Who do you think you are? A review of the complex interplay between information systems, identification and identity

EA Whitley, U Gal, A Kjaergaard - European Journal of Information …, 2014 - Taylor & Francis
This paper introduces the special issue on information systems, identity and identification. In
addition to introducing the papers in the special issue, it provides a state-of-the-art review of …

Linking green human resource practices and environmental economics performance: the role of green economic organizational culture and green psychological …

SMA Shah, Y Jiang, H Wu, Z Ahmed, I Ullah… - International journal of …, 2021 - mdpi.com
An eco-friendly environment with green strategies can help to achieve better environmental
performance. However, literature on the relationship between green human resource …

Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context

CL Miltgen, A Popovič, T Oliveira - Decision support systems, 2013 - Elsevier
The information systems (IS) literature has long emphasized the importance of user
acceptance of computer-based IS. Evaluating the determinants of acceptance of information …

Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things

P Hu, H Ning, T Qiu, H Song, Y Wang… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Face identification and resolution technology is crucial to ensure the identity consistency of
humans in physical space and cyber space. In the current Internet of Things (IoT) and big …

A unified face identification and resolution scheme using cloud computing in Internet of Things

P Hu, H Ning, T Qiu, Y Xu, X Luo… - Future Generation …, 2018 - Elsevier
Abstract In the Internet of Things (IoT), identification and resolution of physical object is
crucial for authenticating object's identity, controlling service access, and establishing trust …

Gait-watch: A context-aware authentication system for smart watch based on gait recognition

W Xu, Y Shen, Y Zhang, N Bergmann… - Proceedings of the Second …, 2017 - dl.acm.org
With recent advances in mobile computing and sensing technology, smart wearable devices
have pervaded our everyday lives. The security of these wearable devices is becoming a hot …

[PDF][PDF] ATM security using fingerprint biometric identifer: An investigative study

MO Onyesolu, IM Ezeani - International Journal of Advanced …, 2012 - academia.edu
The growth in electronic transactions has resulted in a greater demand for fast and accurate
user identification and authentication. Access codes for buildings, banks accounts and …

Pistis: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration

W Song, H Jia, M Wang, Y Wu, W Xue… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Wearable devices-based biometrics has become mainstream in the biometric domain,
especially in mobile computing, due to its convenience, flexibility, and potentially high user …

Gait-Watch: A Gait-based context-aware authentication system for smart watch via sparse coding

W Xu, Y Shen, C Luo, J Li, W Li, AY Zomaya - Ad Hoc Networks, 2020 - Elsevier
In recent years, wrist-worn smart devices such as smart wrist band and smart watch have
pervaded our everyday life. Under this trend, the security issue of these wearable devices …

Individual identification based on neuro-signal using motor movement and imaginary cognitive process

PK Sharma, A Vaish - Optik, 2016 - Elsevier
Neuro-signals are being widely used for clinical purpose to detect and diagnose mental
disorders. Its uniqueness and consistent characteristics in human being made it feasible …