{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T13:47:29Z","timestamp":1699969649124},"reference-count":33,"publisher":"Informa UK Limited","issue":"10","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Technology Analysis & Strategic Management"],"published-print":{"date-parts":[[2020,10,2]]},"DOI":"10.1080\/09537325.2020.1758655","type":"journal-article","created":{"date-parts":[[2020,5,5]],"date-time":"2020-05-05T07:07:35Z","timestamp":1588662455000},"page":"1236-1250","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":6,"title":["User acceptance of voice biometrics in managing the physical access to a secure area of an international airport"],"prefix":"10.1080","volume":"32","author":[{"given":"Michele","family":"Cornacchia","sequence":"first","affiliation":[{"name":"Fondazione Ugo Bordoni, Rome, Italy"}]},{"given":"Filomena","family":"Papa","sequence":"additional","affiliation":[{"name":"Fondazione Ugo Bordoni, Rome, Italy"}]},{"given":"Bartolomeo","family":"Sapio","sequence":"additional","affiliation":[{"name":"Fondazione Ugo Bordoni, Rome, Italy"}]}],"member":"301","published-online":{"date-parts":[[2020,5,5]]},"reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Arora, R., A. Garg, and M. Sareen. 2016. \u201cFramework for Augmenting Security Systems at Airports.\u201d Proceedings of the 2016 6th International Conference \u2013 Cloud System and Big Data Engineering (Confluence) (pp. 231\u2013235). Amity University, Uttar Pradesh, Noida, India. Piscataway, NJ IEEE.","DOI":"10.1109\/CONFLUENCE.2016.7508119"},{"key":"CIT0002","first-page":"1","author":"Beranek B.","year":"2012","journal-title":"Redbooks REDP-4903-00, IBM Corporation"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2001.0483"},{"key":"CIT0004","unstructured":"Evans, N. 2017. \u201cAnti-Spoofing for Speaker Verification: The OCTAVE Delta [PDF file].\u201d H2020 OCTAVE Project Workshop, Florence, Italy: EURECOM. https:\/\/www.octave-project.eu\/wp-content\/uploads\/2017\/07\/15.00-Evans-Anti-spoofing-techniques.pdf."},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(17)30115-7"},{"key":"CIT0006","volume-title":"Proceedings of Interspeech 2015","author":"Glembek O.","year":"2015"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2010.10.001"},{"key":"CIT0008","unstructured":"IBIA. 2016. \u201cRecent Opinion Surveys on Public Perceptions of Biometrics [PDF file].\u201d International Biometrics Identity Association. https:\/\/www.ibia.org\/download\/datasets\/3372\/Public-Perceptions-of-Biometrics-opinion-surveys&per;20.pdf."},{"key":"CIT0009","unstructured":"IBM Future of Identity Study. 2018. IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity. https:\/\/securityintelligence."},{"key":"CIT0010","unstructured":"International Organization for Standardisation. 2006. Information Technology-Biometric Performance Testing and Reporting \u2013 Part 1: Principles and Framework (ISO\/IEC 19795-1). https:\/\/www.iso.org\/standard\/41447.html."},{"key":"CIT0011","unstructured":"International Organization for Standardisation. 2010. Ergonomics of Human-System Interaction. Part 210: Human-Centred Design for Interactive Systems (ISO 9241-210:2010). https:\/\/www.iso.org\/standard\/52075.html."},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9"},{"key":"CIT0013","volume-title":"Presented at the Symposium on Usable Privacy and Security (SOUPS 2015)","author":"Khan H.","year":"2015"},{"key":"CIT0014","author":"King R.","year":"2013","journal-title":"The Wall Street Journal"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"CIT0016","volume-title":"Proceedings of the 14th European Conference on Information Systems (ECIS 2006)","author":"Linck K.","year":"2006"},{"key":"CIT0017","unstructured":"Lovisotto, G., R. Maliky, I. Sluganovic, M. Roeschlin, P. Truemany, and I. Martinovic. 2017. \u201cMobile Biometrics in Financial Services: A Five Factor Framework.\u201d Technical Report CS-RR-17-03. Oxford University. https:\/\/www.cs.ox.ac.uk\/files\/9113\/Mobile&per;20Biometrics&per;20in&per;20Financial&per;20Services.pdf."},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.05.010"},{"key":"CIT0019","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, D., M. Shirvanian, and N. Saxena. 2015. \u201cAll Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines.\u201d Computer Security, ESORICS 2015, Vienna, Austria.","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"CIT0020","volume-title":"Design of Everyday Things: Revised and Expanded","author":"Norman D. A.","year":"2013"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.sheji.2016.01.002"},{"key":"CIT0022","unstructured":"NUANCE. 2015. The Essential Guide to Voice Biometrics White Paper. https:\/\/www.nuance.com\/en-gb\/omni-channel-customer-engagement\/security\/identification-and-verification.html."},{"key":"CIT0023","unstructured":"OCTAVE. 2017. Objective Control for TAlker VErication, EU Project No. 647850, Topic: DS-02-2014 Access Control. https:\/\/www.octave-project.eu\/."},{"key":"CIT0024","unstructured":"OPUS Research. 2017. Guidelines for Deploying Mobile Biometrics In Financial Services. https:\/\/newsroom.mastercard.com\/eu\/files\/2017\/06\/Opus-Five-Factor-Framework-White-Paper-FINAL.pdf."},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1145\/1809777.1809820"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1080\/09537320903438054"},{"key":"CIT0027","unstructured":"SEA Milan Airports. 2017. The Business Case for OCTAVE: Use Voice Biometrics Instead of Passwords \u2013 SEA Milan Airports Case [PDF file]. H2020 OCTAVE Project Workshop, Florence, Italy: Falsina, G. https:\/\/www.octave-project.eu\/wp-content\/uploads\/2017\/07\/10.15-Falsina-Use-voice-biometrics.pdf."},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(17)30013-9"},{"key":"CIT0029","unstructured":"Theofanos, M. F., B. C. Stanton, and C. Wolfson. 2008. Usability & Biometrics. Ensuring Successfully Biometric Systems. NIST. https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=152184."},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00428"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-09-2014-0088"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1080\/0144929042000320992"}],"container-title":["Technology Analysis & Strategic Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09537325.2020.1758655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T22:47:28Z","timestamp":1619909248000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09537325.2020.1758655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,5]]},"references-count":33,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,10,2]]}},"alternative-id":["10.1080\/09537325.2020.1758655"],"URL":"https:\/\/doi.org\/10.1080\/09537325.2020.1758655","relation":{},"ISSN":["0953-7325","1465-3990"],"issn-type":[{"value":"0953-7325","type":"print"},{"value":"1465-3990","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ctas20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ctas20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-07-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-11","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}