TY - CHAP AU - Thamer Alhussain AU - Steve Drew ED - Christos Kalloniatis Y1 - 2012-05-30 PY - 2012 T1 - Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory N2 - Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments. BT - Security Enhanced Applications for Information Systems SP - Ch. 10 UR - https://doi.org/10.5772/36881 DO - 10.5772/36881 SN - PB - IntechOpen CY - Rijeka Y2 - 2024-04-26 ER -