暂无分享,去创建一个
[1] Daniel Baier,et al. Acceptance of recommendations to buy in online retailing , 2009 .
[2] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[3] Marco Gruteser,et al. USENIX Association , 1992 .
[4] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[5] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[6] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[7] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[8] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[9] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[10] Marko Sarstedt,et al. PLS-SEM: Looking Back and Moving Forward , 2014 .
[11] Cristian Morosan,et al. Users’ perceptions of two types of hotel reservation Web sites , 2008 .
[12] Olivia R. Liu Sheng,et al. Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology , 1999, J. Manag. Inf. Syst..
[13] Lars Kulik,et al. Location privacy and location-aware computing , 2006 .
[14] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..