Who do you think you are? A review of the complex interplay between information systems, identification and identity
This paper introduces the special issue on information systems, identity and identification. In
addition to introducing the papers in the special issue, it provides a state-of-the-art review of …
addition to introducing the papers in the special issue, it provides a state-of-the-art review of …
Linking green human resource practices and environmental economics performance: the role of green economic organizational culture and green psychological …
An eco-friendly environment with green strategies can help to achieve better environmental
performance. However, literature on the relationship between green human resource …
performance. However, literature on the relationship between green human resource …
Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context
The information systems (IS) literature has long emphasized the importance of user
acceptance of computer-based IS. Evaluating the determinants of acceptance of information …
acceptance of computer-based IS. Evaluating the determinants of acceptance of information …
Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things
Face identification and resolution technology is crucial to ensure the identity consistency of
humans in physical space and cyber space. In the current Internet of Things (IoT) and big …
humans in physical space and cyber space. In the current Internet of Things (IoT) and big …
A unified face identification and resolution scheme using cloud computing in Internet of Things
Abstract In the Internet of Things (IoT), identification and resolution of physical object is
crucial for authenticating object's identity, controlling service access, and establishing trust …
crucial for authenticating object's identity, controlling service access, and establishing trust …
Gait-watch: A context-aware authentication system for smart watch based on gait recognition
With recent advances in mobile computing and sensing technology, smart wearable devices
have pervaded our everyday lives. The security of these wearable devices is becoming a hot …
have pervaded our everyday lives. The security of these wearable devices is becoming a hot …
[PDF][PDF] ATM security using fingerprint biometric identifer: An investigative study
MO Onyesolu, IM Ezeani - International Journal of Advanced …, 2012 - academia.edu
The growth in electronic transactions has resulted in a greater demand for fast and accurate
user identification and authentication. Access codes for buildings, banks accounts and …
user identification and authentication. Access codes for buildings, banks accounts and …
Pistis: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration
Wearable devices-based biometrics has become mainstream in the biometric domain,
especially in mobile computing, due to its convenience, flexibility, and potentially high user …
especially in mobile computing, due to its convenience, flexibility, and potentially high user …
Gait-Watch: A Gait-based context-aware authentication system for smart watch via sparse coding
In recent years, wrist-worn smart devices such as smart wrist band and smart watch have
pervaded our everyday life. Under this trend, the security issue of these wearable devices …
pervaded our everyday life. Under this trend, the security issue of these wearable devices …
Individual identification based on neuro-signal using motor movement and imaginary cognitive process
Neuro-signals are being widely used for clinical purpose to detect and diagnose mental
disorders. Its uniqueness and consistent characteristics in human being made it feasible …
disorders. Its uniqueness and consistent characteristics in human being made it feasible …