**10. References**


Furthermore, to encourage mobile users to adopt and use biometrics in their mobile devices for government services, it would be strategically advantageous for awareness programs to take place before the technology is introduced. In fact, education programs for both mobile users and service providers will help to ensure awareness of the new technology, the purpose of its implementation, and its benefits. It is also important to note that privacy, relative advantage, ease of use; trialability, compatibility, and observability, play a significant role in promoting the adoption of biometric authentication in m-government

There is a dearth of empirical studies in the adoption of biometric authentication, certainly within the context of m-government in developing countries. This chapter contributes rich insights into people's perceptions on the application of biometrics in this context, which adds weight to existing opinions on how to best apply biometrics in m-government security. The empirical data identifies several issues including the users' factors, organisational factors, system factors, acceptance factors, contributory factors, and challenges that influence the adoption of biometric authentication in m-government in the KSA context. The data also reveals that biometric authentication might best be implemented with the use of PKI in a smartcard installed in mobile devices, and preferably only for advanced government services. This is as opposed to consistently applying biometric authentication to

A main finding and contribution of this work is the use of Grounded Theory in the development of a new substantive theory for the adoption of biometric authentication in mgovernment security in the KSA. This chapter contributes to the literature by identifying and describing the factors that influence the adoption of biometric authentication in mgovernment applications. It further contributes to theory by providing rich insights and increased understanding of the concerns and perceptions of mobile phone users, service providers and network operators regarding the application of biometric authentication to

This chapter adds a methodological contribution by providing a new example of the application of Grounded Theory coding procedures to develop a theoretical framework for the adoption of biometric authentication in mobile services applications in a developing country. This chapter described the application of Grounded Theory, including the development of the concepts and categories, and then the generation of the substantive

Abanumy, A and Mayhew, P 2005, M-government Implications For E-Government In

Alharbi, S 2006, *Perceptions of Faculty and Students toward the Obstacles of Implementing E-*

Developing Countries: The Case Of Saudi Arabia, EURO mGOV 2005, Brighton,

*Government in Educational Institutions in Saudi Arabia*, a PhD thesis, West Virginia

theory, providing a unique insight into this qualitative information system research.

the mobile device itself, and applying it for all online government services.

mobile devices for government services.

**10. References** 

UK, pp. 1-6.

University, USA.

applications.

**9. Conclusions** 


www.csdms.in/mserve/2007/fullpapers/HafedhAlShihi.pdf


http://computer.howstuffworks.com/facialrecognition.htm


Developing a Theoretical Framework

107, no. 9/10, pp. 386-399.

vol. 2, no. 3, pp. 192-222.

*Budget*, Washington, D. C.

*Studies*, Athens, Georgia.

Workgroup.

Findings.

India.

Publications.

McLeod, J 1999, *Practitioner Research in Counselling*, London: Sage.

*world*, New York, John Wiley and Sons, Inc.

Thousand Oaks, California, SAGE Publications, Inc.

for the Adoption of Biometrics in M-Government Applications Using Grounded Theory 207

Mansourian, Y 2006, *Adoption of Grounded Theory in LIS research*, New Library World, vol.

Miles, M and Huberman, A 1994, *An Expanded Sourcebook - Qualitative Data Analysis*, 2nd ed.

Moore, G and Benbasat, I 1991, 'Development of an instrument to measure the perceptions

Myers, M and Tan, F 2002, Beyond Models of National Culture in Information Systems Research, *Journal of Global Information Management*, vol. 10, no. 1, pp. 24-32. Nanavati, S, Thieme, M, and Nanavati, R 2002, *Biometrics: Identity verification in a networked* 

National Electronic Commerce Coordinating Council (NECCC) 2001, *M-Government: The* 

OMB. (2002). *E-government Strategy: Executive Office of the President Office of Management and* 

ORC, Opinion Research Corporation 2002, *Public Attitudes Toward the Uses of Biometric* 

Piantanida, M, Tananis, C, and Grubs, R 2002, Claiming Grounded Theory for practice-

Roberts, G and Pick, J. 2004, Technology factors in corporate adoption of mobile cell phones:

Sadad 2008, payments newsletter, SADAD Payment System, vol.2, issue 10, available online

Sahraoui, S, Gharaibeh, G, and Al-Jboori, A 2006, Government in Saudi Arabia can it

Satyanarayana, J 2004, e-Government - *The Science of the Possible*, New Delhi, Prentice-Hall of

Scott, M, Acton, T and Hughes, M 2005, An assessment of biometric identities as a standard for e-government services, *Services and Standards*, vol. 1, no. 3, 2005, pp. 271-286. Strauss, A and Corbin, J 1990, *Basics of qualitative research: Grounded Theory procedures and* 

Strauss, A and Corbin, J 1994, Grounded Theory Methodology: An Overview, In Denzin, N.

Strauss, A and Corbin, J 1998 *Basics of Qualitative Research: Techniques and Procedures for* 

and Lincoln, Y (Eds.). *Handbook of Qualitative Research*. Thousand Oaks, Sage

Putnam, R 1987, *Selling modernization within your company*, Commline, 13. Quantz, P 1984, *CIM planning: The future-factory foundation,* CIM Review, 38.

*techniques*, Newbury Park, CA: Sage Publications, Inc.

*Developing Theory*, 2nd ed., Sage, Thousand Oaks, CA.

*Conference on System Sciences*, 9(9), 90287-90296. Rogers, E 1995, *Diffusion of Innovations*, The Free Press, New York.

at http://www.sadad.com/Arabic/

Government Workshop '06 (eGOV06).

of adopting an information technology innovation', *Information Systems Research*,

*Convergence of Wireless Technologies and e-Government*, Research and Development

*Identification Technologies by Government and the Private Sector*, Summary of Survey

based dissertation research: A think piece, *Conference on Interdisciplinary Qualitative* 

A case study analysis. *Proceedings of the IEEE 37th Annual Hawaii International* 

overcome its challenges?, Brunel University, London, paper presented at

Ettlie, J 2000, *Managing technological innovation*, New York, John Wiley and Sons.


Feng, L 2003, Implementing E-government Strategy is Scotland: Current Situation and

Frees, R 2008, Biometric technology improves identification security, U.S. Air Force, viewed on 3rd December 2008 at http://www.af.mil/news/story.asp?id=123084564 Giarimi, S and Magnusson, H 2002, *Investigation of User Acceptance for Biometric* 

Giesing, I 2003, *User Perceptions Related to Identification Through Biometrics within Electronic* 

Glaser, B 1992, *Emergence vs Forcing: Basics of Grounded Theory Analysis*, Sociology Press, Mill

Glaser B and Strauss A 1967, The *Discovery of Grounded Theory: Strategies for Qualitative* 

Goulding, C 2002, *Grounded Theory: A Practical Guide for Management*, Business and Market

Harris, A and Yen, D 2002, Biometric authentication: Assuring access to information, *Information Management and Computer Security*, vol. 10, no. 1, pp. 12-19. Heath, H and Cowley, S 2004, Developing a Grounded Theory approach: a comparison of Glaser and Strauss, *International Journal of Nursing Studies*, vol. 41, pp. 141-150.

Jahangir, N and Begum, N 2008, The role of perceived usefulness, perceived ease of use,

Jain, A, Hong, L and Pankanti, S 2000, 'Biometric identification', *Communications of the ACM*,

Kaasinen, E 2007, 'User acceptance of mobile Internet services', In Workshop on Mobile

Kanellis, P and Paul, R 2005, User behaving badly: Phenoma and paradoxes from an

Kleist, V, Riley, R and Pearson, T 2005, Evaluating biometrics as internal control solutions to

Lallana, E 2008, *mGovernment: Mobile/Wireless Applications in Government, eGovernment for* 

Lease, D 2005, *Factors influencing the adoption of biometric security technologies by decision* 

Lee, W, Kim, T and Chung, J 2002, *User acceptance of the mobile Internet*, In M-Business 2002,

security and privacy, and customer attitude to engender customer adaptation in the context of electronic banking, *African Journal of Business Management*, vol. 2 (2), pp.

Internet User Experience, *Mobile HCI 2007 Conference*, September 9, 2007, Singapore.

investigation into Information systems misfit, *Journal of Organisational and End-use* 

organizational risk, *Journal of American Academy of Business*, vol. 6, no. 2, pp. 339–

*Development Information Exchange*, University of Manchester's Institute for Development Policy and Management, UK, viewed on 2nd February 2009 at

*making information technology and security managers*, a PhD thesis, Capella

Emerging Issues, *Journal of Electronic Commerce in Organizations*, vol. 1, no. 2, pp. 44-

*Verification/Identification Methods in Mobile Units*, Department of Computer and

Ettlie, J 2000, *Managing technological innovation*, New York, John Wiley and Sons.

Systems Sciences, Stockholm University, Sweden.

Hirst, C 2005, *A Primer on Biometric Technologies*, Gartner Research.

*Business*, University of Pretoria.

*Research*, Aldine, Chicago.

Researchers London, Sage.

vol. 43, no. 2, pp. 90-98.

*Computing*, vol. 17, no. 2, pp. 264-291.

Hhttp://www.egov4dev.org

University, USA.

Athens, Greece.

65.

Valley, CA.

032-040.

343.


**11**

*Serbia* 

**Building Expert Profiles Models Applying** 

Semantic Web (SW) is an emerging research field that has application in different domains such as e-government services, richly interlinked library systems, Web search engines, enterprise knowledge stores, and other. The term "Semantic Web" refers to the World Wide Web Consortium's (W3C) vision of the Web of linked data (called also the Web of Data) as "…an extension of the current Web in which information is given a well-defined meaning, better enabling computers and people to work in cooperation" (Berners-Lee, Hendler, & Lassila, 2001). Since then, many specifications, guidelines, languages, and tools have been developed that facilitate software development, improve performance and create new

This Chapter investigates the existing standard models for representing Human Resource (HR) data and especially in the context of competence management and discusses the process of building and publishing ontology-based expert profiles models. The expert profiles can be used for deploying advanced HR management services for in-house purposes, as well as integration and search of experts in the Linked Open Data (LOD) cloud. During the past 3 years, the Linked Data paradigm, promoted by Tim Berners-Lee (2006) as a part of the Semantic Web roadmap, evolved from a practical research idea into a very promising candidate for addressing one of the biggest challenges in the area of intelligent information management: the exploitation of the Web as a platform for data and information integration in addition to document search (Auer & Lehmann, 2010; Janev & Vraneš, 2011b). According to the statistics from March 2012 (see http://stats.lod2.eu/), the LOD cloud contains over 1,7 billion triples, integrates over 400000 namespaces and registers

The Chapter is organized as follows. After introducing the main requirements for managing competence data in enterprises in Section 2, we point to existing and emerging HR approaches and data representation standards (Section 3). Then, follows an example process for building an ontology-based enterprise knowledge stores (Section 4) and two examples

**2. HR management requirements from business and technical perspective**  Human resource management (HRM) is one of the basic business processes that consists of a wide range of administrative, organizational and employee acquisition and development

for searching enterprise knowledge stores with Semantic Web tools (Section 5).

**1. Introduction** 

business opportunities.

over 1,7 million instances of type "person".

**Semantic Web Technologies** 

Valentina Janev and Sanja Vraneš

*University of Belgrade, Mihajlo Pupin Institute* 

