Investigating consumers' reluctance to give up local hard drives after adopting the Cloud
暂无分享,去创建一个
Anthony Francescucci | Joanne E. McNeish | Ummaha Hazra | Joanne E. McNeish | Anthony Francescucci | Ummaha Hazra
[1] E. Reed. The Ecological Approach to Visual Perception , 1989 .
[2] Piers Wilson,et al. Positive perspectives on cloud security , 2011, Inf. Secur. Tech. Rep..
[3] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[4] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[5] Kevin A Hallgren,et al. Computing Inter-Rater Reliability for Observational Data: An Overview and Tutorial. , 2012, Tutorials in quantitative methods for psychology.
[6] Mark A. Earley,et al. Reciprocity and Constructions of Informed Consent: Researching with Indigenous Populations , 2006 .
[7] Srdjan Capkun,et al. Home is safer than the cloud!: privacy concerns for consumer cloud storage , 2011, SOUPS.
[8] Dothang Truong. How Cloud Computing Enhances Competitive Advantages: A Research Model for Small Businesses , 2010 .
[9] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[10] Uwe Röhm,et al. User Awareness and Policy Compliance of Data Privacy in Cloud Computing , 2013, AWC.
[11] J. Brehm,et al. Psychological Reactance: A Theory of Freedom and Control , 1981 .
[12] Christopher R. Plouffe. Examining “peer‐to‐peer” (P2P) systems as consumer‐to‐consumer (C2C) exchange , 2008 .
[13] M. Landau. Redundancy, Rationality, and the Problem of Duplication and Overlap , 1969 .
[14] Oliver Günther,et al. RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.
[15] Ummaha Hazra,et al. Interpreting simultaneous use of an existing technology and its replacement innovation , 2014 .
[16] William Samuelson,et al. Status quo bias in decision making , 1988 .
[17] Paula Rosinski,et al. Strange Bedfellows: Human-Computer Interaction, Interface Design, and Composition Pedagogy , 2009 .
[18] Jonna Järveläinen,et al. Distrust of One's Own Web Skills: A Reason for Offline Booking after Online Information Search , 2004, Electron. Mark..
[19] Robert C. Nickerson,et al. Issues in Mobile E-Commerce , 2002, Commun. Assoc. Inf. Syst..
[20] Hiroshi Ishii,et al. The tangible user interface and its evolution , 2008, CACM.
[21] E. Rogers,et al. Diffusion of Innovations , 1964 .
[22] Anat Rafaeli,et al. Instrumentality, aesthetics and symbolism of physical artifacts as triggers of emotion , 2004 .
[23] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[24] J. Fereday,et al. Demonstrating Rigor Using Thematic Analysis: A Hybrid Approach of Inductive and Deductive Coding and Theme Development , 2006 .
[25] Ananth Chiravuri,et al. An Empirical Investigation of Cloud Computing for Personal Use , 2010 .
[26] Dale Goodhue,et al. Task-Technology Fit and Individual Performance , 1995, MIS Q..
[27] Dobrica Savic,et al. Automatic classification of office documents: Review of available methods and techniques , 1995 .
[28] Peter H. Bloch. Seeking the Ideal Form: Product Design and Consumer Response , 1995 .
[29] Eric K. Clemons,et al. Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[30] Maarten de Rijke,et al. Extracting the discussion structure in comments on news-articles , 2007, WIDM '07.
[31] Grant Mccracken. Culture and Consumption: A Theoretical Account of the Structure and Movement of the Cultural Meaning of Consumer Goods , 1986 .
[32] Ilze Zigurs,et al. A Theory of Task/Technology Fit and Group Support Systems Effectiveness , 1998, MIS Q..
[33] V. Braun,et al. Using thematic analysis in psychology , 2006 .
[34] N. Luhmann. Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .
[35] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[36] T. D. Wilson. The e-book phenomenon: a disruptive technology , 2014, Inf. Res..
[37] Pieter Verdegem,et al. Rethinking determinants of ICT acceptance: Towards an integrated and comprehensive overview , 2011 .
[38] D. Lehmann,et al. Reactance to Recommendations: When Unsolicited Advice Yields Contrary Responses , 2004 .