Information Technology Reference
In-Depth Information
Dean, K. (2002). College seeks security in thumbs.
Retrieved August 6, 2007, from Wired News,
http://www.wired.com
Jeffords, R., Thibadoux, G., & Scheidt, M. (1999,
March). New technologies to combat check fraud.
The CPA Journal, 69 (3), 30-34.
Deane, F., Barrelle, K., Henderson, R., & Mahar,
D. (1995). Perceived acceptability of biometric
security systems. Computers and Security, 14 ,
225-231.
Kim, H. (1995). Biometrics, is it a viable proposi-
tion for identity authentication and access control?
Computers and Security, 14 , 205-214.
Koufaris, M. (2002). Applying the technology
acceptance model and flow theory to online con-
sumer behavior. Information Systems Research,
13 (2), 205-223.
Federal Trade Commission. (2007). FTC issues
annual list of top consumer complaints. Retrieved
August 6, 2007, from the Federal Trade Com-
mission, http://www.ftc.gov/opa/2007/02/top-
complaints.htm
Liu, S., & Silverman, M. (2001, January/February).
A practical guide to biometric security technol-
ogy. IT Professional , pp. 27-32.
Gordon, L., Loeb, M., Lucyshyn, W., & Richard-
son, R. (2006). 2006 CSI/FBI computer crime and
security survey. Retrieved August 6, 2007, from
CSI, http://www.gocsi.com/
Loch, K., Carr, H., & Warkentin, M. (1992).
Threats to information systems: Today's reality,
yesterday's understanding. MIS Quarterly, 16 (2),
173-186.
Henderson, S., & Snyder, C. (1999). Personal infor-
mation privacy: Implications for MIS managers.
Information and Management, 36 , 213-220.
Lowry, G. (2002). Modeling user acceptance of
building management systems. Automation in
Construction, 11 , 695-705.
Herman, A. (2002). Major bank signs up for di-
gital signature verification technology. Biometric
Technology Today, 10 (1), 1.
Mason, R. (1986). Four ethical issues of the infor-
mation age. MIS Quarterly, 10 (1), 5-12.
Hong, W., Thong, J., Wong, W., & Tam, K. (2002).
Determinants of user acceptance of digital li-
braries: An empirical examination of individual
differences and system characteristics. Journal
of Management Information Systems, 18 (3), 97-
124.
McMillian, R. (2002). The myth of airport bio-
metrics. Retrieved August 6, 2007 from Wired
News, http://www.wired.com
Norton, R. (2002, October). The evolving biomet-
ric marketplace to 2006. Biometric Technology
Today , pp. 7-8.
Hopkins, R. (1999). An introduction to biometrics
and large scale civilian identification. Interna-
tional Review of Law Computer and Technology,
13 (3), 337-363.
Pirim, T., James, T., Boswell, K., Reithel, B., &
Barkhi, R. (in press). An empirical investigation
of an individual's perceived need for privacy and
security. International Journal of Information
Security and Privacy .
Hu, P., Chau, P., Sheng, O., & Tam, K. (1999). Ex-
amining the technology acceptance model using
physician acceptance of telemedicine technology.
Journal of Management Information Systems,
16 (2), 91-112.
Plouffe, C., Hulland, J., & Vandenbosch, M. (2001).
Research report: Richness versus parsimony in
modeling technology adoption decisions: Under-
standing merchant adoption of a smart card-based
payment system. Information Systems Research,
12 (2), 208-222.
Jain, A., Hong, L., & Pankanti, S. (2000). Biomet-
ric identification. Communications of the ACM,
43 (2), 91-98.
Search WWH ::




Custom Search