The role of government regulations in the adoption of cloud computing: A case study of local government
暂无分享,去创建一个
[1] John Effah,et al. Preliminary insight into cloud computing adoption in a developing country , 2016, J. Enterp. Inf. Manag..
[2] Jim Minifie. The silver lining: cloud computing and small and medium enterprises A Grattan paper , 2014 .
[3] W. Zikmund. Business Research Methods , 1984 .
[4] Wei Xie,et al. Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.
[5] Thomas F. Stafford,et al. Online tax payment systems as an emergent aspect of governmental transformation , 2011, Eur. J. Inf. Syst..
[6] Eduardo B. Fernández,et al. A survey of compliance issues in cloud computing , 2016, Journal of Internet Services and Applications.
[7] David C. Yen,et al. An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital , 2014, Int. J. Inf. Manag..
[8] C. Perry,et al. Convergent interviewing: a starting methodology for an enterprise research program , 2007 .
[9] John T. Scholz,et al. Duty, Fear, and Tax Compliance: The Heuristic Basis of Citizenship Behavior , 1995 .
[10] Nick von Tunzelmann,et al. Mapping public support for innovation : a comparison of policy alignment in the UK and France , 2008 .
[11] Keith Punch,et al. Introduction to Social Research: Quantitative and Qualitative Approaches , 1998 .
[12] Andy P. Field,et al. Discovering Statistics Using SPSS , 2000 .
[13] A. Zaied,et al. Barriers to E-Commerce Adoption in Egyptian SMEs , 2012 .
[14] J. Hair. Multivariate data analysis , 1972 .
[15] C. D. J. Waters. Quantitative Methods for Business , 1997 .
[16] Nick Doty,et al. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[17] C. Perry,et al. Qualitative Marketing Research , 2001 .
[18] B. Byrne. Structural Equation Modeling with LISREL, PRELIS, and SIMPLIS: Basic Concepts, Applications, and Programming , 1998 .
[19] Hsin Hsin Chang,et al. Technical and management perceptions of enterprise information system importance, implementation and benefits , 2006, Inf. Syst. J..
[20] M. Shin,et al. Affective Policy Performance Evaluation Model: A Case of an International Trade Policy Implementation , 2018 .
[21] Geoff Walsham,et al. Doing interpretive research , 2006, Eur. J. Inf. Syst..
[22] Hsiu-Fang Hsieh,et al. Three Approaches to Qualitative Content Analysis , 2005, Qualitative health research.
[23] A. Scupola,et al. The Adoption of Internet Commerce by SMEs in the South of Italy: An Environmental, Technological and Organizational Perspective , 2003 .
[24] Colin Robson,et al. Real World Research: A Resource for Social Scientists and Practitioner-Researchers , 1993 .
[25] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[26] Paul T. Jaeger,et al. Cloud Computing and Information Policy: Computing in a Policy Cloud? , 2008 .
[27] Sakshi Kaushal,et al. Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.
[28] Barbara M. Byrne,et al. Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .
[29] Sven Helmer,et al. A survey study on major technical barriers affecting the decision to adopt cloud services , 2015, J. Syst. Softw..
[30] Paul T. Jaeger,et al. The impact of polices on government social media usage: Issues, challenges, and recommendations , 2012, Gov. Inf. Q..
[31] Eric Hand,et al. Head in the clouds , 2007, Nature.
[32] A. Onwuegbuzie,et al. Mixed Methods Research: A Research Paradigm Whose Time Has Come , 2004 .
[33] Irit Hadar,et al. Applying ontology-based rules to conceptual modeling: a reflection on modeling decision making , 2007, Eur. J. Inf. Syst..
[34] G. Gaskell,et al. Individual and Group Interviewing , 2000 .
[35] Wasfi Alrawabdeh. Environmental Factors Affecting Mobile Commerce Adoption- An Exploratory Study on the Telecommunication Firms in Jordan , 2014 .
[36] N. Kshetri. Privacy and security issues in cloud computing: The role of institutions and institutional evolution , 2013 .
[37] Mathews Nkhoma,et al. Contributing factors of cloud computing adoption: a technology-organisation-environment framework approach , 2013 .
[38] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[39] Kenneth L. Kraemer,et al. The Process of Innovation Assimilation by Firms in Different Countries: A Technology Diffusion Perspective on E-Business , 2006, Manag. Sci..
[40] Tiago Oliveira,et al. Literature Review of Information Technology Adoption Models at Firm Level , 2011 .
[41] Ray Hackney,et al. Towards an e-Government efficiency agenda: the impact of information and communication behaviour on e-Reverse auctions in public sector procurement , 2007, Eur. J. Inf. Syst..
[42] Dietmar Nedbal,et al. Diffusion and Acceptance of Cloud Computing in SMEs: Towards a Valence Model of Relevant Factors , 2014, 2014 47th Hawaii International Conference on System Sciences.
[43] John Hulland,et al. Use of causal models in marketing research: A review , 1996 .
[44] Akemi Takeoka Chatfield,et al. Assessing information security risks in the cloud: A case study of Australian local government authorities , 2020, Gov. Inf. Q..
[45] Zaigham Mahmood,et al. Data Location and Security Issues in Cloud Computing , 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies.
[46] Sudha N. Setty. Surveillance, Secrecy, and the Search for Meaningful Accountability , 2014 .
[47] Urs Gasser,et al. Governments and Cloud Computing: Roles, Approaches, and Policy Considerations , 2014 .
[48] Dimitrios Zissis,et al. Securing e-Government and e-Voting with an open cloud computing architecture , 2011, Gov. Inf. Q..
[49] C. Teddlie,et al. Foundations of mixed methods research , 2013 .
[50] J. Soar,et al. Level of policy for cloud computing adoption in Australian regional municipal governments: an exploratory study , 2015 .
[51] David C. Yen,et al. Factors affecting the adoption of electronic signature: Executives' perspective of hospital information department , 2007, Decision Support Systems.
[52] Michael Grimsley,et al. e-Government information systems: Evaluation-led design for public value and client trust , 2007, Eur. J. Inf. Syst..
[53] Jeffrey Soar,et al. Perceived potential for value creation from cloud computing: a study of the Australian regional government sector , 2018, Behav. Inf. Technol..
[54] Dong-Hee Shin,et al. User centric cloud service model in public sectors: Policy implications of cloud services , 2013, Gov. Inf. Q..
[55] Matthew N. O. Sadiku,et al. Cloud Computing: Opportunities and Challenges , 2014, IEEE Potentials.
[56] Jennifer Caroline Greene,et al. Defining and describing the paradigm issue in mixed‐method evaluation , 1997 .
[57] Tony Thomas,et al. Cloud Based Medical Image Exchange-Security Challenges , 2012 .
[58] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[59] Akhil Behl. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.
[60] Lukács Adrienn,et al. What is Privacy? The History and Definition of Privacy , 2016 .
[61] Jeffrey C. Carrico,et al. Licensed to ILL , 2004 .
[62] Shuhua Monica Liu,et al. Special issue on internet plus government: New opportunities to solve public problems? , 2018, Gov. Inf. Q..
[63] Kathryn E. Newcomer,et al. Handbook of Practical Program Evaluation , 2010 .
[64] R. Chenail,et al. Values in Qualitative and Quantitative Research , 2009 .
[65] Anol Bhattacherjee,et al. Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..
[66] Abhinav Mishra,et al. Cloud computing security considerations , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).
[67] Zhihai Zhang,et al. An instrument for measuring TQM implementation for Chinese manufacturing companies , 2000 .
[68] Patrick Y. K. Chau,et al. A perception-based model for EDI adoption in small businesses using a technology-organization-environment framework , 2001, Inf. Manag..
[69] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[70] M. Grimmer,et al. The mix of qualitative and quantitative research in major marketing journals, 1993‐2002 , 2007 .
[71] C. Girard,et al. Towards a Model of Corporate and Social Stakeholder Engagement: Analyzing the Relations Between a French Mutual Bank and Its Members , 2012 .
[72] Jun-jie Wang,et al. Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.
[73] Mcdp Mathieu Weggeman,et al. Determinants of the Level of Knowledge Application: A Knowledge‐Based and Information‐Processing Perspective* , 2005 .
[74] Matt Bishop,et al. Storm Clouds Rising: Security Challenges for IaaS Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[75] Michael D. Myers,et al. Qualitative Research in Information Systems , 1997, MIS Q..
[76] Sevgi Özkan,et al. e-Government adoption model based on theory of planned behavior: Empirical validation , 2011, Gov. Inf. Q..
[77] E. B. Zechmeister,et al. Research Methods in Psychology. , 1990 .
[78] Krystal Lynn Conniry. National Security, Mass Surveillance, and Citizen Rights under Conditions of Protracted Warfare , 2016 .
[79] J. Victor. Strategic Lobbying: Demonstrating How Legislative Context Affects Interest Groups' Lobbying Tactics , 2007 .
[80] Kristina Irion,et al. Government Cloud Computing and National Data Sovereignty , 2012 .
[81] Zheng Yan,et al. Factors affecting response rates of the web survey: A systematic review , 2010, Comput. Hum. Behav..
[82] Tiago Oliveira,et al. Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors , 2014, Inf. Manag..
[83] Karim Djemame,et al. Legal issues in clouds: towards a risk inventory , 2013, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[84] Othman Ibrahim,et al. Factors influencing cloud computing adoption for e-government implementation in developing countries: Instrument development , 2016, J. Syst. Inf. Technol..
[85] Paul T. Jaeger,et al. Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..
[86] John Ngugi Makena,et al. FACTORS THAT AFFECT CLOUD COMPUTING ADOPTION BY SMALL AND MEDIUM ENTERPRISES IN KENYA , 2013 .
[87] Inwon Kang,et al. Service Evaluation Model for Medical Tour Service , 2014 .
[88] Ling Liu,et al. Agyaat: mutual anonymity over structured P2P networks , 2006, Internet Res..
[89] Viswanath Venkatesh,et al. Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..
[90] B MilesMatthew,et al. Qualitative Data Analysis , 2009, Approaches and Processes of Social Science Research.
[91] Laurence J. O'Toole,et al. The Selection of Policy Instruments: a Network-based Perspective , 1998, Journal of Public Policy.
[92] David C. Yen,et al. Critical factors for adopting PACS in Taiwan: Views of radiology department directors , 2006, Decis. Support Syst..
[93] Luke A. Stewart,et al. The Impact of Regulation on Innovation in the United States: A Cross-Industry Literature Review , 2011 .
[94] Jan Schilling. On the Pragmatics of Qualitative Assessment , 2006 .