Towards Secure M-Government Applications: A survey study in the Kingdom of Saudi Arabia
View/ Open
Author(s)
Alhussain, Thamer
Drew, Steve
Year published
2010
Metadata
Show full item recordAbstract
This paper discusses a survey study of mobile communication users' perceptions regarding the security of m-government applications in the Kingdom of Saudi Arabia (KSA). We suggest that studying their perceptions will help to determine the preferred authentication technique among mobile users and therefore help ease the adoption of m-government. This paper presents questionnaire results that indicate the need for introducing an advanced authentication method for m-government. It became apparent that applying biometric technology can meet the users' requirements by providing secure m-government services.This paper discusses a survey study of mobile communication users' perceptions regarding the security of m-government applications in the Kingdom of Saudi Arabia (KSA). We suggest that studying their perceptions will help to determine the preferred authentication technique among mobile users and therefore help ease the adoption of m-government. This paper presents questionnaire results that indicate the need for introducing an advanced authentication method for m-government. It became apparent that applying biometric technology can meet the users' requirements by providing secure m-government services.
View less >
View less >
Conference Title
2010 International Conference on Intelligent Network and Computing (ICINC 2010)
Publisher URI
Copyright Statement
© 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Subject
Computer System Security