Privacy concerns in the smart home context
暂无分享,去创建一个
Nadine Guhr | Michael H. Breitner | Oliver Werth | Philip Peter Hermann Blacha | M. Breitner | Nadine Guhr | O. Werth | P. Blacha
[1] France Bélanger,et al. The role of information systems research in shaping the future of information privacy , 2015, Inf. Syst. J..
[2] Martina Ziefle,et al. Smart Home Medical Technologies: Users’ Requirements for Conditional Acceptance , 2016, i-com.
[3] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[4] D. Whitten,et al. The Chief Information Security Officer: An Analysis of the Skills Required for Success , 2008, J. Comput. Inf. Syst..
[5] Michael H. Breitner,et al. Focusing the customer through smart services: a literature review , 2019, Electron. Mark..
[6] Rahmath Safeena,et al. Combination of TAM and TPB in Internet Banking Adoption , 2013 .
[7] Neil W. Bergmann,et al. IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..
[8] Yiwen Gao,et al. International Journal of Medical Informatics , 2016 .
[9] Ron Cottam,et al. Hierarchy and the Nature of Information , 2016, Inf..
[10] Zakaria Maamar,et al. Privacy-Aware Web Services in Smart Homes , 2009, ICOST.
[11] I. Ajzen. The theory of planned behavior , 1991 .
[12] M. Denscombe. The Good Research Guide: for small-scale social research projects , 1998 .
[13] Jiyun Kang,et al. A model of sustainable household technology acceptance , 2016 .
[14] Byoungsoo Kim,et al. An empirical investigation of mobile data service continuance: Incorporating the theory of planned behavior into the expectation-confirmation model , 2010, Expert Syst. Appl..
[15] Hangjung Zo,et al. Industrial Management & Data Systems , 2017 .
[16] Saonee Sarker,et al. Examination of the Determinants of Smart Meter Adoption: An User Perspective , 2012, ICIS.
[17] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[18] J. Webster,et al. Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .
[19] Paulo Rita,et al. Privacy concerns and online purchasing behaviour: Towards an integrated model , 2016 .
[20] Martin Wetzels,et al. Hierarchical latent variable models in PLS-SEM: guidelines for using reflective-formative type models , 2012 .
[21] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[22] N. Wünderlich,et al. Contrasting risk perceptions of technology-based service innovations in inter-organizational settings , 2016 .
[23] Ella Kolkowska. Privacy Principles in Design of Smart Homes Systems in Elderly Care , 2015, HCI.
[24] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[25] Wolfgang Kastner,et al. ThinkHome Energy Efficiency in Future Smart Homes , 2011, EURASIP J. Embed. Syst..
[26] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[27] L. Whitmarsh,et al. Social barriers to the adoption of smart homes , 2013 .
[28] José L. Roldán,et al. European management research using partial least squares structural equation modeling (PLS-SEM) , 2015 .
[29] E. Weber,et al. Cross‐Cultural Differences in Risk Perception: A Model‐Based Approach , 1997 .
[30] LinJudy Chuan-Chuan,et al. An empirical examination of consumer adoption of Internet of Things services , 2016 .
[31] Paul Benjamin Lowry,et al. security and privacy research lies , 2017 .
[32] Jason Bennett Thatcher,et al. Conceptualizing models using multidimensional constructs: a review and guidelines for their use , 2012, Eur. J. Inf. Syst..
[33] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[34] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[35] Nadine Guhr,et al. The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory , 2019, Inf. Syst. J..
[36] Yonghee Kim,et al. A study on the adoption of IoT smart home service: using Value-based Adoption Model , 2017 .
[37] Fred D. Davis,et al. A Model of the Antecedents of Perceived Ease of Use: Development and Test† , 1996 .
[38] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .
[39] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[40] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[41] Ricardo Neisse,et al. Security and privacy issues for an IoT based smart home , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[42] William Enck,et al. Defending Users against Smartphone Apps: Techniques and Future Directions , 2011, ICISS.
[43] Chuang Wang,et al. Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model , 2016, Inf. Syst. Res..
[44] P. Simpson,et al. Softlifting: A model of motivating factors , 1994 .
[45] Chin-Lung Hsu,et al. An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives , 2016, Comput. Hum. Behav..
[46] Mohamed Cheriet,et al. Attribute-Based Encryption for Preserving Smart Home Data Privacy , 2017, ICOST.
[47] Alexander Maedche,et al. Interaktion mit smarten Systemen — Aktueller Stand und zukünftige Entwicklungen im Bereich der Nutzerassistenz , 2017, Wirtschaftsinformatik Manag..
[48] Paul Jen-Hwa Hu,et al. Examining technology acceptance by school teachers: a longitudinal study , 2003, Inf. Manag..
[49] J. Edwards. Multidimensional Constructs in Organizational Behavior Research: An Integrative Analytical Framework , 2001 .
[50] Andrew M. Farrell,et al. Insufficient Discriminant Validity: A Comment on Bove, Pervan, Beatty and Shiu (2009) , 2008 .
[51] M. Sarstedt,et al. A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .
[52] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[53] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[54] Viswanath Venkatesh,et al. Technology adoption decisions in the household: A seven‐model comparison , 2014, J. Assoc. Inf. Sci. Technol..
[55] Au Vo,et al. Emerging Trends in Smart Home Security, Privacy, and Digital Forensics , 2016, AMCIS.
[56] Norman A. Johnson,et al. Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..
[57] F. Aldrich. Smart Homes: Past, Present and Future , 2003 .
[58] Alexander Maedche,et al. Advanced User Assistance Systems , 2016, Bus. Inf. Syst. Eng..
[59] Heather Patterson,et al. The Contextual Complexity of Privacy in Smart Homes and Smart Buildings , 2016, HCI.
[60] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[61] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[62] Liudmila Kokoulina,et al. Smart Services Classification Framework , 2015, FedCSIS.