{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:40:03Z","timestamp":1745970003371,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642369803"},{"type":"electronic","value":"9783642369810"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36981-0_108","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T11:53:39Z","timestamp":1362484419000},"page":"1141-1148","source":"Crossref","is-referenced-by-count":0,"title":["A Study of Biometric Authentication Adoption in Health Services"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Rodrigues","sequence":"first","affiliation":[]},{"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Ho, G., Stephens, G., Jamieson, R.: Biometric Authentication Adoption Issues. In: ACIS 2003 Proceedings, pp. 1\u201312 (2003)","key":"108_CR1"},{"doi-asserted-by":"crossref","unstructured":"Savastano, M.: Biometrics: Modelling the Body. In: Tenth International Conference on Computer Modeling and Simulation uksim 2008, pp. 14\u201317 (2008)","key":"108_CR2","DOI":"10.1109\/UKSIM.2008.104"},{"key":"108_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/joeuc.2006070101","volume":"18","author":"T. James","year":"2006","unstructured":"James, T., Pirim, T., Boswell, K., Reithel, B.J., Barkhi, R.: Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model. Journal of Organizational and End User Computing\u00a018, 1\u201324 (2006)","journal-title":"Journal of Organizational and End User Computing"},{"unstructured":"Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems: Theory and results (1986), http:\/\/hdl.handle.net\/1721.1\/15192","key":"108_CR4"},{"doi-asserted-by":"crossref","unstructured":"Jain, A.K., Bolle, R.M., Pankanti, S.: Introduction to biometrics. In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Biometrics, pp. 1\u201341. Kluwer Academic Publishers (1999)","key":"108_CR5","DOI":"10.1007\/0-306-47044-6_1"},{"key":"108_CR6","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/6294.899930","volume":"3","author":"S. Liu","year":"2001","unstructured":"Liu, S., Silverman, M.: A practical guide to biometric security technology. IT Professional\u00a03, 27\u201332 (2001)","journal-title":"IT Professional"},{"doi-asserted-by":"crossref","unstructured":"Fairhurst, M.: Document identity, authentication and ownership: the future of biometric verification. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR 2003), pp. 1108\u20131116. Citeseer (2003)","key":"108_CR7","DOI":"10.1109\/ICDAR.2003.1227828"},{"key":"108_CR8","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSECP.2003.1193209","volume":"1","author":"S. Prabhakar","year":"2003","unstructured":"Prabhakar, S., Jain, A.K., Pankanti, S.: Biometric recognition: Security and privacy concerns. IEEE Security & Privacy\u00a01, 33\u201342 (2003)","journal-title":"IEEE Security & Privacy"},{"key":"108_CR9","first-page":"83","volume":"3","author":"Y. Yun","year":"2002","unstructured":"Yun, Y.: The \u201c123\u201d of Biometric Technology. Synthesis Journal 2002\u00a03, 83\u201396 (2002)","journal-title":"Synthesis Journal 2002"},{"key":"108_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1108\/09685220410518883","volume":"12","author":"V. Zorkadis","year":"2004","unstructured":"Zorkadis, V., Donos, P.O.: On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements. Information Management & Computer Security\u00a012, 125\u2013137 (2004)","journal-title":"Information Management & Computer Security"},{"key":"108_CR11","volume-title":"Guide to biometrics","author":"R.M. Bolle","year":"2003","unstructured":"Bolle, R.M., Connell, J.H., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to biometrics. Springer, New York (2003)"},{"unstructured":"Magalh\u00e3es, P.S., Santos, H.D.: Biometria e autentica\u00e7\u00e3o. Actas da 4 Confer\u00eancia da Associa\u00e7\u00e3o Portuguesa de Sistemas de Informa\u00e7\u00e3o, p. 17. APSI, Porto (2003)","key":"108_CR12"},{"doi-asserted-by":"crossref","unstructured":"Vashek, M., \u0158iha, Z.: Security of biometric authentication systems. In: International Conference on Computer Information Systems and IndustrialManagement Applications (CISIM), pp. 19\u201328 (2010)","key":"108_CR13","DOI":"10.1109\/CISIM.2010.5643698"},{"key":"108_CR14","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"A.K. Jain","year":"2006","unstructured":"Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security\u00a01, 125\u2013143 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"108_CR15","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1038\/449535b","volume":"449","author":"A. Watson","year":"2007","unstructured":"Watson, A.: Biometrics: easy to steal, hard to regain identity. Nature\u00a0449, 535\u2013535 (2007)","journal-title":"Nature"},{"key":"108_CR16","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1023\/B:ETIN.0000006918.22060.1f","volume":"5","author":"A. Alterman","year":"2003","unstructured":"Alterman, A.: \u201cA piece of yourself\u201d: Ethical issues in biometric identification. Ethics and Information Technology\u00a05, 139\u2013150 (2003)","journal-title":"Ethics and Information Technology"},{"key":"108_CR17","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/1-84628-064-8_12","volume-title":"Biometric Systems","author":"M. Rejman-Greene","year":"2005","unstructured":"Rejman-Greene, M.: Privacy Issues in the Application of Biometrics: a European Perspective. In: Wayman, J., Jain, A.K., Maltoni, D., Maio, D. (eds.) Biometric Systems, pp. 335\u2013359. Springer, London (2005)"},{"doi-asserted-by":"crossref","unstructured":"Delaitre, S.: Risk management approach on identity theft in biometric systems context. In: 1st International Conference on Availability, Reliability and Security, pp. 20\u201322 (2006)","key":"108_CR18","DOI":"10.1109\/ARES.2006.113"},{"key":"108_CR19","first-page":"23","volume-title":"Proceedings of the 2nd International Workshop on Security in Information Systems","author":"C.K. Dimitriadis","year":"2004","unstructured":"Dimitriadis, C.K., Polemi, D.: Risk Analysis of Biometric Systems. In: Fern\u00e1ndez-Medina, E., Castro, J.C.H., Villalba, L.J.G. (eds.) Proceedings of the 2nd International Workshop on Security in Information Systems, pp. 23\u201332. INSTICC Press, Porto (2004)"},{"key":"108_CR20","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1108\/14637150010325444","volume":"6","author":"S.L. Chan","year":"2000","unstructured":"Chan, S.L.: Information technology in business processes. Business Process Management Journal\u00a06, 224\u2013237 (2000)","journal-title":"Business Process Management Journal"},{"key":"108_CR21","first-page":"752","volume":"12","author":"Y. Lee","year":"2003","unstructured":"Lee, Y., Kozar, K., Larsen, K.: The Technology Acceptance Model: Past, Present, and Future. Communications of the Association for Information Systems\u00a012, 752\u2013780 (2003)","journal-title":"Communications of the Association for Information Systems"},{"key":"108_CR22","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly\u00a013, 319\u2013340 (1989)","journal-title":"MIS quarterly"},{"key":"108_CR23","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S. Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.A.: Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research\u00a06, 144\u2013176 (1995)","journal-title":"Information Systems Research"},{"key":"108_CR24","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V. Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science\u00a046, 186\u2013204 (2000)","journal-title":"Management Science"},{"key":"108_CR25","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","volume":"39","author":"V. Venkatesh","year":"2008","unstructured":"Venkatesh, V., Bala, H.: Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences\u00a039, 273\u2013315 (2008)","journal-title":"Decision Sciences"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36981-0_108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:08:09Z","timestamp":1745968089000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-36981-0_108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642369803","9783642369810"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36981-0_108","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}