Blockchain adoption: A study of cognitive factors underpinning decision making
暂无分享,去创建一个
[1] Diane Dolezel,et al. Information Security Policy Non-Compliance: Can Capitulation Theory Explain User Behaviors? , 2021, Computers & Security.
[2] Julian Szymanski,et al. Blockchain technologies to address smart city and society challenges , 2021, Comput. Hum. Behav..
[3] Zach W. Y. Lee,et al. Blockchain technology and trust relationships in trade finance , 2021 .
[4] Lyn E. Pleger,et al. Making public concerns tangible: An empirical study of German and UK citizens' perception of data protection and data security , 2021, Comput. Hum. Behav..
[5] Emilio Esposito,et al. Surfing blockchain wave, or drowning? Shaping the future of distributed ledgers and decentralized technologies , 2021 .
[6] Vikas Kumar,et al. A machine learning based approach for predicting blockchain adoption in supply Chain , 2020, Technological Forecasting and Social Change.
[7] Shahryar Ghorbani,et al. Expert oriented approach for analyzing the blockchain adoption barriers in humanitarian supply chain , 2020 .
[8] Irman Hermadi,et al. Preliminary User Studies on Consumer Perception Towards Blockchain-Based Livestock Traceability Platform in Indonesia: An Implication to Design , 2020, 2020 International Conference on Computer Science and Its Application in Agriculture (ICOSICA).
[9] Schahram Dustdar,et al. COM-PACE: Compliance-Aware Cloud Application Engineering Using Blockchain , 2020, IEEE Internet Computing.
[10] Donncha Kavanagh,et al. Cryptocurrencies and the emergence of blockocracy , 2020, Inf. Soc..
[11] J. Rho,et al. Accepting financial transactions using blockchain technology and cryptocurrency: A customer perspective approach , 2020 .
[12] Marijn Janssen,et al. Blockchain for next generation services in banking and finance: cost, benefit, risk and opportunity analysis , 2020, J. Enterp. Inf. Manag..
[13] Primavera De Filippi,et al. Blockchain as a confidence machine: The problem of trust & challenges of governance , 2020, Technology in Society.
[14] Merrill Warkentin,et al. Using the security triad to assess blockchain technology in public sector applications , 2020, Int. J. Inf. Manag..
[15] Meikang Qiu,et al. Differential Privacy-Based Blockchain for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.
[16] Stefan Tönnissen,et al. Analysing the impact of blockchain-technology for operations and supply chain management: An explanatory model drawn from multiple case studies , 2020, Int. J. Inf. Manag..
[17] Rajiv Sabherwal,et al. Mobile application security: Role of perceived privacy as the predictor of security perceptions , 2020, Int. J. Inf. Manag..
[18] Shanshan Dai,et al. Will concerns for ski tourism promote pro‐environmental behaviour? An implication of protection motivation theory , 2020, International Journal of Tourism Research.
[19] Yogesh Kumar Dwivedi,et al. Blockchain technology for enhancing swift-trust, collaboration and resilience within a humanitarian supply chain setting , 2020, Int. J. Prod. Res..
[20] Vishanth Weerakkody,et al. A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factors , 2020, Int. J. Inf. Manag..
[21] Pierfrancesco Bellini,et al. Smart City IoT Platform Respecting GDPR Privacy and Security Aspects , 2020, IEEE Access.
[22] Omer Rana,et al. Enhancing User Privacy in IoT: Integration of GDPR and Blockchain , 2019, BlockSys.
[23] Yogesh Kumar Dwivedi,et al. Blockchain research, practice and policy: Applications, benefits, limitations, emerging research themes and research agenda , 2019, Int. J. Inf. Manag..
[24] Don D.H. Shin,et al. Blockchain: The emerging technology of digital trust , 2019, Telematics Informatics.
[25] Peter Andras,et al. User perception of Bitcoin usability and security across novice users , 2019, Int. J. Hum. Comput. Stud..
[26] Byeong Ho Kang,et al. A Survey on Blockchain-Based Internet Service Architecture: Requirements, Challenges, Trends, and Future , 2019, IEEE Access.
[27] Jeannette Paschen,et al. How blockchain technologies impact your business model , 2019, Business Horizons.
[28] Jiafu Wan,et al. A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory , 2019, IEEE Transactions on Industrial Informatics.
[29] Gerhard Schwabe,et al. Exploring Blockchain Value Creation: The Case of the Car Ecosystem , 2019, HICSS.
[30] Stephen Boyle,et al. The impact of security awarness on information technology professionals' behavior , 2018, Comput. Secur..
[31] Paul van Schaik,et al. Testing a model of precautionary online behaviour: The case of online banking , 2018, Comput. Hum. Behav..
[32] Madini O. Alassafi,et al. Blockchain with Internet of Things: Benefits, Challenges, and Future Directions , 2018, International Journal of Intelligent Systems and Applications.
[33] Suling Jia,et al. Digital enablement of blockchain: Evidence from HNA group , 2018, Int. J. Inf. Manag..
[34] Frederick T. Sheldon,et al. Blockchain: properties and misconceptions , 2017 .
[35] Xiwei Xu,et al. Adaptable Blockchain-Based Systems: A Case Study for Product Traceability , 2017, IEEE Software.
[36] N. Kshetri. Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .
[37] Benedikt Notheisen,et al. Trading Real-World Assets on Blockchain , 2017, Business & Information Systems Engineering.
[38] Robert E. Crossler,et al. User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory , 2017, J. Manag. Inf. Syst..
[39] Savvas Papagiannidis,et al. The influence of prior knowledge structures on website attitudes and behavioral intentions , 2017, Comput. Hum. Behav..
[40] Pierluigi Cuccuru,et al. Beyond bitcoin: an early overview on smart contracts , 2017, Int. J. Law Inf. Technol..
[41] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[42] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[43] Ben A. Amaba,et al. Blockchain technology innovations , 2017, 2017 IEEE Technology & Engineering Management Conference (TEMSCON).
[44] Jon D. Elhai,et al. Anxiety about electronic data hacking: Predictors and relations with digital privacy protection behavior , 2017, Internet Res..
[45] Charlie Wilson,et al. Benefits and risks of smart home technologies , 2017 .
[46] Ariel M. Aloe,et al. Extracting the Variance Inflation Factor and Other Multicollinearity Diagnostics from Typical Regression Results , 2017 .
[47] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[48] Ingo Weber,et al. New kids on the block: an analysis of modern blockchains , 2016, ArXiv.
[49] Robert LaRose,et al. Understanding online safety behaviors: A protection motivation theory perspective , 2016, Comput. Secur..
[50] Francisco J. Liébana-Cabanillas,et al. Determinants of the intention to use NFC technology as a payment system: an acceptance model approach , 2015, Information Systems and e-Business Management.
[51] Yu Andy Wu,et al. Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective , 2016, Inf. Syst. Manag..
[52] Francisco J. Liébana-Cabanillas,et al. User behaviour in QR mobile payment system: the QR Payment Acceptance Model , 2015, Technol. Anal. Strateg. Manag..
[53] A. Hayes. An Index and Test of Linear Moderated Mediation , 2015, Multivariate behavioral research.
[54] Grant Packard,et al. Compensatory Knowledge Signaling in Consumer Word-of-Mouth , 2013 .
[55] Mikko T. Siponen,et al. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..
[56] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[57] Princely Ifinedo,et al. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..
[58] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[59] Yajiong Xue,et al. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..
[60] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[61] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[62] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[63] Robert P. Minch,et al. Application of Protection Motivation Theory to Adoption of Protective Technologies , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[64] G. Latham,et al. The Effect of Training in Verbal Self-Guidance on the Self-Efficacy and Performance of Native North Americans in the Selection Interview. , 2006 .
[65] Mun Y. Yi,et al. Understanding information technology acceptance by individual professionals: Toward an integrative view , 2006, Inf. Manag..
[66] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[67] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[68] Richard A. Posthuma,et al. Predictors of self-efficacy for cognitive ability employment testing , 2005 .
[69] Vallabh Sambamurthy,et al. Sources of Influence on Beliefs about Information Technolgoy Use: An Empirical Study of Knowledge Workers , 2003, MIS Q..
[70] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[71] Paul A. Pavlou,et al. Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..
[72] Jacky Swan,et al. A knowledge‐focused perspective on the diffusion and adoption of complex information technologies: the BPR example , 2000, Inf. Syst. J..
[73] R. W. Rogers,et al. A meta-analysis of research on protection motivation theory. , 2000 .
[74] L. Flynn,et al. A Short, Reliable Measure of Subjective Knowledge , 1999 .
[75] Ritu Agarwal,et al. A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology , 1998, Inf. Syst. Res..
[76] David L. Mothersbaugh,et al. Consumer Knowledge Assessment , 1994 .
[77] Peter Wright,et al. The Persuasion Knowledge Model: How People Cope with Persuasion Attempts , 1994 .
[78] Marilyn E. Gist,et al. Self-Efficacy: A Theoretical Analysis of Its Determinants and Malleability , 1992 .
[79] A. Bandura,et al. Tests of the generality of self-efficacy theory , 1980, Cognitive Therapy and Research.
[80] R W Rogers,et al. Fear appeals and attitude change: effects of a threat's noxiousness, probability of occurrence, and the efficacy of coping responses. , 1976, Journal of personality and social psychology.
[81] Savvas Papagiannidis,et al. Blockchain in a Business Model: Exploring Benefits and Risks , 2021, I3E.
[82] Pia V. Ingold,et al. Resume = Resume? The effects of blockchain, social media, and classical resumes on resume fraud and applicant reactions to resumes , 2021, Comput. Hum. Behav..
[83] Manjul Gupta,et al. The effects of individual-level espoused national cultural values on the willingness to use Bitcoin-like blockchain currencies , 2021, Int. J. Inf. Manag..
[84] S. Folkman,et al. Stress: Appraisal and Coping , 2020, Encyclopedia of Behavioral Medicine.
[85] Alexander J. McLeod,et al. Toward Security Capitulation Theory , 2020, AMCIS.
[86] Hany F. Atlam,et al. Chapter One - Technical aspects of blockchain and IoT , 2019, Adv. Comput..
[87] M. Sethumadhavan,et al. Survey of consensus protocols on blockchain applications , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).
[88] Roman Beck,et al. Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.
[89] Douglas G. Bonett,et al. Cronbach's alpha reliability: Interval estimation, hypothesis testing, and sample size planning , 2015 .
[90] Younghwa Lee,et al. Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective , 2011, Decis. Support Syst..
[91] Irene Woon,et al. A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.
[92] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[93] E. Seydel,et al. Protection Motivation Theory , 2022 .