Show simple item record

dc.contributor.convenorIEEE Beijing Section, China and Xiamen University, China
dc.contributor.authorAlhussain, Thamer
dc.contributor.authorDrew, Steve
dc.contributor.authorAlfarraj, Osama
dc.contributor.editorChen, W.
dc.date.accessioned2017-05-03T13:18:46Z
dc.date.available2017-05-03T13:18:46Z
dc.date.issued2010
dc.date.modified2011-10-04T07:16:53Z
dc.identifier.refurihttp://www.ieee-icis.org/index.asp
dc.identifier.doi10.1109/ICICISYS.2010.5658854
dc.identifier.urihttp://hdl.handle.net/10072/38049
dc.description.abstractMobile government provides unique opportunities to utilize mobile technology to receive government services and information literally from any place, at any time, using varieties of wireless networks. However, mobile devices are using wireless network broadcasts which are vulnerable as they send signals over the public airwaves. With the rapid growth of mobile devices and Internet services, there is a growing need for user and government authentication for the protection of data and services, and to promote public trust. This paper presents the process of the grounded theory application to information system security research to develop a substantive theory for the successful implementation of biometric authentication in m-government security. It concludes by presenting the findings in the form of categories with their relationships. These emerging categories indicate the factors that influence the adoption of biometrics in m-government security.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent408371 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoeng
dc.publisherIEEE
dc.publisher.placeLos Alamitos
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofconferencename2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010)
dc.relation.ispartofconferencetitle2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010)
dc.relation.ispartofdatefrom2010-10-29
dc.relation.ispartofdateto2010-10-31
dc.relation.ispartoflocationXiamen, China
dc.rights.retentionY
dc.subject.fieldofresearchInformation Systems Development Methodologies
dc.subject.fieldofresearchcode080608
dc.titleBiometric Authentication for Mobile Government Security An application of grounded theory
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.facultyGriffith Sciences, School of Information and Communication Technology
gro.rights.copyright© 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
gro.date.issued2010
gro.hasfulltextFull Text
gro.griffith.authorDrew, Steve J.
gro.griffith.authorAlhussain, Thamer OM.
gro.griffith.authorAlfarraj, Osama AM.


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record