RFID in retail: a framework for examining consumers' ethical perceptions
暂无分享,去创建一个
[1] Sugata Sanyal,et al. Information Assurance and Security , 2005, J. Univers. Comput. Sci..
[2] D. Collard,et al. Trust : making and breaking cooperative relations , 1989 .
[3] R. Kramer,et al. Trust in Organizations: Frontiers of Theory and Research , 1995 .
[4] Peter Jones,et al. The benefits, challenges and impacts of radio frequency identification technology (RFID) for retailers in the UK , 2005 .
[5] C. Colwill,et al. Information Assurance , 2001 .
[6] Gregory J. Pottie,et al. Privacy in the global e-village , 2004, CACM.
[7] Alan Robert Peslak,et al. An Ethical Exploration of Privacy and Radio Frequency Identification , 2005 .
[8] David Wyld,et al. RFID 101: The Next Big Thing for Management , 2006, IEEE Engineering Management Review.
[9] K. Vohs,et al. Self-regulation and the extended now: controlling the self alters the subjective experience of time. , 2003, Journal of personality and social psychology.
[10] Lori N. K. Leonard,et al. Attitude toward ethical behavior in computer use: a shifting model , 2005, Ind. Manag. Data Syst..
[11] Dan M. Kahan,et al. The Secret Ambition of Deterrence , 1999, Deterrence.
[12] Ken Reich. FDA is taking baby steps toward an RFID mandate , 2006 .
[13] H. Markus,et al. Culture and the self: Implications for cognition, emotion, and motivation. , 1991 .
[14] David B. Montgomery,et al. Deterrence, reputations and competitive cognition , 1993 .
[15] D. V. Poel,et al. Consumer Acceptance of the Internet as a Channel of Distribution , 1999 .
[16] Peter M. Gollwitzer,et al. From weighing to willing: Approaching a change decision through pre- or postdecisional mentation , 1990 .
[17] Robert J. Kauffman,et al. Making the ‘MOST’ out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID , 2007, Inf. Technol. Manag..
[18] Ryan E Rhodes,et al. Ethnicity and the theory of planned behavior in the exercise domain. , 2003, American journal of health behavior.
[19] R. Mason. Four ethical issues of the information age , 1986 .
[20] J. R. Williams,et al. A practical approach to measuring assurance , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[21] Michael D. McDonald,et al. Putting Severity of Punishment Back in the Deterrence Package , 2001 .
[22] Alex R. Piquero,et al. An Application of Stafford and Warr's Reconceptualization of Deterrence to Drinking and Driving , 1998 .
[23] Richard T. DeGeorge,et al. The Ethics of Information Technology and Business , 2002 .
[24] Carlos Flavián,et al. Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..
[25] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[26] David C. Wyld,et al. Would you like chips with that?: consumer perspectives of RFID , 2004 .
[27] Motoki Watabe,et al. Uncertainty, Trust, and Commitment Formation in the United States and Japan1 , 1998, American Journal of Sociology.
[28] Cathleen A. Berrick. AVIATION SECURITY: EFFORTS TO MEASURE EFFECTIVENESS AND STRENGTHEN SECURITY PROGRAMS , 2003 .
[29] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[30] J. H. Davis,et al. An integrative model of organizational trust, Academy of Management Review, : . , 1995 .
[31] Bruce Eckfeldt,et al. What does RFID do for the consumer? , 2005, CACM.
[32] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[33] Christer Carlsson,et al. Adoption of 3G+ services in Finland , 2006, Int. J. Mob. Commun..
[34] Suvojit Choton Basu,et al. Information Assurance Technical Framework and End User Information Ownership: A Critical Analysis , 2005 .
[35] R. E. Miles,et al. Causes of Failure in Network Organizations , 1992 .
[36] Charles R. Tittle,et al. Gender and Perceived Chances of Arrest , 1981 .
[37] Colin Camerer,et al. Not So Different After All: A Cross-Discipline View Of Trust , 1998 .
[38] Binshan Lin,et al. RFID tags: privacy and security aspects , 2005, Int. J. Mob. Commun..
[39] I. Ajzen. The theory of planned behavior , 1991 .
[40] Jürgen Beckmann,et al. Dissonance and Action Control , 1985 .
[41] N. L. Chervany,et al. Initial Trust Formation in New Organizational Relationships , 1998 .
[42] Oliver Günther,et al. RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.
[43] Nancy Cantor,et al. Personal construal of life tasks: Those who struggle for independence , 1990 .
[44] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[45] Allen M. Weiss,et al. Vendor Consideration and Switching Behavior for Buyers in High-Technology Markets , 1995 .
[46] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[47] Diego Gambetta. Trust : making and breaking cooperative relations , 1992 .
[48] Meg McGinity. RFID: is this game of tag fair play? , 2004 .
[49] Sally S. Simpson,et al. Corporate Crime, Law, and Social Control , 2002 .
[50] Shelley E. Taylor,et al. Social cognition, 2nd ed. , 1991 .
[51] Bernd Carsten Stahl,et al. Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? , 2004, J. Organ. End User Comput..
[52] Giles D'Souza,et al. Antecedents and consequences of consumer privacy concerns: An empirical investigation , 2001 .
[53] Dennis Longley,et al. Data & Computer Security: Dictionary of Standards Concepts and Terms , 1987 .
[54] Timothy Paul Cronan,et al. Have you met your organization's computer usage policy? , 2005, Ind. Manag. Data Syst..
[55] SpiekermannSarah,et al. RFID and the perception of control , 2005 .
[56] A. Bandura,et al. Self-regulatory mechanisms governing the impact of social comparison on complex decision making. , 1991 .