Perceived Mobile Information Security and Adoption of Mobile Payment Services in China
暂无分享,去创建一个
Pei-Luen Patrick Rau | Fei Gao | Yubo Zhang | P. Rau | F. Gao | Yubo Zhang
[1] Heikki Karjaluoto,et al. Factors underlying attitude formation towards online banking in Finland , 2002 .
[2] Hsiu-Fen Lin,et al. An empirical investigation of mobile banking adoption: The effect of innovation attributes and knowledge-based trust , 2011, Int. J. Inf. Manag..
[3] P. Hewer,et al. Consumer attitude and the usage and adoption of home‐based banking in the United Kingdom , 2002 .
[4] Gavriel Salvendy,et al. Handbook of Human Factors and Ergonomics: Salvendy/Handbook of Human Factors 4e , 2012 .
[5] Choon Seong Leem,et al. Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments , 2005, ICCSA.
[6] Gavriel Salvendy,et al. Perceived security determinants in e-commerce among Turkish university students , 2005, Behav. Inf. Technol..
[7] Xin Luo,et al. Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services , 2010, Decis. Support Syst..
[8] Bill Anckar,et al. VALUE CREATION IN MOBILE COMMERCE: FINDINGS FROM A CONSUMER SURVEY , 2002 .
[9] Gavriel Salvendy,et al. Factors affecting perception of information security and their impacts on IT adoption and security practices , 2011, Int. J. Hum. Comput. Stud..
[10] Key Pousttchi,et al. Security issues in mobile payment from the customer viewpoint , 2006, ECIS.
[11] Nava Pliskin,et al. Drivers and Inhibitors of Mobile-Payment Adoption by Smartphone Users , 2012, Int. J. E Bus. Res..
[12] Heikki Karjaluoto,et al. Consumer acceptance of online banking: an extension of the technology acceptance model , 2004, Internet Res..
[13] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[14] Haitham Cruickshank,et al. The security challenges for mobile ubiquitous services , 2007, Inf. Secur. Tech. Rep..
[15] Abigail Sellen,et al. Security and Trust in Mobile Interactions: A Study of Users' Perceptions and Reasoning , 2004, UbiComp.
[16] Gavriel Salvendy,et al. Perception of information security , 2010, Behav. Inf. Technol..
[17] Jing Liu,et al. An investigation of users’ continuance intention towards mobile banking in China , 2016 .
[18] P. Slovic. Perception of risk. , 1987, Science.
[19] Paul Dourish,et al. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..
[20] ChiuChao-Min,et al. Understanding customers' repeat purchase intentions in B2C e-commerce , 2014 .
[21] Hsi‐Peng Lu,et al. An empirical study of the effect of perceived risk upon intention to use online applications , 2005, Inf. Manag. Comput. Security.
[22] Pin Luarn,et al. AIS Electronic Library (AISeL) , 2017 .
[23] Gavriel Salvendy,et al. Handbook of Human Factors and Ergonomics , 2005 .
[24] S. Laforet,et al. CONSUMERS’ ATTITUDES TOWARDS ONLINE AND MOBILE BANKING IN CHINA , 2005 .
[25] M. Sathye. Adoption of Internet banking by Australian consumers: an empirical investigation , 1999 .
[26] Paul A. Pavlou,et al. Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..
[27] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[28] Shuchih Ernest Chang,et al. Smartphone security: understanding smartphone users' trust in information security management , 2014, Secur. Commun. Networks.
[29] Christopher B. Mayhorn,et al. To download or not to download: an examination of computer security decision making , 2006, INTR.
[30] Balbir S. Barn,et al. Young People and Smart Phones: An Empirical Study on Information Security , 2014, 2014 47th Hawaii International Conference on System Sciences.
[31] Gi Mun Kim,et al. Understanding dynamics between initial trust and usage intentions of mobile banking , 2009, Inf. Syst. J..
[32] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[33] Ryan West,et al. The psychology of security , 2008, CACM.
[34] D. Gefen,et al. E-commerce: the role of familiarity and trust , 2000 .
[35] David Naccache,et al. Mobile Terminal Security , 2004, IACR Cryptol. ePrint Arch..
[36] Tiffany A. Whittaker,et al. Scale Development Research , 2006 .
[37] Aaron Earle. Wireless Security Handbook , 2005 .
[38] Eric T. G. Wang,et al. Understanding customers' repeat purchase intentions in B2C e‐commerce: the roles of utilitarian value, hedonic value and perceived risk , 2014, Inf. Syst. J..
[39] R. Sharman,et al. Social and Human Elements of Information Security: Emerging Trends and Countermeasures , 2008 .
[40] E. Weber,et al. Perceived risk attitudes: relating risk perception to risky choice , 1997 .
[41] D. DavisFred,et al. User Acceptance of Computer Technology , 1989 .
[42] Hua Dai,et al. Mobile commerce adoption in China and the United States: a cross-cultural study , 2009, DATB.
[43] Kun-Huang Huarng,et al. Viral effects of social network and media on consumers’ purchase intention , 2015 .