Biometrical Identification as a Challenge for Legislation: The Finnish Case

[1]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[2]  Lisa J. Carnahan,et al.  Security in Open Systems , 1994 .

[3]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[4]  Rama Chellappa,et al.  Human and machine recognition of faces: a survey , 1995, Proc. IEEE.

[5]  Richard P. Wildes,et al.  Iris recognition: an emerging biometric technology , 1997, Proc. IEEE.

[6]  Detmar W. Straub,et al.  Testing the technology acceptance model across cultures: A three country study , 1997, Inf. Manag..

[7]  Eric Monteiro,et al.  Inscribing behaviour in information infrastructure standards , 1997 .

[8]  Eric Monteiro,et al.  Changing irreversible networks , 1998, ECIS.

[9]  Gary T. Marx,et al.  What's in a Name? Some Reflections on the Sociology of Anonymity , 1999, Inf. Soc..

[10]  R. Blendon,et al.  Health information, the Internet, and the digital divide. , 2000, Health affairs.

[11]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[12]  Jungjoo Hemant Ramamurthy Jahng,et al.  The Impact of Electronic Commerce Environment on User Behavior: The Case of a Complex Product , 2001 .

[13]  B. Compaine The Digital Divide : Facing a Crisis or Creating a Myth? , 2001 .

[14]  Katherine M. Shelfer,et al.  Smart card evolution , 2002, CACM.

[15]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[16]  Sirkka L. Jarvenpaa,et al.  Regulation and the Internet: Public Choice Insights for Business Organizations , 2003 .

[17]  John Ingham,et al.  Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..

[18]  Syed Akhter Digital divide and purchase intention: Why demographic psychology matters , 2003 .

[19]  Pablo J. Boczkowski,et al.  Digitizing the News: Innovation in Online Newspapers , 2004 .

[20]  Anat Hovav,et al.  A model of Internet standards adoption: the case of IPv6 , 2004, Inf. Syst. J..

[21]  H. Gemünden,et al.  The impact of information technology deployment on trust, commitment and value creation in business relationships , 2004 .

[22]  Paige Baltzan,et al.  Business Driven Technology , 2005 .

[23]  Craig M. Arndt The loss of privacy and identity , 2005 .

[24]  B. Hillebrand,et al.  Trust, Contract and Relationship Development , 2005 .

[25]  J.H.A.M. Grijpink Two barriers to realizing the benefits of biometrics - A chain perspective on biometrics, and identity fraud , 2005, Comput. Law Secur. Rev..

[26]  David M. Kroenke,et al.  Using MIS , 2005 .

[27]  Neil Yager,et al.  Dynamic registration selection for fingerprint verification , 2006, Pattern Recognit..

[28]  Ole Hanseth,et al.  Reflexive Standardization: Side Effects and Complexity in Standard Making , 2006, MIS Q..

[29]  J.H.A.M. Grijpink An assessment model for the use of biometrics , 2006, Comput. Law Secur. Rev..

[30]  Clive Loughlin Keeping an eye on biometrics , 2006 .

[31]  Alexander P. Pons Biometric marketing: targeting the online consumer , 2006, CACM.

[32]  Kenneth C. Laudon,et al.  Essentials of Business Information Systems , 2006 .

[33]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.