Information Technology Reference
In-Depth Information
Dean, K. (2002). College seeks security in thumbs.
Retrieved August 6, 2007, from Wired News,
http://www.wired.com
Jeffords, R., Thibadoux, G., & Scheidt, M. (1999,
March). New technologies to combat check fraud.
The CPA Journal, 69
(3), 30-34.
Deane, F., Barrelle, K., Henderson, R., & Mahar,
D. (1995). Perceived acceptability of biometric
security systems.
Computers and Security, 14
,
225-231.
Kim, H. (1995). Biometrics, is it a viable proposi-
tion for identity authentication and access control?
Computers and Security, 14
, 205-214.
Koufaris, M. (2002). Applying the technology
acceptance model and flow theory to online con-
sumer behavior.
Information Systems Research,
13
(2), 205-223.
Federal Trade Commission. (2007). FTC issues
annual list of top consumer complaints. Retrieved
August 6, 2007, from the Federal Trade Com-
mission, http://www.ftc.gov/opa/2007/02/top-
complaints.htm
Liu, S., & Silverman, M. (2001, January/February).
A practical guide to biometric security technol-
ogy.
IT Professional
, pp. 27-32.
Gordon, L., Loeb, M., Lucyshyn, W., & Richard-
son, R. (2006). 2006 CSI/FBI computer crime and
security survey. Retrieved August 6, 2007, from
CSI, http://www.gocsi.com/
Loch, K., Carr, H., & Warkentin, M. (1992).
Threats to information systems: Today's reality,
yesterday's understanding.
MIS Quarterly, 16
(2),
173-186.
Henderson, S., & Snyder, C. (1999). Personal infor-
mation privacy: Implications for MIS managers.
Information and Management,
36
, 213-220.
Lowry, G. (2002). Modeling user acceptance of
building management systems.
Automation in
Construction, 11
, 695-705.
Herman, A. (2002). Major bank signs up for di-
gital signature verification technology.
Biometric
Technology Today, 10
(1), 1.
Mason, R. (1986). Four ethical issues of the infor-
mation age.
MIS Quarterly, 10
(1), 5-12.
Hong, W., Thong, J., Wong, W., & Tam, K. (2002).
Determinants of user acceptance of digital li-
braries: An empirical examination of individual
differences and system characteristics.
Journal
of Management Information Systems, 18
(3), 97-
124.
McMillian, R. (2002). The myth of airport bio-
metrics. Retrieved August 6, 2007 from Wired
News, http://www.wired.com
Norton, R. (2002, October). The evolving biomet-
ric marketplace to 2006.
Biometric Technology
Today
, pp. 7-8.
Hopkins, R. (1999). An introduction to biometrics
and large scale civilian identification.
Interna-
tional Review of Law Computer and Technology,
13
(3), 337-363.
Pirim, T., James, T., Boswell, K., Reithel, B., &
Barkhi, R. (in press). An empirical investigation
of an individual's perceived need for privacy and
security.
International Journal of Information
Security and Privacy
.
Hu, P., Chau, P., Sheng, O., & Tam, K. (1999). Ex-
amining the technology acceptance model using
physician acceptance of telemedicine technology.
Journal of Management Information Systems,
16
(2), 91-112.
Plouffe, C., Hulland, J., & Vandenbosch, M. (2001).
Research report: Richness versus parsimony in
modeling technology adoption decisions: Under-
standing merchant adoption of a smart card-based
payment system.
Information Systems Research,
12
(2), 208-222.
Jain, A., Hong, L., & Pankanti, S. (2000). Biomet-
ric identification.
Communications of the ACM,
43
(2), 91-98.
Search WWH ::
Custom Search