Voter Intention to Use E-Voting Technologies: Security, Technology Acceptance, Election Type, and Political Ideology
暂无分享,去创建一个
[1] S. Jasanoff. Technologies of Humility: Citizen Participation in Governing Science , 2003 .
[2] Frederic I. Solop. Digital Democracy Comes of Age: Internet Voting and the 2000 Arizona Democratic Primary Election , 2001, PS: Political Science & Politics.
[3] Charles Perrow,et al. The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial, and Terrorist Disasters , 2007 .
[4] Kai R. T. Larsen,et al. Voting technology implementation , 1999, CACM.
[5] Paul Virilio,et al. The Information Bomb , 2000 .
[6] Wanda J. Orlikowski,et al. Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..
[7] R. Michael Alvarez,et al. Point, Click, and Vote - The Future of Internet Voting , 2003 .
[8] H. Riebeek. Brazil holds all-electronic national election , 2002 .
[9] John H. Grant,et al. Construct Measurement in Organizational Strategy Research: A Critique and Proposal , 1986 .
[10] Peter G. Neumann. Responsibilities of technologists , 2005, CACM.
[11] S. Bowler,et al. Democracy, Institutions and Attitudes about Citizen Influence on Government , 2002, British Journal of Political Science.
[12] Bruce Schneier,et al. Beyond fear - thinking sensibly about security in an uncertain world , 2003 .
[13] D. Gefen,et al. E-commerce: the role of familiarity and trust , 2000 .
[14] Wolter Pieters,et al. Internet Voting Not Impossible , 2005 .
[15] R. Michael Alvarez,et al. The Likely Consequences of Internet Voting for Political Representation , 2001 .
[16] Jonathan N. Wand,et al. The Butterfly Did It: The Aberrant Vote for Buchanan in Palm Beach County, Florida , 2001, American Political Science Review.
[17] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[18] France Bélanger,et al. The utilization of e‐government services: citizen trust, innovation and acceptance factors * , 2005, Inf. Syst. J..
[19] N. L. Chervany,et al. Initial Trust Formation in New Organizational Relationships , 1998 .
[20] France Bélanger,et al. Trust and Risk in eGovernment Adoption , 2008, AMCIS.
[21] M. Hilbert,et al. The Maturing Concept of E-Democracy: From E-Voting and Online Consultations to Democratic Value Out of Jumbled Online Chatter , 2009 .
[22] J. C. Thomas,et al. The New Face of Government: Citizen-Initiated Contacts in the Era of E-Government , 2003 .
[23] R. Michael Alvarez,et al. Electronic elections - the perils and promises of digital democracy , 2008 .
[24] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[25] Anish Bhimani,et al. Securing the commercial Internet , 1996, CACM.
[26] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[27] Young-Gul Kim,et al. Extending the TAM for a World-Wide-Web context , 2000, Inf. Manag..
[28] E. Frank Stephenson,et al. The Effect of Voting Technology on Voter Turnout: Do Computers Scare the Elderly? , 2005 .
[29] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[30] Carol L. Silva,et al. The Administrators of Democracy: A Research Note on Local Election Officials , 2008 .
[31] Kirsten Nussbaumer. Help America Vote Act of 2002 , 2008 .
[32] Aphra Kerr,et al. Conceptualising Trust: A Literature Review , 2008 .
[33] Detmar W. Straub,et al. The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..
[34] Richard F. Elmore,et al. Backward Mapping: Implementation Research and Policy Decisions , 1979 .
[35] Tabitha L. James,et al. Determining the antecedents of digital security practices in the general public dimension , 2013, Information Technology and Management.
[36] Helen Nissenbaum,et al. Will Security Enhance Trust Online, or Supplant It? , 2004 .
[37] W. Lazarus,et al. Online Content for Low-Income and Underserved Americans: The Digital Divide's New Frontier. A Strategic Audit of Activities and Opportunities. , 2000 .
[38] Gurpreet Dhillon,et al. Principles of information systems security - text and cases , 2006 .
[39] Donald P. Moynihan,et al. Building Secure Elections: E-Voting, Security, and Systems Theory , 2004 .
[40] Jane E. Fountain,et al. Electronic Government and Electronic Civics , 2003 .
[41] R. Michael Alvarez,et al. Election Fraud: Detecting and Deterring Electoral Manipulation , 2009 .
[42] Stephen Ansolabehere,et al. Residual Votes Attributable to Technology , 2005, The Journal of Politics.
[43] J. G. Payne,et al. Celebrity Spectacle Influence on Young Voters in the 2004 Presidential Campaign , 2007 .
[44] L. Atkeson,et al. The Effect of Election Administration on Voter Confidence: A Local Matter? , 2007, PS: Political Science & Politics.
[45] Xianggui Qu,et al. Multivariate Data Analysis , 2007, Technometrics.
[46] Dan S. Wallach,et al. Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[47] Brian F. Schaffner,et al. Digital Divide or Just Another Absentee Ballot? , 2008 .
[48] Martha Kropf,et al. Voided Ballots in the 1996 Presidential Election: A County-Level Analysis , 2003, The Journal of Politics.
[49] S. Dawes. The Evolution and Continuing Challenges of E-Governance , 2008 .
[50] Alexandros Xenakis. Using Business Process Re-engineering ( BPR ) for the Effective Administration of Electronic Voting , 2005 .
[51] Kelly D. Edmiston. State And Local E-Government , 2003 .
[52] Dan S. Wallach,et al. Hack-a-vote: Security issues with electronic voting systems , 2004, IEEE Security & Privacy Magazine.
[53] M. Wattenberg,et al. Parties without partisans : political change in advanced industrial democracies , 2000 .
[54] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[55] More evidence of the effects of voting technology on election outcomes , 2009 .
[56] Karl G. Jöreskog,et al. Lisrel 8: User's Reference Guide , 1997 .
[57] R. Gibson,et al. Elections Online: Assessing Internet Voting in Light of the Arizona Democratic Primary , 2001 .
[58] H. John Heinz,et al. Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots , 2004 .
[59] E RoskosJ,et al. A taxonomy of integrity models, implementations and mechanisms. , 1990 .
[60] R. Alvarez,et al. Are Americans Confident Their Ballots Are Counted? , 2008, The Journal of Politics.
[61] Yurong Yao,et al. Remote electronic voting systems: an exploration of voters' perceptions and intention to use , 2007, Eur. J. Inf. Syst..
[62] Charles P. Pfleeger,et al. Security in computing , 1988 .
[63] Charles Press,et al. Election Assistance Commission , 2012 .
[64] Justin Zhijun Zhan,et al. Privacy-Preserving Collaborative E-Voting , 2008, ISI Workshops.
[65] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[66] Norman L. Chervany,et al. What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..
[67] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[68] Ingoo Han,et al. The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce , 2003, Int. J. Electron. Commer..
[69] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..