Young Australians' privacy, security and trust in internet banking
暂无分享,去创建一个
[1] Chang Liu,et al. Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..
[2] Simson L. Garfinkel,et al. Security and Usability , 2005 .
[3] Donald A. Norman,et al. The invisible computer , 1998 .
[4] John Zic,et al. A Reflection on Translation Issues in User-Centred Design , 2004 .
[5] Tom Storey. Sharing, Privacy and Trust in Our Networked World. A Report to the OCLC Membership. , 2007 .
[6] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[7] Trevor Barr,et al. Taking users up the value chain , 2003 .
[8] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[9] Joo-Gim Heaney,et al. Generations X and Y's internet banking usage in Australia , 2007 .
[10] Jung-ki Lee,et al. Effects of personal control on adoption of self‐service technology innovations , 2002 .
[11] Harold C. Releya. Technology and privacy: The new landscape , 1998 .
[12] David Bollier,et al. The future of electronic commerce : a report of the fourth annual Aspen Institute Roundtable on Information Technology, Aspen, Colorado, August 17-20, 1995 , 1996 .
[13] Supriya Singh,et al. Rigour at a trotting pace: A story from the user-centred design of smart Internet technologies , 2004 .
[14] Clare-Marie Karat,et al. Editorial: why HCI research in privacy and security is critical now , 2005 .
[15] Ruey-Lin Hsiao,et al. Technology fears: distrust and cultural persistence in electronic marketplace adoption , 2003, J. Strateg. Inf. Syst..
[16] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[17] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[18] Michael Grüninger,et al. Introduction , 2002, CACM.
[19] Lyn Richards,et al. Readme First for a User's Guide to Qualitative Methods , 2002 .
[20] T.L.J. Ferris,et al. User-Centered Design: An Integrated Approach , 2004, IEEE Transactions on Professional Communication.
[21] Scott Isensee,et al. User-Centered Design: An Integrated Approach with Cdrom , 2001 .
[22] W. O. Berry,et al. Preface , 1988, Brain Research Bulletin.
[23] Clare-Marie Karat,et al. Why HCI research in privacy and security is critical now , 2005, Int. J. Hum. Comput. Stud..
[24] Ingoo Han,et al. Effect of trust on customer acceptance of Internet banking , 2002, Electron. Commer. Res. Appl..
[25] Supriya Singh,et al. Centre for International Research on Communication and Information Technologies , 1997 .
[26] N. Luhmann. Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .
[27] Nigel Bevan. Design for usability , 1999, HCI.