The information systems (IS) literature has long emphasized the importance of user acceptance of computer-based IS. Evaluating the determinants of acceptance of information …
This paper offers an up-to-date, comprehensive, extensive and targeted survey on Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
Password patterns, as used on current Android phones, and other shape-based authentication schemes are highly usable and memorable. In terms of security, they are …
SY Dauda, J Lee - Information Systems, 2015 - Elsevier
The importance of service delivery technology and online service adoption and usage in the banking industry has received an increased discussion in the literature in recent years …
There is a growing need for usable and secure authentication in immersive virtual reality (VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
Interests in technology innovation has increased in many organizations. Collaborations among technology providers and marketers are occurring as they integrate these biometric …
C Morosan - Journal of Hospitality & Tourism Research, 2012 - journals.sagepub.com
This study extended the technology acceptance model (TAM) by applying it to the context of biometric systems in the hotel industry and by introducing a consumer-oriented construct …
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For example, in the near future users may be able to visit virtual shopping malls and virtually join …
PINs and patterns remain among the most widely used knowledge-based authentication schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …