A Study of Biometric Authentication Adoption in Health Services
暂无分享,去创建一个
[1] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[2] AltermanAnton. A piece of yourself , 2003 .
[3] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[4] Marek Rejman-Greene,et al. Privacy Issues in the Application of Biometrics: a European Perspective , 2005 .
[5] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[6] Evropi Papadopoulou-Chatzilazarou. Το ανθρώπινο του Χριστού στο έργο του Ευστρατίου Νικαίας , 2014 .
[7] Sabine Delaître. Risk management approach on identity theft in biometric systems context , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[8] Mario Savastano. Biometrics: Modelling the Body , 2008, Tenth International Conference on Computer Modeling and Simulation (uksim 2008).
[9] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[10] Michael C. Fairhurst. Document identity, authentication and ownership: the future of biometric verification , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..
[11] Paulo Sérgio Tenreiro Magalhães,et al. Biometria e autenticação , 2003 .
[12] Vasilios Zorkadis,et al. On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements , 2004, Inf. Manag. Comput. Secur..
[13] A. Anthony Irudhayaraj,et al. Biometric system , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[14] Fred D. Davis. A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .
[15] Reza Barkhi,et al. Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..
[16] Despina Polemi,et al. Risk Analysis of Biometric Systems , 2004, WOSIS.
[17] A. Alterman,et al. ``A piece of yourself'': Ethical issues in biometric identification , 2003, Ethics and Information Technology.
[18] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[19] Václav Matyás,et al. Security of biometric authentication systems , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).
[20] Rodger Jamieson,et al. Biometric Authentication Adoption Issues , 2003 .
[21] Andrew Watson. Biometrics: easy to steal, hard to regain identity , 2007, Nature.
[22] Younghwa Lee,et al. The Technology Acceptance Model: Past, Present, and Future , 2003, Commun. Assoc. Inf. Syst..
[23] S. Liu,et al. A practical guide to biometric security technology , 2001 .
[24] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[25] Stephen L. Chan,et al. Information technology in business processes , 2000, Bus. Process. Manag. J..
[26] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[27] Arun Ross,et al. An introduction to biometrics , 2008, ICPR 2008.