Qualitative Study on Implementing Biometric Technology in M-Government Security: a Grounded Theory Approach

View/ Open
Author(s)
Alhussain, Thamer
Drew, Steve
von Hellens, Liisa
Year published
2010
Metadata
Show full item recordAbstract
This paper reports on how qualitative research was conducted with the aim to find out factors for the implementation of biometric authentication in m-government security. It outlines the application of grounded theory methodology for the purpose of developing a substantive theory towards implementation of security in this developing area. The investigation in this paper is a part of ongoing PhD research. Data for this investigation includes users', service providers', and network operators' concerns and perceptions regarding the application of biometric authentication into mobile devices for government services in the ...
View more >This paper reports on how qualitative research was conducted with the aim to find out factors for the implementation of biometric authentication in m-government security. It outlines the application of grounded theory methodology for the purpose of developing a substantive theory towards implementation of security in this developing area. The investigation in this paper is a part of ongoing PhD research. Data for this investigation includes users', service providers', and network operators' concerns and perceptions regarding the application of biometric authentication into mobile devices for government services in the Kingdom of Saudi Arabia. This paper justifies the use of grounded theory in this study and discusses the analysis process. It concludes by presenting the emerging categories with their relationships that stemmed from the theory generation process which specify the factors influencing the successful implementation of biometric authentication in m-government security.
View less >
View more >This paper reports on how qualitative research was conducted with the aim to find out factors for the implementation of biometric authentication in m-government security. It outlines the application of grounded theory methodology for the purpose of developing a substantive theory towards implementation of security in this developing area. The investigation in this paper is a part of ongoing PhD research. Data for this investigation includes users', service providers', and network operators' concerns and perceptions regarding the application of biometric authentication into mobile devices for government services in the Kingdom of Saudi Arabia. This paper justifies the use of grounded theory in this study and discusses the analysis process. It concludes by presenting the emerging categories with their relationships that stemmed from the theory generation process which specify the factors influencing the successful implementation of biometric authentication in m-government security.
View less >
Conference Title
5th International Conference on Qualitative Research in IT & IT in Qualitative Research (QualIT2010)
Publisher URI
Copyright Statement
© The Author(s) 2010. The attached file is posted here with permission of the copyright owners for your personal use only. No further distribution permitted. For information about this conference please refer to the publisher's website or contact the authors.
Subject
Information Systems Development Methodologies