A nomological model of RFID privacy concern
暂无分享,去创建一个
Victor R. Prybutok | Chang E. Koh | Yu Andy Wu | Bartlomiej Hanus | Y. Wu | V. Prybutok | C. Koh | Bartlomiej Hanus
[1] Fred H. Cate,et al. Privacy in the Information Age , 1997 .
[2] Akemi Takeoka Chatfield,et al. A contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments , 2009, Eur. J. Inf. Syst..
[3] Christine Perakslis,et al. Social acceptance of RFID as a biometric security method , 2006, IEEE Technology and Society Magazine.
[4] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[5] Jens Strüker,et al. RFID adoption and the role of organisational size , 2010, Bus. Process. Manag. J..
[6] Detmar W. Straub,et al. Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..
[7] Stefan Seuring,et al. From a literature review to a conceptual framework for sustainable supply chain management , 2008 .
[8] Sonja Grabner-Kräuter,et al. Consumer acceptance of internet banking: the influence of internet trust , 2008 .
[9] Pauline Ratnasingam. The impact of collaborative commerce and trust in Web services , 2004, J. Enterp. Inf. Manag..
[10] Yuzhu Li,et al. Interorganisational trust in B2B commerce , 2009, Int. J. Netw. Virtual Organisations.
[11] P. Ring,et al. Developmental Processes of Cooperative Interorganizational Relationships , 1994 .
[12] Susan K. Lippert,et al. Human resource information systems (HRIS) and technology trust , 2005, J. Inf. Sci..
[13] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[14] G. Scott Erickson,et al. International Aspects of Radio Frequency Identification Tags: Different Approaches to Bridging the Technology/Privacy Divide , 2007 .
[15] Sung-Hee Jang. Effect of Purchase Intention of Location-Based Services: Focused on Privacy-Trust-Behavioral Intention Model , 2014 .
[16] Rafael Accorsi,et al. Personalization in privacy-aware highly dynamic systems , 2006, CACM.
[17] Frédéric Thiesse,et al. RFID, privacy and the perception of risk: A strategic framework , 2007, J. Strateg. Inf. Syst..
[18] Selwyn Piramuthu,et al. Challenges associated with RFID tag implementations in supply chains , 2009, Eur. J. Inf. Syst..
[19] Jack R. Meredith,et al. Theory Building through Conceptual Methods , 1993 .
[20] Richard D. Johnson,et al. Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..
[21] Regina Connolly,et al. Empirical Research on Technology-Related Privacy Concerns: A Review and Critical Assessment , 2008, ECIS.
[22] R. Bunduchi,et al. The costs of adoption of RFID technologies in supply networks , 2010 .
[23] Qing Hu,et al. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..
[24] Irvine Clarke,et al. RFID and Consumer Privacy , 2008 .
[25] Kenneth W. Goodman,et al. Chips, tags and scanners: Ethical challenges for radio frequency identification , 2007, Ethics and Information Technology.
[26] Pauline Ratnasingam. The importance of technology trust in Web services security , 2002, Inf. Manag. Comput. Secur..
[27] Seung-Jun Yeon,et al. RFID based ubiquitous commerce and consumer trust , 2007, Ind. Manag. Data Syst..
[28] Victor R. Prybutok,et al. Consumer Acceptance of RFID Technology: An Exploratory Study , 2008, IEEE Transactions on Engineering Management.
[29] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[30] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[31] Dag Slettemeås,et al. RFID—the “Next Step” in Consumer–Product Relations or Orwellian Nightmare? Challenges for Research and Policy , 2009 .
[32] Ganesh Vaidyanathan,et al. Effectiveness and Efficiency of RFID technology in Supply Chain Management: Strategic values and Challenges , 2008, J. Theor. Appl. Electron. Commer. Res..
[33] John P. T. Mo,et al. RFID implementation with virtual infrastructures , 2010, Bus. Process. Manag. J..
[34] Pawel Rotter,et al. RFID implants: Opportunities and and challenges for identifying people , 2008, IEEE Technology and Society Magazine.
[35] Mohan V. Tatikonda,et al. Radio Frequency Identification and the Ethics of Privacy , 2007 .
[36] Oliver Günther,et al. RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.
[37] Frank Thornton,et al. RFID Security , 2005 .
[38] D. C. Twist,et al. The impact of radio frequency identification on supply chain facilities , 2005 .
[39] Susan K. Lippert,et al. A supply chain study of technology trust and antecedents to technology internalization consequences , 2006 .
[40] W. Ryan,et al. Privacy and freedom: Alan F. Westin Atheneum Publishers, $10 , 1967 .
[41] P. Ratnasingam. E‐Commerce relationships: The impact of trust on relationship continuity , 2005 .
[42] T. Graeff,et al. Collecting and using personal data: consumers’ awareness and concerns , 2002 .
[43] David M. Wasieleski,et al. An enquiry into the ethical efficacy of the use of radio frequency identification technology , 2008, Ethics and Information Technology.
[44] Tony Yu-Ju Tu,et al. Reducing False Reads in RFID-Embedded Supply Chains , 2008, J. Theor. Appl. Electron. Commer. Res..
[45] Susan K. Lippert. Investigating Postadoption Utilization: An Examination Into the Role of Interorganizational and Technology Trust , 2007, IEEE Transactions on Engineering Management.
[46] Scott P. Muir. RFID security concerns , 2007, Libr. Hi Tech.
[47] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[48] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[49] A. Zaheer,et al. Does Trust Matter? Exploring the Effectsof Interorganizational and Interpersonaltrust on Performance , 1998 .
[50] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[51] Dennis Brown. RFID Implementation , 2006 .
[52] Jonathan D. Linton,et al. The challenge of cyber supply chain security to research and practice – An introduction , 2014 .
[53] Simson L. Garfinkel,et al. RFID: Applications, Security, and Privacy , 2005 .
[54] Selwyn Piramuthu,et al. RFID and Information Security in Supply Chains , 2008, 2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks.
[55] Jack R. Meredith,et al. A Longitudinal Study of the Role of Manufacturing Technology in Business Strategy , 1993 .
[56] Rebecca Angeles,et al. Rfid Technologies: Supply-Chain Applications and Implementation Issues , 2004, Inf. Syst. Manag..
[57] Nabil Y. Razzouk,et al. Consumer Concerns regarding Rfid Privacy: An Empirical Study , 2008 .
[58] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[59] Joseph Barjis,et al. Organizational and business impacts of RFID technology , 2010, Bus. Process. Manag. J..
[60] Fataneh Taghaboni-Dutta,et al. RFID Technology Is Revolutionary: Who Should Be Involved in this Game of Tag? , 2006 .
[61] David C. Wyld,et al. Would you like chips with that?: consumer perspectives of RFID , 2004 .
[62] Joseph A. Cazier,et al. The Impact of Consumer Perceptions of Information Privacy and Security Risks on the Adoption of Residual RFID Technologies , 2008, Commun. Assoc. Inf. Syst..
[63] Katerina Pramatari,et al. Consumer acceptance of RFID-enabled services: a model of multiple attitudes, perceived system characteristics and individual traits , 2009, Eur. J. Inf. Syst..
[64] Katina Michael,et al. Privacy-value-control harmonization for RFID adoption in retail , 2009, IBM J. Res. Dev..
[65] Yingjiu Li,et al. Protecting RFID communications in supply chains , 2007, ASIACCS '07.
[66] R. Lamming,et al. Supply management: is it a discipline? , 2006 .
[67] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.