{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:37:13Z","timestamp":1768315033585,"version":"3.49.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,3]]},"DOI":"10.1109\/imcom53663.2022.9721809","type":"proceedings-article","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T21:56:54Z","timestamp":1646085414000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Biometrics as a method of employee control"],"prefix":"10.1109","author":[{"given":"Justyna","family":"Zywiolek","sequence":"first","affiliation":[{"name":"Czestochowa University of Technology,Faculty of Management,Czestochowa,Poland"}]},{"given":"Achyuth","family":"Sarkar","sequence":"additional","affiliation":[{"name":"National Institute of Technology,Computer Science Engineering,Arunachal Pradesh India,India"}]},{"given":"Muhammad Safdar","family":"Sial","sequence":"additional","affiliation":[{"name":"COMSATS University Islamabad,Department of Management Sciences,Islamabad,Pakistan"}]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MSECP.2003.1193206","article-title":"Privacy Concerns","volume":"1","author":"dem","year":"2003","journal-title":"IEEE Secur Privacy"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-3646-0.ch002"},{"key":"ref32","year":"2009","journal-title":"Emerging devices technical brief"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1201\/9781420005004-9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1177\/0893318918813202"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-69933-2_3"},{"key":"ref36","article-title":"Case Study Research, Design and Method: Yin, R., 1994, Case Study Research, Design and Method","author":"yin","year":"0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2004.1338241"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1201\/b18008-27"},{"key":"ref10","first-page":"1","article-title":"Dealing with biometric multi-dimensionality through novel chaotic neural network methodology","volume":"11","author":"gavrilova","year":"2011","journal-title":"International Journal of Information Technology and Management"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001410008391"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5121\/sipij.2011.2114"},{"key":"ref14","article-title":"Image Pattern Recognition, Series in Machine Perception and Artificial Intelligence","volume":"67","author":"yanushkevich","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1163\/9789004432758_013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2018.12.1.06"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-1770-2.les13"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"334","DOI":"10.17261\/Pressacademia.2015312984","article-title":"Privacy concerns of public employees on the internet: a study in Bursa","volume":"2","author":"olgun","year":"2015","journal-title":"Pressacademia"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.26419\/res.00420.007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-064-8_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/b18789-8"},{"key":"ref27","article-title":"When Faces Are Combined with Palmprints: A Novel Biometric Fusion Strategy, Biometric Authentication","volume":"3072","author":"feng","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-69933-2_4"},{"key":"ref6","article-title":"Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES): Shoniregun, C, A., 2005, Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES)","author":"shoniregun","year":"0"},{"key":"ref29","article-title":"Securing Electronic Medical Records Using Biometric Authentication, Lecture Notes in Computer Science","volume":"3546","author":"krawczyk","year":"0"},{"key":"ref5","first-page":"49","article-title":"Biometric recognition: An overview. The International Library of Ethics","volume":"11","author":"jain","year":"2012","journal-title":"Law and Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1201\/b18008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-3646-0"},{"key":"ref2","article-title":"Electronic Government Security Measures","author":"azenabor","year":"2007","journal-title":"Proceedings of the 7th Annual Hawaii International Conference on Business"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(07)70084-X"},{"key":"ref1","article-title":"Matching performance for the US-visit IDENT system using flat fingerprints","author":"garris","year":"2004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"ref22","first-page":"57","article-title":"Infrared imaging of hand vein patterns for biometric purposes","volume":"2","author":"shrotri","year":"2009","journal-title":"Journal of Security Engineering"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(03)05016-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/9780470997949.ch1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4036-3"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.51"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1108\/09593849410076807"}],"event":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2022,1,3]]},"end":{"date-parts":[[2022,1,5]]}},"container-title":["2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9721625\/9721626\/09721809.pdf?arnumber=9721809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:10:29Z","timestamp":1655759429000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9721809\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/imcom53663.2022.9721809","relation":{},"subject":[],"published":{"date-parts":[[2022,1,3]]}}}