dc.contributor.convenor | IEEE Beijing Section, China and Xiamen University, China | |
dc.contributor.author | Alhussain, Thamer | |
dc.contributor.author | Drew, Steve | |
dc.contributor.author | Alfarraj, Osama | |
dc.contributor.editor | Chen, W. | |
dc.date.accessioned | 2017-05-03T13:18:46Z | |
dc.date.available | 2017-05-03T13:18:46Z | |
dc.date.issued | 2010 | |
dc.date.modified | 2011-10-04T07:16:53Z | |
dc.identifier.refuri | http://www.ieee-icis.org/index.asp | |
dc.identifier.doi | 10.1109/ICICISYS.2010.5658854 | |
dc.identifier.uri | http://hdl.handle.net/10072/38049 | |
dc.description.abstract | Mobile government provides unique opportunities to utilize mobile technology to receive government services and information literally from any place, at any time, using varieties of wireless networks. However, mobile devices are using wireless network broadcasts which are vulnerable as they send signals over the public airwaves. With the rapid growth of mobile devices and Internet services, there is a growing need for user and government authentication for the protection of data and services, and to promote public trust. This paper presents the process of the grounded theory application to information system security research to develop a substantive theory for the successful implementation of biometric authentication in m-government security. It concludes by presenting the findings in the form of categories with their relationships. These emerging categories indicate the factors that influence the adoption of biometrics in m-government security. | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.format.extent | 408371 bytes | |
dc.format.mimetype | application/pdf | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.publisher.place | Los Alamitos | |
dc.relation.ispartofstudentpublication | N | |
dc.relation.ispartofconferencename | 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010) | |
dc.relation.ispartofconferencetitle | 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010) | |
dc.relation.ispartofdatefrom | 2010-10-29 | |
dc.relation.ispartofdateto | 2010-10-31 | |
dc.relation.ispartoflocation | Xiamen, China | |
dc.rights.retention | Y | |
dc.subject.fieldofresearch | Information Systems Development Methodologies | |
dc.subject.fieldofresearchcode | 080608 | |
dc.title | Biometric Authentication for Mobile Government Security An application of grounded theory | |
dc.type | Conference output | |
dc.type.description | E1 - Conferences | |
dc.type.code | E - Conference Publications | |
gro.faculty | Griffith Sciences, School of Information and Communication Technology | |
gro.rights.copyright | © 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | |
gro.date.issued | 2010 | |
gro.hasfulltext | Full Text | |
gro.griffith.author | Drew, Steve J. | |
gro.griffith.author | Alhussain, Thamer OM. | |
gro.griffith.author | Alfarraj, Osama AM. | |