce adoption in developing countries: a case analysis of environmental and organisational inhibitors , 2007, Int. J. Inf. Syst. Chang. Manag..
[39] Julian Ashbourn,et al. Biometrics: Advanced Identity Verification , 2000, Springer London.
[40] Mark S. Nixon,et al. Automatic Recognition by Gait , 2006, Proceedings of the IEEE.
[41] Norman Desmarais. Body language, security and e‐commerce , 2000 .
[42] Philip Bennett. Access control by audio‐visual recognition , 2000 .
[43] Elizabeth K Bye,et al. An analysis of apparel industry fit sessions , 2005 .
[44] Yogesh Kumar Dwivedi,et al. E-Commerce Adoption in Developing Countries , 2009 .
[45] Jana Hawley,et al. E-commerce Adoption For Supply Chain Management in U.S. Apparel Manufacturers , 2004 .
[46] Kenneth C. C. Yang,et al. Exploring factors affecting the adoption of mobile commerce in Singapore , 2005, Telematics Informatics.
[47] F. Damanpour. Organizational Innovation: A Meta-Analysis Of Effects Of Determinants and Moderators , 1991 .
[48] Timothy Pearson,et al. Evaluating Biometrics an Internal Control Solutions to Organizational Risk , 2005 .
[49] M. Whitman,et al. Management Of Information Security , 2004 .
[50] Loizos Heracleous,et al. Biometrics: the next frontier in service excellence, productivity and security in the service sector , 2006 .
[51] Sanjiv D. Vaidya,et al. Adoption of Electronic Commerce by Organizations in India: Strategic and Environmental Imperatives , 2004, Electron. J. Inf. Syst. Dev. Ctries..
[52] David C. Yen,et al. Biometric authentication: assuring access to information , 2002, Inf. Manag. Comput. Secur..
[53] Irwin Brown,et al. T-Commerce : an Investigation of Non-Adoption in South Africa , 2006 .
[54] L. G. Tornatzky,et al. Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.
[55] Mike Hendry. Smart Card Security and Applications , 1997 .
[56] Jorgen P. Bansler,et al. Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices , 2000, J. Assoc. Inf. Syst..
[57] Angappa Gunasekaran,et al. Global e-business: firm size, credibility and desirable modes of payment , 2006, Int. J. Bus. Inf. Syst..
[58] Russell Ryan. Identity assurance and the protection of the civil infrastructure , 2006 .
[59] E. Rogers. Diffusion of Innovations , 1962 .
[60] Virginia Franke Kleist,et al. The biometric technologies business case: a systematic approach , 2005, Inf. Manag. Comput. Security.
[61] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[62] R. Zmud,et al. Information technology implementation research: a technological diffusion approach , 1990 .
[63] I. M. Jimu,et al. An Exploration of Street Vending's Contribution Towards Botswana's Vision of Prosperity for All by 2016 , 2004 .
[64] Faith-Michael E. Uzoka,et al. Organisational influences on e-commerce adoption in a developing country context using UTAUT , 2008, Int. J. Bus. Inf. Syst..
[65] David R. Lease. Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers , 2005 .
[66] Jane You,et al. A robust automatic face recognition system for real‐time personal identification , 2006 .
[67] Mohammed Yakoob Siyal,et al. Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..
[68] J. Munene,et al. Organizational Environment in Africa: A Factor Analysis of Critical Incidents , 1991 .
[69] Stephen L. Parente,et al. Barriers to Technology Adoption and Development , 1994, Journal of Political Economy.