Biometric Authentication for Mobile Government Security An application of grounded theory
View/ Open
Author(s)
Alhussain, Thamer
Drew, Steve
Alfarraj, Osama
Year published
2010
Metadata
Show full item recordAbstract
Mobile government provides unique opportunities to utilize mobile technology to receive government services and information literally from any place, at any time, using varieties of wireless networks. However, mobile devices are using wireless network broadcasts which are vulnerable as they send signals over the public airwaves. With the rapid growth of mobile devices and Internet services, there is a growing need for user and government authentication for the protection of data and services, and to promote public trust. This paper presents the process of the grounded theory application to information system security research ...
View more >Mobile government provides unique opportunities to utilize mobile technology to receive government services and information literally from any place, at any time, using varieties of wireless networks. However, mobile devices are using wireless network broadcasts which are vulnerable as they send signals over the public airwaves. With the rapid growth of mobile devices and Internet services, there is a growing need for user and government authentication for the protection of data and services, and to promote public trust. This paper presents the process of the grounded theory application to information system security research to develop a substantive theory for the successful implementation of biometric authentication in m-government security. It concludes by presenting the findings in the form of categories with their relationships. These emerging categories indicate the factors that influence the adoption of biometrics in m-government security.
View less >
View more >Mobile government provides unique opportunities to utilize mobile technology to receive government services and information literally from any place, at any time, using varieties of wireless networks. However, mobile devices are using wireless network broadcasts which are vulnerable as they send signals over the public airwaves. With the rapid growth of mobile devices and Internet services, there is a growing need for user and government authentication for the protection of data and services, and to promote public trust. This paper presents the process of the grounded theory application to information system security research to develop a substantive theory for the successful implementation of biometric authentication in m-government security. It concludes by presenting the findings in the form of categories with their relationships. These emerging categories indicate the factors that influence the adoption of biometrics in m-government security.
View less >
Conference Title
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010)
Copyright Statement
© 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Subject
Information Systems Development Methodologies