:::

詳目顯示

回上一頁
題名:生物辨識技術在智慧行動裝置之科技評估與採用分析
作者:彭志強
作者(外文):Peng, Chih-Chiang
校院名稱:國立交通大學
系所名稱:科技管理研究所
指導教授:徐作聖
學位類別:博士
出版日期:2014
主題關鍵詞:生物辨識技術評估模糊層級分析法最佳非模糊績效值科技接受模式結構方程式BiometricsTechnology Assessmentfuzzy analytic hierarchy process (FAHP)best non-fuzzy performance (BNP)Technology Acceptance ModelStructural Equation Modeling
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:20
面臨安全性與隱私性的挑戰,許多智慧行動裝置(smart mobile devices)廠商與研究機構積極嘗試在其產品上運用生物辨識(biometrics),例如蘋果(Apple Inc.)在iPhone 5S機種上面設計指紋辨識(fingerprint recognition),因生物辨識可以提供可靠耐用的個人識別機制來確認與偵測其身分。
本研究目的主要透過科技管理聯結生物辨識在智慧行動裝置的應用上做兩個規劃,第一,透過典型的技術評估考量要素結合生物辨識科技的特色來進行衡量,並獲得應用於智慧行動裝置(smart mobile devices)之最佳生物辨識技術選擇方案。為了達成此研究目的,我們運用模糊層級分析法(the fuzzy analytic hierarchy process,FAHP),最佳非模糊績效值法(best non-fuzzy performance,BNP),分析結果顯示選擇生物辨識方案時,最重要的構面為技術評估(technology assessment)構面,接著為生物辨識性能(biometrics performance)構面、生物辨識要素(key elements of biometrics)構面,其也透露研究目標的技術特色扮演重要角色。進一步結果指出在六種生物辨識中,最有評選優勢的依序為指紋辨識、虹膜辨識(iris recognition)以及臉型辨識(face recognition)。
其次,根據第一階段的結果,我們繼續探討指紋辨識方案運用在智慧行動裝置的接受度,設計以整合消費者與技術觀點的科技接受模式(technology acceptance model)來進行分析,其中導入三個外部變數構面:生物辨識要素、生物辨識性能以及技術評估。以研究模式的結構方程式(structural equation modeling)分析結果說明「生物辨識要素正面影響知覺易用性(perceived ease of use)」、「生物辨識性能正面影響知覺有用性(perceived usefulness)」以及「技術評估正面影響使用意願 (intent to use)」。整體視之,此模式的適配度檢定符合結構方程式所要求之水準,大部分的假設都得到支持,除了知覺易用性與使用意願的正相關程度並不顯著。
綜上所述,本研究可以提供給管理研究學者面臨前瞻科技評選議題時作為參考,本研究首先運用FAHP和BNP了解影響生物辨識評選的關鍵構面,特別是關於目標技術的特色需要被考量進去,最後得到指紋辨識為最適方案,其可以幫助理解智慧行動裝置採用生物辨識技術的評估因素。另外,TAM分析結果可以說明促進消費者在智慧行動裝置上接受指紋辨識的重要環節,據此可以擴大生物辨識技術的滲透率與普及程度。
Faced with security and privacy challenges, many smart mobile devices manufacturers and research institutions are engaged in designing their products using biometrics, such as Apple launched iPhone 5S with fingerprint authentication. Although biometrics has been applied in some specific fields for decades, biometrics has gradually proliferated in consumer and mobile electronic devices to enhance security and privacy concerns because that biometrics can provide a durable and reliable personal identification and detection mechanisms to confirm his identity.
There are two main purposes linking technology management with marketing biometrics adoption of this study plan; first, we evaluate biometrics through conventional technology assessment considerations combining the measurement elements of the particularity of biometric technologies with the optimal biometric technology selection to get in smart mobile devices. In order to achieve biometric technology assessment, we use fuzzy analytic hierarchy process (FAHP) and best non-fuzzy performance (BNP) for our research purposes. The outcome reveals that technology assessment is the most emphasized key object in selecting biometric technologies followed by biometrics performance and key elements of biometrics. It also reveals that the technic features of the concerned technologies play an important role in research goals. Further results indicate that in the six kinds of biometrics, the most advantageous selection order is the fingerprint recognition, followed by the iris recognition and the facial recognition.
Secondly, according to the results of the first stage, we continue to explore the use of the fingerprint recognition in the acceptance of smart mobile devices via technology acceptance model, designed to integrate with consumer and technology views for analysis with three extrinsic variables, ‘key elements of biometrics’, ‘biometrics performance’, and ‘technology assessment’. The research results of structural equation modeling indicate that ‘key elements of biometrics’ positively impacts perceived ease of use, ‘biometrics performance’ positively impacts perceived usefulness, and ‘technology assessment’ positively affect intent to use biometrics. Over all, the fitness of the model meets requirements, and the most hypotheses are supported except that the degree of positive correlation between perceived ease of use and intent to use is not significant.
In conclusion, this study can provide as a reference when management researchers faced when managing the use of forward-looking technology selection issues. This study applies FAHP and BNP analysis in evaluating biometric technologies to simulate how different evaluation objects affect biometric technology selecting. This study enables researchers to recognize that technology assessment should give more consideration to the particularity of target technologies. In this way, it could help them more comprehensively evaluate and select the biometrics applied in smart mobile devices. In addition, the TAM analysis results illustrate the chances to stimulate consumer acceptance of biometrics in smart mobile devices whereby to expand the penetration and popularity of biometric technology.
Adams, D.A, Nelson, R.R., & Todd, P.A. (1992). Perceived usefulness, ease of use, and usage of information technology: A replication. MIS Quarterly, 16, 227–247.
Adeoye S.O. (2010). A Survey of Emerging Biometric Technologies. International Journal of Computer Applications, 9(10), 1-5.
Agarwal, R. & Karahanna, E. (2000). Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24, 665–694.
Alley, M. & Gardiner, M. (2012). Application and device characteristics as drivers for smart mobile device adoption and productivity. International Journal of Organisational Behaviour, 17(4), 35-47.
ATP (The Advanced Technology Program) (2010). How ATP Works. Retrieved from http://www.atp.nist.gov/atp/overview.htm.
Ayağ, Z. (2007). A hybrid approach to machine-tool selection through AHP and simulation. International Journal of Production Research, 45(9), 2029-2050.
Bagozzi, R. & Yi, Y. (2012). Specification, evaluation, and interpretation of structural equation models. Journal of the Academy of Marketing Science, 40(1), 8–34.
Bagozzi, R.P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association for Information Systems, 8(4), 243–254.
Balestra, G., Knaflitz, M., Massa, R. & Sicuro, M. (2007). AHP for the acquisition of biomedical instrumentation. Conf. Proc. IEEE Eng. Med. Biol. Soc. 2007, 3581-3584.
Barin, A., Canha, L.N., da Rosa Abaide, A. and Magnago, K.F. (2009). Selection of storage energy technologies in a power quality scenario—the AHP and the fuzzy logic. Industrial Electronics, 2009. IECON '09. 35th Annual Conference of IEEE, 3615-3620.
Bhattacharyya, D., Das, P., Kim, T.H. & Bandyopadhyay, K.S. (2009b). Vascular Pattern Analysis towards Pervasive Palm Vein Authentication. Journal of Universal Computer Science, 15(5), 1081-1089.
Bhattacharyya, D., Ranjan, R., Alisherov, A.F. & Choi, M.K. (2009a). Biometric Authentication: A Review. International Journal of u- and e- Service, Science and Technology, 2(3), 13-28.
Biometrics Identity Management Agency (2010). Biometrics Glossary, version 4.0. Software Engineering Center CECOM Life Cycle Management Command. Retrieved from http://www.biometrics.dod.mil/Files/Documents/Standards/BioGlossary.pdf
Bolle, R.M., Connell, J.H., Pankanti, S., Ratha, N.K. & Senior, A.W. (2004). Guide to Biometrics. New York: Springer.
Bollen, K.A. & Long, S.J. (1993). Testing Structural Equation Models. Newbury Park, CA: Sage.
Brennan, A., Chick, S.E. & Davies, R. (2006). A taxonomy of model structures for economic evaluation of health technologies. Health Econ., 15, 1295-1310.
Browne, M.W. and Cudeck, R. (1993). Alternative ways of assessing model fit. In: K.A. Bollen and J.S. Long, ed. Testing structural models. London: Sage, 136-162.
Buckley, J.J. (1985). Fuzzy hierarchical analysis. Fuzzy Sets and Systems, 17(3), 233-247.
Byrne, B.M. (2001). Structural Equation Modeling with AMOS - Basic Concepts, Applications, and Programming. Mahwah, London: Erlbaum.
Chan, F.T.S. & Kumar, N. (2007). Global supplier development considering risk factors using fuzzy extended AHP-based approach. Omega, 35(4), 417-431.
Chang, C.W., Wu, C.R., Lin, C.T., & Chen, H.C. (2008). Evaluating and controlling silicon wafer slicing quality using fuzzy analytical hierarchy and sensitivity analysis. The International Journal of Advanced Manufacturing Technology, 36(3-4), 322-333.
Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L. & Jain, A.K. (2006). Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern Anal. Mach. Intell., 28(1), 3-18.
Chau, P.Y.K. & Hu, P.J.H. (2001). Information technology acceptance by individual professionals: a model comparison approach. Decision Sciences, 32(4), 699-719.
Chen, C.T. (2000). Extensions of TOPSIS for group decision-making under fuzzy environment. Fuzzy Sets and Systems, 114(1), 1-9.
Cheng, Y.H. & Yeh, Y.I. (2011). Exploring radio frequency identification technology's application in international distribution centers and adoption rate forecasting. Technological Forecasting & Social Change, 78, 661-673
Coldrick, S., Longhurst, P., Ivey, P. & Hannis, J. (2005). An R&D options selection model for investment decisions. Technovation, 25(3), 185-193.
Csutora, R. & Buckley, J.J. (2001). Fuzzy hierarchical analysis: the Lambda-Max method. Fuzzy Sets and Systems, 120(2), 181-195.
Dabbah, M.A., Woo, W.L. & Dlay, S.S. (2007). Secure Authentication for Face Recognition. In Proc. of IEEE Symposium on Computational Intelligence in Image and Signal Processing, Apr. 2007. USA, pp. 121-126.
Davis, F.D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13, 319-340.
Davis, F.D., Bagozzi, R.P. & Warshaw, P.R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22, 1111–1132.
Deng, H. (1999). Multicriteria analysis with fuzzy pairwise comparison. International Journal of Approximate Reasoning, 21(3), 215-231.
Delac, K. & Grgic, M. (2004). A Survey of Biometric Recognition Methods. 46th International Symposium Electronics in Marine, ELMAR-2004, 16-18 June 2004, Zadar, Croatia
Fleischer, T., Decker, M. & Fiedeler, U. (2005). Assessing emerging technologies - methodological challenges and the case of nanotechnologies. Technological Forecasting and Social Change, 72(9), 1112-1121.
Fu, H.P., Chao, P., Chang, T.H. & Chang, Y.S. (2008). The impact of market freedom on the adoption of third-party electronic marketplaces: a fuzzy AHP analysis. Industrial Marketing Management, 37, 698-712.
Fu, L., Shi, L., Yang, Y., & Yu, B. (2010). The selection of project management software by F AHP and FMCDM in automobile R&D process. 2010 International Conference on Networking and Digital Society, Wenzhou, China, 30-31 May 2010, 66-69.
Ganorkar, R.S. & Ghatol, A.A. (2007). Iris Recognition: An Emerging Biometric Technology. In Proc. of the 6th WSEAS International Conference on Signal Processing, Robotics and Automation, Greece, pp. 91-96.
Gerdsri, N. & Kocaoglu, D.F. Applying the Analytic Hierarchy Process (AHP) to build a strategic framework for technology roadmapping, Math. Comput. Model, 46 (7/8), 1071-1080.
Goudelis, G., Tefas, A. & Pitas, I. (2008). Emerging Biometric Modalities: A Survey. Journal on Multimodal User Interfaces, 2(3-4), 217-235.
Grijpink, J.H.A.M. (2008). Trend report on biometrics: Some new insights, experiences and developments. Computer law & security report, 24, 261-264.
Gupta, M.M., Saridis, G.N. & Gaines, B.R. (1977). Fuzzy Automata and Decision Processes. New York: Elsevier North-Holland.
Hahn, E.D. (2003). Decision making with uncertain judgments: a stochastic formulation of the analytic hierarchy process. Decision Sciences, 34(3), 443-466.
Hair, F.J., Hult, M.T.G., Ringle, M.C. & Sarstedt, M. (2013). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Thousand Oaks: Sage.
Heyer, R. (2008). Biometrics Technology Review 2008. Edinburgh, South Australia: Defence Science and Technology Organisation, publication DSTO-GD-0538.
Hong, J.H., Yun, E.K. & Cho, S.B. (2005). A Review of Performance Evaluation for Biometrics Systems. International Journal of Image & Graphics, 5(3), 501-536.
Hsu, Y. G., Tzeng, G. H. & Shyu, J. Z. (2003). Fuzzy multiple criteria selection of government-sponsored frontier technology R&D projects. R&D Management, 33(5), 539-551.
Hu, A.H., Hsu, C.W., Kuo, T.C. & Wu, W.C. (2009). Risk evaluation of green components to hazardous substance using FMEA and FAHP. Expert Systems with Applications, 36(3), 7142-7147.
Hu, P.J.H., Clark, T.H.K. & Ma, W.W. (2003). Examining technology acceptance by school teachers: a longitudinal study. Inf. Manage., 41(2), 227-241.
Huang, C.C., Chu, P.Y. & Chiang, Y.H. (2008). A fuzzy AHP application in government-sponsored R&D project selection. Omega-International Journal of Management Science, 36(6), 1038-1052.
Igbaria, M., Parasuraman, S. & Baroudi, J.J. (1996). A motivational model of microcomputer usage. Journal of Management Information Systems, 13, 127-143.
International Biometric Group (2009). Biometrics Market and Industry Report 2009-2014. New York: International Biometric Group.
Isobe, Y., Ohki, T. & Komatsu, N. (2013). Security performance evaluation for biometric template protection techniques. International Journal of Biometrics, 5(1), 53-72.
Jain, A.K. & Ross, A. (2004). Multibiometric Systems. Appeared in Communication of the ACM. Special Issue on Multimodal Interfaces, 47(1), 34-40.
Jain, A.K., Nandakumar, K. & Nagar, A. (2008). Biometric Template Security. EURASIP Journal on Advances in Signal Processing 2008, Article ID 579416, 17 pages.
Jain, A.K., Ross, A. & Pankanti, S. (2006). Biometric: A Tool for Information Security. IEEE Trans. Information Forensics and Security, 1(2), 125-144.
Jain, A.K., Ross, A. & Prabhakar, S. (2004). An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, 14(1), 4-20.
Jarvenpaa, S.L., Tractinsky, N., and Vitale, M. (2000). Consumer trust in an internet store. Information Technology and Management, 1(1), 45-71.
Jeong, N., Yoo, Y. & Heo, T.Y. (2009). Moderating effect of personal innovativeness on mobile-RFID services: Based on Warshaw's purchase intention model. Technological Forecasting & Social Change, 76, 154-164.
Kahraman, C., Cebeci, U. & Ruan, D. (2004). Multi-attribute comparison of catering service companies using fuzzy AHP: the case of Turkey. International Journal of Production Economics, 87(2), 171-184.
Kar, B., Kartik, B. & Dutta, P.K. (2006). Speech and Face Biometric for Person Authentication. In Proc. of IEEE International Conference on Industrial Technology, India, pp. 391-396.
Kent S. & Millett L. (2003). Who Goes There?: Authentication Technologies Through the Lens of Privacy. National Academies Press.
Kim, W.K., Han, S.K., Oh, K.J., Kim, T.Y., Ahn, H.C. & Song, C.W. (2010). The dual analytic hierarchy process to prioritize emerging technologies. Technological Forecasting and Social Change, 77(4), 566-577.
Kline, R.B. (2010). Principles and Practice of Structural Equation Modeling (3rd eds.). New York: The Guilford Press
Kong, A., Zhang, D. & Kamel, M. (2009). A survey of palm print recognition. Pattern Recognition, 42(7), 1408–1418.
Kwong, C.K. & Bai, H. (2003). Determining the important weights for the customer requirement in QFD using a fuzzy AHP with an extent analysis approach. IIE Transaction, 35, 619-626.
Laarhoven, P.J.M. & Pedrycz, W. (1983). A fuzzy extension of Saaty’s priority theory. Fuzzy Sets and Systems, 11(1-3), 229-241.
Lagou, P. & Chondrokoukis, P.G. (2011). Biometrics for non-repudiation: security and legal aspect. International Journal of Biometrics, 3(2), 128-147.
Lee, H.I., Chen, W.C. & Chang, C.J., (2008). A fuzzy AHP and BSC approach for evaluating performance of IT development in the manufacturing industry in Taiwan. Expert Systems with Applications, 34(1), 96–107.
Lee, S.K., Yoon, Y. J., & Kim, J. W. (2007). A study on making a long-term improvement in the national energy efficiency and GHG control plans by the AHP approach. Energy Policy, 35(5), 2862-2868.
Lee, Y.G. & Song, Y.I. (2007). Selecting the key research areas in nano-technology field using technology cluster analysis: A case study based on national R&D programs in South Korea. Technovation, 27(1-2), 57-64.
Lin, C.H., & Twu, C.H. (2012). Combination of a fuzzy analytic hierarchy process (FAHP) with the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) for fashion design scheme evaluation. Textile Research Journal, 82(10), 1065-1074.
Lin, C.T., Wu, C.R., & Chen, H.C. (2008). The Study of Construct Key Success Factors for the Taiwanese Hospitals of Location Selection by Using the Fuzzy AHP and Sensitivity Analysis. International journal of information and management sciences, 19(1), 175-200.
Loehlin, J.C. (2004). Latent Variable Models: An Introduction to Factor, Path, and Structural Equation Analysis. Mahwah, NJ: Erlbaum Associates.
MacCallum, R. (1986). Specification searches in covariance structure modeling. Psychological Bulletin, 100, 107-120.
Matsumoto, T., Hoshino, H., Yamada, K. & Hasino, S. (2002). Impact of artificial gummy fingers on fingerprint systems. In Proc. of SPIE 4677, pp. 275-289.
Meade, L. & Sarkis, J. (1998). Strategic analysis of logistics and supply chain management systems using analytic network process. Transportation Research Part E: Logistics and Transportation Review, 34(3), 201-215.
National Biometric Security Project (2008). Biometric Technology Application Manual Volume One. Biometric Basics Compiled and Published by: National Biometric Security Project. Retrieved from http://www.nationalbiometric.org/BTAM/btamvol1update.pdf
National Science and Technology Council (2006). Biometrics “Foundation Documents”. Retrieved from www.biometrics.gov/documents/biofoundationdocs.pdf.
Noll, J (2006). Services and applications in future wireless networks. Teletronikk, 3(4).
Nunnally, J.C. (1967). Psychometric Theory. New York: McGraw-Hill.
Nysveen, H., Pedersen, P.E. & Thorbjørnsen, H. (2005). Intentions to use mobile services: antecedents and cross-service comparisons. Journal of the Academy of Marketing Science, 33(3), 330-346.
OʼReilly, P. & Duane, A. (2010). Smart Mobile Media Services: Consumer Intention Model. paper presented to 8th International Conference on Advances in Mobile Computing & Multimedia (MoMM2010), Paris, France, 8-10 November, 2010
Pai, F.Y., & Huang, K.I. (2011). Applying the Technology Acceptance Model to the introduction of healthcare information systems. Technological Forecasting & Social Change, 78, 650-660
Pavlou, P.A. (2003). Consumer acceptance of electronic commerce. Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101-134.
Pearl, J. (2000). Causality: Models, Reasoning, and Inference. UK: Cambridge University Press.
Poslad, Stefan (2009). Ubiquitous Computing Smart Devices, Smart Environments and Smart Interaction. Wiley. ISBN 978-0-470-03560-3.
Prabhakar, S., Pankanti, S. & Jain, A.K. (2003). Biometric Recognition: Security and Privacy Concerns. IEEE Security & Privacy, March/April, 33-42.
Riley R.A. & Kleist, V.F. (2005). The biometric technologies business case: a systematic approach. Information Management & Computer Security, 13(2), 89-105.
Ross, A. (2010). Iris recognition: The path forward. IEEE Computer, 43(2), 30-35.
Ross, A., Dass, S & Jain, A.K. (2005). A deformable model for fingerprint matching. Journal of Pattern Recognition, 38(1), 95-103.
Rostamy, A.A.A., Shaverdi, M., Amiri, B., & Takanlou, F.B. (2012). Using fuzzy analytical hierarchy process to evaluate main dimensions of business process reengineering. Journal of Applied Operational Research, 4(2), 69–77.
Saaty, T. L. (1980). The analytic hierarchy process. New York: McGraw-Hill.
Schierz, P.G., Schilke, O. & Wirtz, B.W. (2010). Understanding consumer acceptance of mobile payment services: An empirical analysis. Electronic Commerce Research and Applications, 9, 209-216.
Shehabuddeen, N., Probert, D. & Phaal, R. (2006). From theory to practice: Challenges in operationalising a technology selection framework. Technovation, 26(3), 324-407.
Shen, Y.C., Chang, S.H., Lin, T.R.G. & Yu H.C. (2010). A hybrid selection model for emerging technology. Technological Forecasting and Social Change, 77, 151-166.
Shen, Y.C., Chou, C.J., & Lin, G.T.R. (2011). The portfolio of renewable energy sources for achieving the three E policy goals. Energy, 36(5), 2589-2598.
Shen, Y.C., Lin, G.T.R., Li, K.P., & Yuan, B.J.C. (2010). An assessment of exploiting renewable energy sources with concerns of policy and technology. Energy Policy, 38(8), 4604-4616.
Shin, D.H. (2009). An empirical investigation of a modified technology acceptance model of IPTV. Behaviour & Information Technology, 28(4), 361-372.
Simon, H. (1953). Causal ordering and identifiability. In Hood, W.C. & Koopmans, T.C. ed. Studies in Econometric Method. New York: Wiley. pp. 49–74
Sloane, E.B., Liberatore, M.J., Nydick, R.L., Luo, W., & Chung, Q.B. (2003). Using the analytic hierarchy process as a clinical engineering tool to facilitate an iterative, multidisciplinary, microeconomic health technology assessment. Computers & Operations Research, 30(10), 1447-1465.
Tran, T.A. & Daim, T. (2008). A taxonomic review of methods and tools applied in technology assessment. Technological Forecasting and Social Change, 75(9), 1396-1405.
Tsaur, S.H., Tzeng, G.H. & Wang, K.C. (1997). Evaluating tourist risks from fuzzy views. Annual of Tourism Research, 24(4), 796-812.
Tseng, M.L., & Lin, Y.H. (2008). Selection of Competitive Advantages in TQM Implementation Using Fuzzy AHP and Sensitivity Analysis. Asia Pacific Management Review, 13(3), 583-599.
Uludag, U., Pankanti, S., Prabhakar, S. & Jain, A.K. (2004). Biometric Cryptosystems: Issues and Challenges. In proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management, 92(6), 948-960.
Uzoka, E.F.M. & Ndzinge, T. (2009). An investigation of factors affecting biometric technology adoption in a developing country context. International Journal of Biometrics, 1(3), 307-328.
Vaidya, O.S. & Kumar, S. (2006). Analytic hierarchy process: An overview of applications. European Journal of Operational Research, 169(1), 1-29.
Venkatesh, V. & Davis, F.D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186-204.
Venkatesh, V. (1999). Creation of favorable user perceptions: exploring the role of intrinsic motivation. MIS Quarterly, 23(2), 239-260.
Venkatesh, V., Davis, F.D. & Morris, M.G. (2007). Dead or alive? The development, trajectory and future of technology adoption research. Journal of the Association for Information Systems, 8, 267-286.
Venkatesh, V., Morris, M.G., Davis, G.B. & Davis, F.D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 425-478.
Vielhauer, C. (2006). Biometric Modalities. Different Traits for Authenticating Subjects: Chapter 3 in Biometric User Authentication for IT Security. Advances in Information Security, 18(I), 33-75.
von Oertzen, T. (2010). Power equivalence in structural equation modelling. British Journal of Mathematical and Statistical Psychology, 62(2), 257-272.
Wang, J.S., Liu, C.H. & Shyu, J.Z. (2013). Biometrics Technology Evaluating and Selecting Model Building. Technology Analysis & Strategic Management, 25(9), 1067-1083.
Wang, J.W., Cheng, C.H. & Huang, K.C. (2009). Fuzzy hierarchical TOPSIS for supplier selection. Applied Soft Computing, 9(1), 377-386.
Wang, Y.M., Wang, Y.S. & Yang, Y.F. (2010). Understanding the determinants of RFID adoption in the manufacturing industry. Technological Forecasting & Social Change, 77, 803-815.
Wei, C.C., Chien, C.F. & Wang, M.J. (2005). An AHP-based approach to ERP system selection. International Journal of Production Economics, 96, 47-62.
Weiser, Mark (1991). The Computer for the Twenty-First Century. Scientific American 265 (3): 94–104.
Westland, J.C. (2010). Lower bounds on sample size in structural equation modeling. Electron. Comm. Res. Appl., 9(6), 476-487.
Wright, S.S. (1921). Correlation and causation. Journal of Agricultural Research, 20, 557-585.
Yu, O.S., Hsu, G.J.Y. & Chen, T.Y. (1998). Introduction to Technological Management: Technological Forecast and Planning. Taipei: Wu Nan Publishing Company.
Zadeh, L.A. (1965). Fuzzy sets. Information and Control, 8(3), 338–353.
Zhou, J., Gu, J.W. & Zhang, D. (2007). Singular Points Analysis in Fingerprints Based on Topological Structure and Orientation Field. In proceedings of the International Conference of Biometrics (ICB), August 2007, pp 261-270.

Website Referred:
1. Creativentechno: http://creativentechno.wordpress.com/2012/02/18/face-recognition/
2. Bankinfosecurity: http://www.bankinfosecurity.com/blogs/readying-iris-recognition-for-primetime-p-1545/op-1
3. Advanced Source Code: http://www.advancedsourcecode.com/phpspeaker.asp
4. Hitachi: http://www.hitachi.com.tw/
5. Sulekha: http://etips.sulekha.com/online-biometric-systems_1958
6. Gartner 2010, Gartner Says Worldwide Mobile Phone Sales Grew 17 Per Cent in First Quarter 2010, Gartner Press Release, viewed June 2011 .
7. Gartner 2011, Gartner Says 428 Million Mobile Communication Devices Sold Worldwide in First Quarter 2011, a 19 Percent Increase Year-on-Year, Gartner Newsroom, viewed May 2011 .

 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE