Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment
暂无分享,去创建一个
[1] Paul A. Pavlou,et al. Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..
[2] Sirkka L. Jarvenpaa,et al. Consumer trust in an Internet store , 2000, Inf. Technol. Manag..
[3] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[4] Reza Barkhi,et al. Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..
[5] Kenneth A. Carow,et al. Debit, credit, or cash: survey evidence on gasoline purchases , 1999 .
[6] Virginia Franke Kleist,et al. Building Technologically Based Online Trust: Can the Biometrics Industry Deliver the Online Trust Silver Bullet? , 2007, Inf. Syst. Manag..
[7] Edmund Kohlwey,et al. Leveraging the Cloud for Big Data Biometrics: Meeting the Performance Requirements of the Next Generation Biometric Systems , 2011, 2011 IEEE World Congress on Services.
[8] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[9] Paul A. Pavlou,et al. Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role , 2005, Inf. Syst. Res..
[10] Han Zhang,et al. Factors affecting payment choices in online auctions: A study of eBay traders , 2006, Decis. Support Syst..
[11] Dan J. Kim,et al. A Study of the Multilevel and Dynamic Nature of Trust in E-Commerce from a Cross-Stage Perspective , 2014, Int. J. Electron. Commer..
[12] Andrew Whinston,et al. Electronic Commerce: A Manager's Guide , 1997 .
[13] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[14] Izak Benbasat,et al. Designing Warning Messages for Detecting Biased Online Product Recommendations: An Empirical Investigation , 2015, Inf. Syst. Res..
[15] J. H. Davis,et al. The effect of the performance appraisal system on trust for management: A field quasi-experiment. , 1999 .
[16] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[17] Hyoungjoo Lee,et al. Account-Sharing Detection Through Keystroke Dynamics Analysis , 2009, Int. J. Electron. Commer..
[18] Anol Bhattacherjee,et al. Individual Trust in Online Firms: Scale Development and Initial Test , 2002, J. Manag. Inf. Syst..
[19] Izak Benbasat,et al. E-Commerce Product Recommendation Agents: Use, Characteristics, and Impact , 2007, MIS Q..
[20] John Kane,et al. Exploring the psychological and somatic impact of identity theft. , 2004, Journal of forensic sciences.
[21] M. Sarstedt,et al. A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .
[22] R. Bharat Rao,et al. Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange , 2006, J. Comput. Mediat. Commun..
[23] Izak Benbasat,et al. Effects of rational and social appeals of online recommendation agents on cognition- and affect-based trust , 2016, Decis. Support Syst..
[24] İsa Ipcioglu,et al. Adoption of Biometric Technology in Online Applications , 2010 .
[25] Dennis D Abrazhevich,et al. Electronic payment systems : a user-centered perspective and interaction design , 1999 .
[26] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[27] Akhilesh Chandra,et al. Challenges and constraints to the diffusion of biometrics in information systems , 2005, CACM.
[28] Adamantios Diamantopoulos,et al. The error term in formative measurement models: interpretation and modeling implications , 2006 .
[29] Anol Bhattacherjee,et al. Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..
[30] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[31] Jianying Hu,et al. Retail applications of signature verification , 2004, SPIE Defense + Commercial Sensing.
[32] Robert J. Kauffman,et al. Should We Wait? Network Externalities, Compatibility, and Electronic Billing Adoption , 2001, J. Manag. Inf. Syst..
[33] Hyun-jung Kim. Biometrics, is it a viable proposition for identity authentication and access control? , 1995, Comput. Secur..
[34] Paul A. Pavlou,et al. The Boundaries of Trust and Risk: The Quadratic Moderating Role of Institutional Structures , 2012, Inf. Syst. Res..
[35] D. Gefen,et al. E-commerce: the role of familiarity and trust , 2000 .
[36] Paul A. Pavlou,et al. Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..
[37] Wang Tao,et al. An empirical study of customers' perceptions of security and trust in e-payment systems , 2010, Electron. Commer. Res. Appl..
[38] Anat Hovav,et al. Tutorial: Identity Management Systems and Secured Access Control , 2009, Commun. Assoc. Inf. Syst..
[39] J. P. Peter,et al. A Comparative Analysis of Three Consumer Decision Strategies , 1975 .
[40] Kieran Mathieson,et al. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..
[41] Joseph S. Valacich,et al. The Effect of Perceived Novelty on the Adoption of Information Technology Innovations: A Risk/Reward Perspective , 2010, Decis. Sci..
[42] Gurpreet Dhillon,et al. TORKZADEH AND DHILLON Measuring Factors that Influence the Success of Internet , 2015 .
[43] Cristian Morosan,et al. Voluntary Steps toward Air Travel Security , 2012 .
[44] Keng Siau,et al. Building customer trust in mobile commerce , 2003, CACM.
[45] Moshe Zviran,et al. Password Security: An Empirical Study , 1999, J. Manag. Inf. Syst..
[46] Richard Clodfelter. Biometric technology in retailing: Will consumers accept fingerprint authentication? , 2010 .
[47] Charles M. Kahn,et al. Identity Theft and Consumer Payment Choice: Does Security Really Matter? , 2016 .
[48] Shuiqing Yang,et al. Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective , 2011, Inf. Manag..
[49] Matthew K. O. Lee,et al. Trust in Internet Shopping: Instrument Development and Validation through Classical and Modern Approaches , 2001, J. Glob. Inf. Manag..
[50] Michael J. Ryan,et al. An Investigation of Perceived Risk at the Brand Level , 1976 .
[51] Sookeun Byun,et al. Exploring perceptions toward biometric technology in service encounters: a comparison of current users and potential adopters , 2013, Behav. Inf. Technol..
[52] I. Ajzen,et al. Predicting dishonest actions using the theory of planned behavior , 1991 .
[53] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[54] H. Raghav Rao,et al. Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration , 2009, Inf. Syst. Res..
[55] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[56] Zhongju Zhang,et al. A Finite Mixture Logit Model to Segment and Predict Electronic Payments System Adoption , 2011, Inf. Syst. Res..
[57] P. Pavlou,et al. Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions , 2002 .
[58] D. Whetten. What Constitutes a Theoretical Contribution , 1989 .
[59] D. Larcker,et al. PERCEIVED USEFULNESS OF INFORMATION: A PSYCHOMETRIC EXAMINATION* , 1980 .
[60] Izak Benbasat,et al. A Comprehensive Model of Perceived Risk of E-Commerce Transactions , 2010, Int. J. Electron. Commer..
[61] Joseph S. Valacich,et al. An Alternative to Methodological Individualism: A Non-Reductionist Approach to Studying Technology Adoption by Groups , 2010, MIS Q..
[62] M. Tremaine,et al. Intention to Use Biometric Systems , 2012 .
[63] Mark Cohn. Biometrics: Key to securing consumer trust , 2007 .
[64] Raymond N. J. Veldhuis,et al. Biometric Authentication System on Mobile Personal Devices , 2010, IEEE Transactions on Instrumentation and Measurement.
[65] K. Havenetidis,et al. Encryption and Biometrics:Context, methodologies and perspectives of biological data , 2013 .
[66] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .
[67] Yeonseung Ryu,et al. A survey on biometric fingerprints: The cardless payment system , 2008, 2008 International Symposium on Biometrics and Security Technologies.
[68] Christian Böhm,et al. Biometric Template Protection , 2011, Datenschutz und Datensicherheit - DuD.
[69] Peter Jones,et al. Biometrics in retailing , 2007 .
[70] Christoph Busch,et al. Biometric template protection , 2009, Datenschutz und Datensicherheit - DuD.
[71] Tiago Oliveira,et al. Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context , 2013, Decis. Support Syst..
[72] Annemette Kjærgaard,et al. Who do you think you are? A review of the complex interplay between information systems, identification and identity , 2014, Eur. J. Inf. Syst..
[73] William J. Doll,et al. The Measurement of End-User Computing Satisfaction , 1988, MIS Q..
[74] Václav Matyás,et al. Biometric authentication - security and usability , 2002, Communications and Multimedia Security.