{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:44:55Z","timestamp":1729658695300,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750197","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"232-237","source":"Crossref","is-referenced-by-count":2,"title":["Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management Systems"],"prefix":"10.1109","author":[{"given":"Sara Jeza","family":"Alotaibi","sequence":"first","affiliation":[]},{"given":"Mike","family":"Wald","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Analyzing the Use of UTAUT Model in Explaining An Online Behaviour Internet Banking Adoption","year":"2009","author":"al-qeisi","key":"19"},{"key":"17","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology toward a unified view","volume":"27","author":"venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"journal-title":"Research Methods for Business","year":"2009","author":"sekaran","key":"18"},{"key":"15","first-page":"277","article-title":"Security, user experience, acceptability attributes for the integration of physical and virtual identity access management systems","author":"alotaibi","year":"2012","journal-title":"International Conference on Information Society (I-Society) the IEEE International Conference on Information Society (I-Society 2012)"},{"key":"16","article-title":"Towards a uTAUT-based model for studying the integrating physical and virtual identity access management systems in e-government domain","author":"alotaibi","year":"2012","journal-title":"The 7th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2012) 2012"},{"key":"13","first-page":"62","article-title":"UAE national iD programme case study","volume":"1","author":"al-khouri","year":"2006","journal-title":"International Journal of Human and Social Sciences"},{"key":"14","first-page":"17","article-title":"LAMS framework a new framework for acceptable user experiences for integrating physical and virtual identity access management systems","author":"alotaibi","year":"2012","journal-title":"2012 World Congress on Internet Security (WorldCIS) the IEEE World Congress on Internet Security (WorldCIS-2012)"},{"journal-title":"The Identity Card Program in Belgium","year":"2009","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2008.07.006"},{"journal-title":"Sample Size Simple Random Samples","year":"2012","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1093\/swr\/27.2.94"},{"key":"22","first-page":"23","author":"hair","year":"2010","journal-title":"Multivariate Data Analysis"},{"key":"23","volume":"18","author":"gandal","year":"2002","journal-title":"Compatibility Standardisation and Network Effects"},{"key":"24","first-page":"70","author":"blunch","year":"2008","journal-title":"Exploratory Factor Analysis Introduction to Structural Equation Modelling Using SPSS and AMOS"},{"journal-title":"Understanding Attitudes and Predicting Social Behavior","year":"1980","author":"ajzen","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"27","article-title":"The grid computing without bounds","volume":"23","author":"foster","year":"2002","journal-title":"Scientific American"},{"journal-title":"The South Hill Enterprise 2012 the Chi-Square Test","year":"0","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2011.63"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/9781118269138"},{"key":"2","first-page":"35","article-title":"Identity and access management","volume":"4","author":"mcquaide","year":"2003","journal-title":"Information Systems Control Journal"},{"key":"10","article-title":"The kingdom of saudi arabia national iD card an uncompromising commitment to document security","author":"card","year":"2009","journal-title":"Secure ID Solutions"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062916"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.72"},{"key":"6","volume":"129","author":"perkins","year":"2005","journal-title":"Consider Identity and Access Management As A Process Not A Technology"},{"journal-title":"Identity &Access Management","year":"2009","author":"koelewijn","key":"5"},{"key":"4","first-page":"14","article-title":"Identity and access management adoption in europe 2009-Uptake of individual technologies is low","author":"cser","year":"2010","journal-title":"But Cloud Options Hold Promise"},{"key":"9","first-page":"127","article-title":"Towards global eID-Interoperability","author":"bruegger","year":"2007","journal-title":"Biometrics and Electronic Signatures-BIOSIG"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.16"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750197.pdf?arnumber=6750197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T00:07:59Z","timestamp":1565309279000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750197\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750197","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}