JH Kim, WK Song, HC Lee - Sustainability, 2023 - mdpi.com
After the pandemic, there has been an increasing emphasis on customer convenience, with biometrics emerging as a key solution. This study empirically investigates the intention of …
VA Raj, SS Jasrotia, SS Rai - International Journal of Human …, 2023 - Taylor & Francis
Privacy concerns and trust have recently been proposed as crucial issues in consumers' adoption of online services. Therefore, we have used an extended theory of planned …
The willingness of individuals to provide personal data is of interest to policymakers and practitioners seeking to develop more intelligent transportation systems that create value for …
VA Raj, SS Jasrotia, SS Rai - Journal of Facilities Management, 2024 - emerald.com
Purpose Perceived risk and benefits have been proposed as crucial elements in consumers' technology adoption intention. Therefore, this study aims to use the Unified Theory of …
Y Zhu, N Zaidin, Y Pu - Sustainability, 2022 - mdpi.com
Despite their ecological value, wetland parks can be expensive to preserve and maintain, so local governments endeavor to design financially sustainable models by exploiting the …
Biometric data can be described as data containing human physical characteristics. They can be in the form of fingerprint data, retina scans, and voice recognition. The application of …
EN Untaru, X Chi, H Jung, BL Chua… - Tourism Planning & …, 2024 - Taylor & Francis
The risk of virus transmission while traveling due to COVID-19 has increased travelers' concerns about the general state of mental health, such as anxiety, depression and …
J Zhou, L Li, R Lei - Sustainability, 2023 - mdpi.com
Blocking regional communication is the beginning of the deterioration and even destruction of civilization. Accessibility is the principal condition for the development of mountain areas …
F Dehling, J Tolsdorf, H Federrath… - Proceedings on Privacy …, 2024 - petsymposium.org
Continuous authentication has emerged as a promising approach to increase user account security for online services. Unlike traditional authentication methods, continuous …