Show simple item record

dc.contributor.convenorIACSIT, International Association of Computer Science and Information Te
dc.contributor.authorAlhussain, Thamer
dc.contributor.authorDrew, Steve
dc.contributor.editorHoussain Kettani
dc.date.accessioned2017-05-03T13:18:45Z
dc.date.available2017-05-03T13:18:45Z
dc.date.issued2010
dc.date.modified2013-10-10T22:12:51Z
dc.identifier.refurihttp://www.icinc.org/date.htm
dc.identifier.urihttp://hdl.handle.net/10072/38260
dc.description.abstractThis paper discusses a survey study of mobile communication users' perceptions regarding the security of m-government applications in the Kingdom of Saudi Arabia (KSA). We suggest that studying their perceptions will help to determine the preferred authentication technique among mobile users and therefore help ease the adoption of m-government. This paper presents questionnaire results that indicate the need for introducing an advanced authentication method for m-government. It became apparent that applying biometric technology can meet the users' requirements by providing secure m-government services.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent97442 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoeng
dc.publisherIEEE
dc.publisher.placePiscataway, NJ, USA
dc.publisher.urihttp://www.icinc.org/
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofconferencenameInternational Conference on Intelligent Network and Computing (ICINC 2010)
dc.relation.ispartofconferencetitle2010 International Conference on Intelligent Network and Computing (ICINC 2010)
dc.relation.ispartofdatefrom2010-11-26
dc.relation.ispartofdateto2010-11-28
dc.relation.ispartoflocationKuala Lumpur, Malaysia
dc.rights.retentionY
dc.subject.fieldofresearchComputer System Security
dc.subject.fieldofresearchcode080303
dc.titleTowards Secure M-Government Applications: A survey study in the Kingdom of Saudi Arabia
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.facultyGriffith Sciences, School of Information and Communication Technology
gro.rights.copyright© 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
gro.date.issued2010
gro.hasfulltextFull Text
gro.griffith.authorDrew, Steve J.
gro.griffith.authorAlhussain, Thamer OM.


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record