Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory
暂无分享,去创建一个
[1] J. McLeod. Practitioner Research in Counselling , 1999 .
[2] Cathy Urquhart,et al. Grounded Theory Method: The Researcher as Blank Slate and Other Myths , 2006, ICIS.
[3] Ilse Giesing,et al. User perceptions related to identification through biometrics within electronic business , 2005 .
[4] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[5] Steven Furnell,et al. Advanced user authentication for mobile devices , 2007, Comput. Secur..
[6] J. Ettlie. Managing Technological Innovation , 2000 .
[7] Christina Goulding. Grounded Theory: A Practical Guide for Management, Business and Market Researchers , 2002 .
[8] Yazdan Mansourian,et al. Adoption of grounded theory in LIS research , 2006 .
[9] Raj Nanavati,et al. Biometrics: Identity Verification in a Networked World , 2002 .
[10] Anselm L. Strauss,et al. Basics of Qualitative research : techniques and , 2008 .
[11] Timothy Pearson,et al. Evaluating Biometrics an Internal Control Solutions to Organizational Risk , 2005 .
[12] Cathy Urquhart,et al. Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems , 2009, Inf. Syst. J..
[13] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[14] N. Denzin,et al. Handbook of Qualitative Research , 1994 .
[15] James B. Pick,et al. Technology factors in corporate adoption of mobile cell phones: a case study analysis , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[16] Claus Vielhauer. Biometric User Authentication for it Security - From Fundamentals to Handwriting , 2006, Advances in Information Security.
[17] Faith-Michael E. Uzoka,et al. An investigation of factors affecting biometric technology adoption in a developing country context , 2009, Int. J. Biom..
[18] J. Creswell. Qualitative inquiry and research design: choosing among five traditions. , 1998 .
[19] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[20] Sandra Giarimi,et al. Investigation of User Acceptance for Biometric Verification / Identification Methods in Mobile Units , 2004 .
[21] K. Charmaz,et al. Constructing Grounded Theory: A practical guide through qualitative analysis Kathy Charmaz Constructing Grounded Theory: A practical guide through qualitative analysis Sage 224 £19.99 0761973532 0761973532 [Formula: see text]. , 2006, Nurse researcher.
[22] Christos Kalloniatis. Security Enhanced Applications For Information Systems , 2014 .
[23] B. Glaser. Basics of Grounded Theory Analysis: Emergence Vs. Forcing , 1992 .
[24] Anil K. Jain,et al. Biometric Systems: Technology, Design and Performance Evaluation , 2004 .
[25] N. Jahangir,et al. The role of perceived usefulness, perceived ease of use, security and privacy, and customer attitude to engender customer adaptation in the context of electronic banking , 2008 .
[26] Thompson S. H. Teo,et al. Adoption of WAP-enabled mobile phones among Internet users , 2003 .
[27] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[28] Panagiotis Kanellis,et al. User Behaving Badly: Phenomena and Paradoxes from an Investigation into Information System Misfit , 2005, J. Organ. End User Comput..
[29] David C. Yen,et al. Biometric authentication: assuring access to information , 2002, Inf. Manag. Comput. Secur..
[30] Julian Ashbourn. Practical Biometrics , 2004, Springer Professional Computing.
[31] Martin Hughes,et al. An assessment of biometric identities as a standard for e-government services , 2005, Int. J. Serv. Stand..
[32] H. Heath,et al. Developing a grounded theory approach: a comparison of Glaser and Strauss. , 2004, International journal of nursing studies.
[33] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[34] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[35] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[36] Theodoulos Garefalakis,et al. PKI in mobile systems , 2004 .
[37] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[38] Anselm L. Strauss,et al. Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .
[39] Abdullah Mohammed Al-shehry,et al. Transformation towards e-government in The Kingdom of Saudi Arabia : technological and organisational perspectives , 2009 .
[40] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[41] A. Strauss,et al. Basics of qualitative research: Grounded theory procedures and techniques. , 1993 .
[42] E. Brink,et al. Constructing grounded theory : A practical guide through qualitative analysis , 2006 .
[43] Pam J. Mayhew,et al. M-government Implications For E-Government In Developing Countries: The Case of Saudi Arabia. , 2005 .
[44] Rana Tassabehji,et al. GENERATING CITIZEN TRUST IN E-GOVERNMENT USING A TRUST VERIFICATION AGENT: A RESEARCH NOTE , 2006 .
[45] Jung P. Shim,et al. Factors influencing corporate web site adoption: a time-based assessment , 2001, Inf. Manag..
[46] A. Strauss,et al. Grounded theory methodology: An overview. , 1994 .
[47] A. Michael Huberman,et al. An expanded sourcebook qualitative data analysis , 1994 .
[48] Feng Li,et al. Implementing E-Government Strategy in Scotland: Current Situation and Emerging Issues , 2003, J. Electron. Commer. Organ..
[49] Singh Sheenal. Preparing for Wireless and Mobile Technologies in Government , 2002 .
[50] Felix B. Tan,et al. Beyond Models of National Culture in Information Systems Research , 2002, J. Glob. Inf. Manag..