dc.contributor.convenor | IACSIT, International Association of Computer Science and Information Te | |
dc.contributor.author | Alhussain, Thamer | |
dc.contributor.author | Drew, Steve | |
dc.contributor.editor | Houssain Kettani | |
dc.date.accessioned | 2017-05-03T13:18:45Z | |
dc.date.available | 2017-05-03T13:18:45Z | |
dc.date.issued | 2010 | |
dc.date.modified | 2013-10-10T22:12:51Z | |
dc.identifier.refuri | http://www.icinc.org/date.htm | |
dc.identifier.uri | http://hdl.handle.net/10072/38260 | |
dc.description.abstract | This paper discusses a survey study of mobile communication users' perceptions regarding the security of m-government applications in the Kingdom of Saudi Arabia (KSA). We suggest that studying their perceptions will help to determine the preferred authentication technique among mobile users and therefore help ease the adoption of m-government. This paper presents questionnaire results that indicate the need for introducing an advanced authentication method for m-government. It became apparent that applying biometric technology can meet the users' requirements by providing secure m-government services. | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.format.extent | 97442 bytes | |
dc.format.mimetype | application/pdf | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.publisher.place | Piscataway, NJ, USA | |
dc.publisher.uri | http://www.icinc.org/ | |
dc.relation.ispartofstudentpublication | N | |
dc.relation.ispartofconferencename | International Conference on Intelligent Network and Computing (ICINC 2010) | |
dc.relation.ispartofconferencetitle | 2010 International Conference on Intelligent Network and Computing (ICINC 2010) | |
dc.relation.ispartofdatefrom | 2010-11-26 | |
dc.relation.ispartofdateto | 2010-11-28 | |
dc.relation.ispartoflocation | Kuala Lumpur, Malaysia | |
dc.rights.retention | Y | |
dc.subject.fieldofresearch | Computer System Security | |
dc.subject.fieldofresearchcode | 080303 | |
dc.title | Towards Secure M-Government Applications: A survey study in the Kingdom of Saudi Arabia | |
dc.type | Conference output | |
dc.type.description | E1 - Conferences | |
dc.type.code | E - Conference Publications | |
gro.faculty | Griffith Sciences, School of Information and Communication Technology | |
gro.rights.copyright | © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
gro.date.issued | 2010 | |
gro.hasfulltext | Full Text | |
gro.griffith.author | Drew, Steve J. | |
gro.griffith.author | Alhussain, Thamer OM. | |