Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Smart Card Security; Technology and Adoption
Hamed Taherdoost, Shamsul Sahibudin, Neda Jalaliyoon
Pages - 74 - 84 | Revised - 01-09-2011 | Published - 05-10-2011
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Smart Card Security, Authentication, Verification, Integrity, Privacy, Adoption
ABSTRACT
Newly, smart card technology are being used in a number of ways around the world, on the other hand, security has become significant in information technology, especially in those application involving data sharing and transactions through the internet. Furthermore, researches in information technology acceptance have identified the security as one of the factor that can influence on smart card adoption. This research is chiefly to study the security principals of smart card and assess the security aspects’ affect on smart card technology adoption. In order to achieve this purpose, a survey was conducted among the 640 university students to measure the acceptance of smart card technology from security aspects.
1 | Vierto, V. M. (2016). Älykorttipalvelut suomalaisten kuluttajien näkökulmasta. |
2 | Gerdes Jr, J. H., Huang, C. T., & Sharaf, M. A. Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates. Electronic Commerce Research, 1-28. |
3 | Im, H., & Kim, T. S. (2015). An Empirical Study on Citizen’s Adoption Behavior of Internet Personal Identification Number (i-PIN) System. |
4 | Taherdoost, h., sahibuddin, s., & jalaliyoon, N. E-Service Security; Acceptance Perspective. |
5 | Taherdoost, h., sahibuddin, s., & jalaliyoon, N. How Security Issues Can Influence on Usage of Electronic Services. |
6 | Im, H., Park, S. T., & Ko, M. H. (2015). An Empirical Study on a Tradeoff between Security and Convenience: The Case of i-PIN System. Indian Journal of Science and Technology, 8(23). |
7 | Chizari, H. Security Issues in ATM Smart Card Technology. |
8 | Taherdoost, h., sahibuddin, s., & jalaliyoon, n. (2014). Evaluation of Security Factors Effecting on Web-Based Service Adoption. Recent Advances In Telecommunications, Informatics And Educational Technologies, 117-123. |
9 | Ariffin, M., Afiza, N., & Mohd Sani, N. F. (2014, August). Plan recognition scheme using multi-factors authentication for smart card online system. In Biometrics and Security Technologies (ISBAST), 2014 International Symposium on (pp. 156-160). IEEE. |
10 | Moradi, H., & Moghaddam, H. K. Assessing the Readiness of Civil Registration Bureau of South Khorasan Province to Exploit the Experiences of National Smart ID card Establishment throughout the World. |
11 | Taherdoost, H., Sahibuddin, S., & Jalaliyoon, N. Appraisal of Individual Understanding of Social and Ethical Circumstances; Information Technology Utilization. |
12 | Partha Sarathi, N. G., & Otto, C. O. (2014, March). Fare management system for transport corporation using face recognition based on principal component analysis. In Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on (pp. 1-5). IEEE. |
13 | Taherdoost, H., Sahibuddin, S., Namayandeh, M., & Jalaliyoon, N. (2013, December). Computer and Information Security Ethics--Models. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 145-149). IEEE. |
14 | Al-Khouri, A. M. (2013). Triggering the Smart Card Readers Supply Chain. |
15 | Taherdoost, H., Sahibuddin, S., Jalaliyoon, N., & Hosseinkhani, J. (2013, December). Classification of Web based Service User Types. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 495-499). IEEE. |
16 | Taherdoost, H., & Hosseinkhani, J. (2013, December). Information Mining on the Web: E-business Application. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 500-503). IEEE. |
17 | Nakhumwa, J. N. (2013). Adoption of E-commerce Payment Systems by Commercial Banks in Kenya (Doctoral dissertation, University of Nairobi). |
18 | Taherdoost, H., Sahibuddin, S., & Jalaliyoon, N. (2013, December). Assessment of Electronic Service Applications Practice: Domains Perspective. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 534-537). IEEE. |
19 | Taherdoost, H., Sahibuddin, S., Ibrahim, S., Kalantari, A., & Jalaliyoon, N. (2012). Classification of Internet Products and Evaluation of Application Utilization Based on the Product Fulfillment Process. In 3rd European Conference of Computer Science. |
20 | Taherdoost, H., Sahibuddin, S., Namayandeh, M., Jalaliyoon, N., Kalantari, A., & Chaeikar, S. S. (2012). Smart Card Adoption Model: Social and Ethical Perspectives. Science, 3(4). |
Adams, A. and Sasse, M. A. (1999), Users Are Not the Enemy. Why Users Compromise Computer Security Mechanisms And How To Take Remedial Measures. Communications of the ACM. 42(12), 42-46. | |
American National Standard Institute. (1985). ANSI X9.17. Financial institution key management (wholesale). | |
Argy, P. and Bollen, R. 1999. Australia: raising the e-commerce comfort level. IT Professional, 1 (6), 56–57. | |
Bailey, J. E., and Pearson, S. W. (1983). Development of a Tool For Measuring and Analyzing Computer User Satisfaction, Management Science. 29, 530–544. | |
Consultation on Australian Government Smartcard Framework; Smartcard Implementation Guide. (2007). Australian government office of the privacy commissioner. | |
Everett, D. (1993). Smart Card Tutorial, Part 11 The Development Environment. First Published in July 1993. | |
Ferrari, J., Mackinnon. R., Poh. S., and Yatawara. L. (1998). Smart Cards: A Case Study. International Technical Support Organization IBM Corp. | |
I. Al-Alawi, & M.A. Al-Amer, “Young Generation Attitudes and Awareness Towards the Implementation of Smart Card in Bahrain: An Exploratory Study”. Journal of Computer Science, Vol. 2 No. 5, 2006, pp. 441-446. | |
Igbaria, M. and Parasuraman, S. (1989). A path analytic study of individual characteristics, computer anxiety, and attitudes towards microcomputers. Journal of Management. 15(3), 373-388. | |
International Conference on Informatics and Technology, Kuala Lumpur, Malaysia.170-175. | |
Leonard, L. N. K., Cronan, T. P., and Kreie, J. (2004). What influences IT ethical behavior intentions, planned behavior, reasoned action, perceived importance, or individual characteristics? Information and Management. 42(1), 143-158. | |
Liaw, S.S., and Huang, H. M. (2003). An investigation of user attitudes toward search engines as an information retrieval tool. Computers in Human Behavior. 19(6), 751–765. | |
Masrom. M, Ismail.Z, Ahmad. R and Taherdoost. H. (2009). Evaluating Measurement Models For the Acceptance of Smart Card Technology: Security Aspects. Proceeding of the 3rd | |
National Institute of Standards and Technology. (1999). FIPS 46-3. The Data Encryption Standard. | |
National Institute of Standards and Technology. (2000). FIPS 196. The Advanced Encryption Standard. | |
Rankers, P., Connell, L., Collins, T. and Russell, D. 2001. Secure contactless smartcard ASIC with DPA protection, IEEE Journal of Solid-State Circuits, 36 (3), 559–565. | |
Rankl, W. and Effing, W. 2003. Smart Card Handbook, John Wiley. | |
Rivest, R., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 21(2), 120-126. | |
Shelfer, K., M., and Procaccino, J., D. (2002). Smart card evolution. Communications of the ACM. 45(7): 83-88. | |
T. Kilicli, “Smart Card HOWTO,” 2001. | |
Taherdoost. H, Masrom. M, and Ismail. Z. (2009). Evaluation of Smart Card Acceptance: Security, Technology and Usage. Conference Proceedings of International Conference on e-Commerce, e-Administration, e-Society, and e-Education (e-case). Singapore. pp.765- 779. | |
Vandenwauver, M. (1994). introduction to cryptography, Katholieke Universiteit Leuven. | |
Vijayasarathy, L., R. (2004). Predicting consumer intentions to use online shopping: the case for an augmented technology acceptance model. Information and Management. 41(6), 747-762. | |
Whitman, M., E., and Mattord, H., J. (2003). Principles of information security. Boston, MA: Thomson Course Technology. | |
Mr. Hamed Taherdoost
- Malaysia
hamed.taherdoost@gmail.com
Mr. Shamsul Sahibudin
- Malaysia
Mr. Neda Jalaliyoon
- Malaysia
|
|
|
|
View all special issues >> | |
|
|