Cargando…
Usable comprehensive-factor authentication for a secure time attendance system
In information security, it is widely accepted that the more authentication factors are used, the higher the security level. However, more factors cannot guarantee usability in real usage because human and other non-technical factors are involved. This paper proposes the use of all possible authenti...
Autores principales: | Vorakulpipat, Chalee, Pichetjamroen, Sasakorn, Rattanalerdnusorn, Ekkachan |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8384039/ https://www.ncbi.nlm.nih.gov/pubmed/34497871 http://dx.doi.org/10.7717/peerj-cs.678 |
Ejemplares similares
-
Researching COVID-19 tracing app acceptance: incorporating theory from the technological acceptance model
por: Velicia-Martin, Felix, et al.
Publicado: (2021) -
Ambient intelligence governance review: from service-oriented to self-service
por: Ponce, Victor, et al.
Publicado: (2022) -
Data privacy during pandemics: a systematic literature review of COVID-19 smartphone applications
por: Alshawi, Amany, et al.
Publicado: (2022) -
Exploring the information quality of mobile government services: a literature review
por: Desmal, Abdulla Jaafar, et al.
Publicado: (2022) -
A Mobile-Based Patient-Centric Passive System for Guiding Patients Through the Hospital Workflow: Design and Development
por: Vorakulpipat, Chalee, et al.
Publicado: (2019)