Biometrical Identification as a Challenge for Legislation: The Finnish Case
暂无分享,去创建一个
Reima Suomi | Aki Koponen | Aki Koponen | R. Suomi | Tom Björkroth | Tuomas Aho | Tom Björkroth | T. Aho
[1] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[2] Lisa J. Carnahan,et al. Security in Open Systems , 1994 .
[3] Peter A. Todd,et al. Assessing IT usage: the role of prior experience , 1995 .
[4] Rama Chellappa,et al. Human and machine recognition of faces: a survey , 1995, Proc. IEEE.
[5] Richard P. Wildes,et al. Iris recognition: an emerging biometric technology , 1997, Proc. IEEE.
[6] Detmar W. Straub,et al. Testing the technology acceptance model across cultures: A three country study , 1997, Inf. Manag..
[7] Eric Monteiro,et al. Inscribing behaviour in information infrastructure standards , 1997 .
[8] Eric Monteiro,et al. Changing irreversible networks , 1998, ECIS.
[9] Gary T. Marx,et al. What's in a Name? Some Reflections on the Sociology of Anonymity , 1999, Inf. Soc..
[10] R. Blendon,et al. Health information, the Internet, and the digital divide. , 2000, Health affairs.
[11] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[12] Jungjoo Hemant Ramamurthy Jahng,et al. The Impact of Electronic Commerce Environment on User Behavior: The Case of a Complex Product , 2001 .
[13] B. Compaine. The Digital Divide : Facing a Crisis or Creating a Myth? , 2001 .
[14] Katherine M. Shelfer,et al. Smart card evolution , 2002, CACM.
[15] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[16] Sirkka L. Jarvenpaa,et al. Regulation and the Internet: Public Choice Insights for Business Organizations , 2003 .
[17] John Ingham,et al. Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..
[18] Syed Akhter. Digital divide and purchase intention: Why demographic psychology matters , 2003 .
[19] Pablo J. Boczkowski,et al. Digitizing the News: Innovation in Online Newspapers , 2004 .
[20] Anat Hovav,et al. A model of Internet standards adoption: the case of IPv6 , 2004, Inf. Syst. J..
[21] H. Gemünden,et al. The impact of information technology deployment on trust, commitment and value creation in business relationships , 2004 .
[22] Paige Baltzan,et al. Business Driven Technology , 2005 .
[23] Craig M. Arndt. The loss of privacy and identity , 2005 .
[24] B. Hillebrand,et al. Trust, Contract and Relationship Development , 2005 .
[25] J.H.A.M. Grijpink. Two barriers to realizing the benefits of biometrics - A chain perspective on biometrics, and identity fraud , 2005, Comput. Law Secur. Rev..
[26] David M. Kroenke,et al. Using MIS , 2005 .
[27] Neil Yager,et al. Dynamic registration selection for fingerprint verification , 2006, Pattern Recognit..
[28] Ole Hanseth,et al. Reflexive Standardization: Side Effects and Complexity in Standard Making , 2006, MIS Q..
[29] J.H.A.M. Grijpink. An assessment model for the use of biometrics , 2006, Comput. Law Secur. Rev..
[30] Clive Loughlin. Keeping an eye on biometrics , 2006 .
[31] Alexander P. Pons. Biometric marketing: targeting the online consumer , 2006, CACM.
[32] Kenneth C. Laudon,et al. Essentials of Business Information Systems , 2006 .
[33] Markus Jakobsson,et al. Social phishing , 2007, CACM.