Antecedents of Security Pillars in E-Commerce Applications
暂无分享,去创建一个
[1] Sungjune Park,et al. Understanding the Value of Countermeasure Portfolios in Information Systems Security , 2008, J. Manag. Inf. Syst..
[2] Varun Grover,et al. The Relationship of E-Commerce Competence to Customer Value and Firm Performance: An Empirical Investigation , 2005, J. Manag. Inf. Syst..
[3] Ralf Steinmetz,et al. Vulnerabilities and Security Limitations of current IP Telephony Systems , 2001, Communications and Multimedia Security.
[4] C. Higgins,et al. Work-family conflict in the dual-career family , 1992 .
[5] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[6] John Hulland,et al. Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .
[7] L. L. Cummings,et al. The Organizational Trust Inventory (OTI): Development and validation. , 1996 .
[8] Chong-Sun Hwang,et al. Wireless Data Broadcast Schemes for Location-Dependent Information Services Under a Geometric Location Model , 2005, Int. J. Bus. Data Commun. Netw..
[9] P. Evans,et al. Strategy and the new economics of information. , 1997, Harvard business review.
[10] Janet R. McColl-Kennedy,et al. The relationship between Internet use and perceived performance in retail and professional service firms , 2003 .
[11] Samir Chatterjee,et al. International Journal of Business Data Communications and Networking , 2010 .
[12] Alan D. Smith,et al. Linking the Popularity of Online Trading with Consumers' Concerns for Reputation and Identity Theft , 2011, Int. J. Bus. Data Commun. Netw..
[13] J. Birkinshaw,et al. Structural and competitive determinants of a global integration strategy , 1995 .
[14] Jaume Ramis,et al. Cross-Layer Design, Analysis, and Optimization of QoS-Constrained AMC/ARQ-Based Wireless Networks , 2012 .
[15] Kenneth C. Laudon,et al. E-Commerce: Business, Technology, Society (3rd Edition) , 2006 .
[16] M. Zairi,et al. Global benchmarking for internet and e‐commerce applications , 2006 .
[17] Albert H. Segars,et al. Assessing the unidimensionality of measurement : a paradigm and illustration within the context of information systems research , 1997 .
[18] Paul J. Hart,et al. Power and Trust: Critical Factors in the Adoption and Use of Electronic Data Interchange , 1997 .
[19] Adrian B. Ryans,et al. Entry Strategy and Long-Term Performance: Conceptualization and Empirical Examination , 1995 .
[20] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[21] H. Wold. Systems Analysis by Partial Least Squares , 1983 .
[22] Alex Sheshunoff. Internet Banking-An Update from the Frontlines , 2000 .
[23] Ali Hussein Saleh Zolait,et al. A Study on the Internet Security and its Implication for E-Commerce in Yemen , 2010, Int. J. Technol. Diffusion.
[24] Charles Parker. E‐mail use and abuse , 1999 .
[25] Cesar Garcia Diaz,et al. Business data communications and networking: A research perspective , 2007 .
[26] Karen A. Forcht,et al. Security considerations of doing business via the Internet: cautions to be considered , 1997, Internet Res..
[27] Hossein Saiedian,et al. Understanding and Reducing Web Delays , 2001, Computer.
[28] Alexander Hars,et al. Web Based Knowledge Infrastructures for the Sciences: An Adaptive Document , 2000, Commun. Assoc. Inf. Syst..
[29] Mark Ciampa,et al. Security+ Guide to Networking Security Fundamentals, Second Edition , 2004 .
[30] Dan Shoemaker,et al. Information Assurance for the Enterprise: A Roadmap to Information Security , 2006 .
[31] Eduardo B. Fernandez,et al. The Authenticator Pattern , 1999 .
[32] Karen A. Forcht,et al. Security issues and concerns with the Internet , 1995, Internet Res..
[33] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[34] Henri Barki,et al. Explaining the Role of User Participation in Information System Use , 1994 .
[35] Mohammad Shikh-Bahaei,et al. Self-Organization and Green Applications in Cognitive Radio Networks , 2013 .