Explaining the Role of Trust in Cloud Service Acquisition
暂无分享,去创建一个
[1] E. Deci,et al. Self-determination in a work organization. , 1989 .
[2] Maria Dolores C. Tongco,et al. Purposive Sampling as a Tool for Informant Selection , 2007 .
[3] R. Hinson,et al. Internet banking: an initial look at Ghanaian Bank Consumer Perceptions , 2008 .
[4] Thomas H. Jerdee,et al. Influence of subordinate characteristics on trust and use of participative decision strategies in a management simulation. , 1977 .
[5] Henning Olesen,et al. Keeping Identity Private , 2011, IEEE Vehicular Technology Magazine.
[6] Mark de Reuver,et al. Mobile cloud computing: state of the art and outlook , 2013 .
[7] Ruth Ann Hattori,et al. Collaboration, trust and innovative change , 2004 .
[8] Stuart Hannabuss,et al. The Big Switch: Rewiring the World, from Edison to Google , 2009 .
[9] Jan Camenisch,et al. Information privacy?! , 2012, Comput. Networks.
[10] Etienne Wenger,et al. Situated Learning: Legitimate Peripheral Participation , 1991 .
[11] Donna L. Hoffman,et al. Bridging the Digital Divide: The Impact of Race on Computer Access and Internet Use. , 1998 .
[12] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[13] Thompson S. H. Teo,et al. Citizen Trust Development for E-Government Adoption and Usage: Insights from Young Adults in Singapore , 2009, Commun. Assoc. Inf. Syst..
[14] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[15] Siani Pearson,et al. A client-based privacy manager for cloud computing , 2009, COMSWARE '09.
[16] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[17] K. Weick. The social psychology of organizing , 1969 .
[18] Rowena Cullen,et al. Addressing the digital divide , 2001, Online Inf. Rev..
[19] Madjid Merabti,et al. Secure Cloud Computing for Critical Infrastructure: A Survey , 2012 .
[20] M. Brian Blake,et al. Service-Oriented Computing and Cloud Computing: Challenges and Opportunities , 2010, IEEE Internet Computing.
[21] J. Adjei. Towards a trusted national identities framework , 2013 .
[22] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[23] R. Schaller,et al. Moore's law: past, present and future , 1997 .
[24] E. Murphy,et al. A proposed cooperation framework for organisations and their leaders , 2012 .
[25] T. Grance,et al. SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .
[26] Diego Gambetta. Can We Trust Trust , 2000 .
[27] Milton L. Mueller,et al. Digital Convergence and its Consequences , 1999 .
[28] Byungjoo Park,et al. Future Directions of Information and Telecommunication Systems Through the Technological Advancement Convergence , 2013 .
[29] Ann Cavoukian,et al. Privacy in the clouds , 2008 .
[30] Christine Nadel,et al. Case Study Research Design And Methods , 2016 .
[31] J. Lewis,et al. Trust as a Social Reality , 1985 .
[32] Peter F. Green,et al. On governance structures for cloud resources and assessing their effectiveness , 2013 .
[33] Li Jiang,et al. Trust and Electronic Government Success: An Empirical Study , 2008, J. Manag. Inf. Syst..
[34] Denzil Ferreira,et al. Ubiquitous mobile instrumentation , 2013, UbiComp.
[35] R. Burt. The contingent value of social capital. , 1997 .