Sharing and storage behavior via cloud computing: Security and privacy in research and practice
暂无分享,去创建一个
[1] V. Ratten. A US-China comparative study of cloud computing adoption behavior , 2014 .
[2] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[3] John H. Grant,et al. Construct Measurement in Organizational Strategy Research: A Critique and Proposal , 1986 .
[4] Sung Yul Ryoo,et al. An empirical investigation of end-users' switching toward cloud computing: A two factor theory perspective , 2013, Comput. Hum. Behav..
[5] E. Oster,et al. DETERMINANTS OF TECHNOLOGY ADOPTION: PEER EFFECTS IN MENSTRUAL CUP TAKE-UP , 2012 .
[6] Suha AlAwadhi,et al. The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[7] Garry L. White. Education and Prevention Relationships on Security Incidents for Home Computers , 2015, J. Comput. Inf. Syst..
[8] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[9] J. Hair. Multivariate data analysis : a global perspective , 2010 .
[10] Andree E. Widjaja,et al. Using Cloud Computing Service: A Perspective from Users’ Information Security, Privacy Concern, and Trust , 2012 .
[11] E. Straub. Understanding Technology Adoption: Theory and Future Directions for Informal Learning , 2009 .
[12] George Pallis,et al. Cloud Computing: The New Frontier of Internet Computing , 2010, IEEE Internet Computing.
[13] Jeanna Neefe Matthews,et al. The good, the bad and the ugly of consumer cloud storage , 2010, OPSR.
[14] Gary B. Wills,et al. An Overview of Cloud Services Adoption Challenges in Higher Education Institutions , 2015, ESaaSA@CLOSER.
[15] E. Carvajal-Trujillo,et al. Online purchasing tickets for low cost carriers: An application of the unified theory of acceptance and use of technology (UTAUT) model , 2014 .
[16] Mika Immonen,et al. Evolution of technology perceptions over time , 2015, Inf. Technol. People.
[17] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[18] Yeoh Sok Foon,et al. Internet Banking Adoption in Kuala Lumpur: An Application of UTAUT Model , 2011 .
[19] J. Scott Armstrong,et al. Estimating nonresponse bias in mail surveys. , 1977 .
[20] Anol Bhattacherjee,et al. Why end-users move to the cloud: a migration-theoretic analysis , 2014, Eur. J. Inf. Syst..
[21] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[22] Ekaba Bisong. What Is Cloud Computing , 2019 .
[23] Nabil Sultan,et al. loud computing for education : A new dawn ? , 2009 .
[24] Tuncay Ercan,et al. Effective use of cloud computing in educational institutions , 2010 .
[25] Victor R. Prybutok,et al. Product quality vs service quality in the mobile industry: Is there a dominant driver of customer intention to switch providers? , 2014, Operations Management Research.
[26] Eunil Park,et al. An Integrated Adoption Model of Mobile Cloud Services: Exploration of Key Determinants and Extension of Technology Acceptance Model , 2014, Telematics Informatics.
[27] Himani,et al. A Concern towards Data Security in Cloud Computing , 2015 .
[28] Ab Razak Che Hussin,et al. The Organizational Critical Success Factors for Adopting Cloud Computing in SMEs , 2013 .
[29] Ibrahim Arpaci,et al. Understanding and predicting students' intention to use mobile cloud storage services , 2016, Comput. Hum. Behav..
[30] Annie I. Antón,et al. Examining Internet privacy policies within the context of user privacy values , 2005, IEEE Transactions on Engineering Management.
[31] M. Rosenzweig,et al. Microeconomics of Technology Adoption. , 2010, Annual review of economics.
[32] Peter A. Todd,et al. Assessing IT usage: the role of prior experience , 1995 .
[33] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[34] Ibrahim Arpaci,et al. Effects of security and privacy concerns on educational use of cloud services , 2015, Comput. Hum. Behav..
[35] T. Oliveira,et al. Information technology adoption models at firm level: review of literature. , 2010 .
[36] Tiago Oliveira,et al. Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors , 2014, Inf. Manag..
[37] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[38] Douglas R. Vogel,et al. Predicting user acceptance of collaborative technologies: An extension of the technology acceptance model for e-learning , 2013, Comput. Educ..
[39] Kai-Ying Chen,et al. User acceptance of ‘near field communication’ mobile phone service: an investigation based on the ‘unified theory of acceptance and use of technology’ model , 2013 .
[40] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[41] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[42] K. Jöreskog,et al. Intraclass Reliability Estimates: Testing Structural Assumptions , 1974 .
[43] H. Harman. Modern factor analysis , 1961 .
[44] Robin L. Wakefield. The Acceptance and Use of Innovative Technology: Do Positive and Negative Feelings Matter? , 2015, DATB.
[45] Viswanath Venkatesh,et al. Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..
[46] N. Kshetri. Privacy and security issues in cloud computing: The role of institutions and institutional evolution , 2013 .
[47] Gavriel Salvendy,et al. Perceived security determinants in e-commerce among Turkish university students , 2005, Behav. Inf. Technol..
[48] Ali Sunyaev,et al. Trust in Cloud Computing: Conceptual Typology and Trust-Building Antecedents , 2016, DATB.