Why Do Users Continue to Use Mobile Cloud Computing Applications? A Security-Privacy
暂无分享,去创建一个
[1] Victor R. Prybutok,et al. Sharing and storage behavior via cloud computing: Security and privacy in research and practice , 2018, Comput. Hum. Behav..
[2] Viswanath Venkatesh,et al. User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach , 2017, MIS Q..
[3] Edoardo M. Airoldi,et al. Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook , 2016, Inf. Syst. Res..
[4] Paul Benjamin Lowry,et al. Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications , 2016, AIS Trans. Hum. Comput. Interact..
[5] Fatemeh Zahedi,et al. Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China , 2016, MIS Q..
[6] David Gefen,et al. The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern , 2015, Eur. J. Inf. Syst..
[7] Yong Liu,et al. Modeling hedonic is continuance through the uses and gratifications theory: An empirical study in online games , 2015, Comput. Hum. Behav..
[8] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[9] Jörg Henseler,et al. Consistent Partial Least Squares Path Modeling , 2015, MIS Q..
[10] Ibrahim Arpaci,et al. Effects of security and privacy concerns on educational use of cloud services , 2015, Comput. Hum. Behav..
[11] Merrill Warkentin,et al. An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric , 2015, MIS Q..
[12] T. Aaron Gulliver,et al. ISPC: An Information Security, Privacy, and Compliance Readiness Model for Cloud Computing Services , 2014 .
[13] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[14] Frank Teuteberg,et al. The role of trust and risk perceptions in cloud archiving — Results from an empirical study , 2014 .
[15] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[16] Sandeep Sharma,et al. Secure Cloud Architecture for Preserving Privacy in Cloud Computing Using OTP/WTP , 2013 .
[17] S. K. Dubey,et al. Security and Privacy in Cloud Computing: A Survey , 2013 .
[18] Ting Li,et al. Willing to pay for quality personalization? Trade-off between quality and privacy , 2012, Eur. J. Inf. Syst..
[19] Kevin W. Hamlen,et al. AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[20] David C. Yen,et al. The effect of online privacy policy on consumer privacy concern and trust , 2012, Comput. Hum. Behav..
[21] Oliver Günther,et al. Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture , 2012, WI 2012.
[22] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[23] Heng Xu,et al. Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..
[24] Chechen Liao,et al. Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model , 2011, Electron. Commer. Res. Appl..
[25] Guiran Chang,et al. Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .
[26] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[27] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[28] Rathindra Sarathy,et al. Understanding Situational Online Information Disclosure as a Privacy Calculus , 2010, J. Comput. Inf. Syst..
[29] Roger Clarke,et al. Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..
[30] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[31] Ronald T. Cenfetelli,et al. Interpretation of Formative Measurement in Information Systems Research , 2009, MIS Q..
[32] Siani Pearson,et al. A Privacy Manager for Cloud Computing , 2009, CloudCom.
[33] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[34] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[35] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[36] Hock-Hai Teo,et al. The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..
[37] Vincenzo Russo,et al. Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..
[38] Robin L. Wakefield,et al. Mobile computing: a user study on hedonic/utilitarian mobile device usage , 2006, Eur. J. Inf. Syst..
[39] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[40] Hans van der Heijden,et al. User Acceptance of Hedonic Information Systems , 2004, MIS Q..
[41] M. Lindell,et al. Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.
[42] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[43] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[44] P. M. Podsakoff,et al. Self-Reports in Organizational Research: Problems and Prospects , 1986 .