It's in the Cloud: Theorizing Context-Specific Factors Influencing the Perception of Mobile Cloud Storage
暂无分享,去创建一个
[1] Anthony D. Miyazaki,et al. Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .
[2] Jongwoo Kim,et al. Achieving dynamic capabilities with cloud computing: an empirical investigation , 2016, Eur. J. Inf. Syst..
[3] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[4] D. Campbell,et al. Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.
[5] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[6] Xiang Yu,et al. PersonalRAID: Mobile Storage for Distributed and Disconnected Computers , 2002, FAST.
[7] David Dearman,et al. It's on my other computer!: computing with multiple devices , 2008, CHI.
[8] Ali Sunyaev,et al. Trust in Cloud Computing: Conceptual Typology and Trust-Building Antecedents , 2016, DATB.
[9] Tamara Dinev,et al. Internet Privacy Concerns Instrument , 2014 .
[10] Tsipi Heart,et al. Who is out there?: exploring the effects of trust and perceived risk on saas adoption intentions , 2010, DATB.
[11] Viswanath Venkatesh,et al. Expectation Confirmation in Technology Use , 2012, Inf. Syst. Res..
[12] G. Feuerlicht,et al. Cloud Computing Adoption : A comparative study , 2012 .
[13] Chinyao Low,et al. Understanding the determinants of cloud computing adoption , 2011, Ind. Manag. Data Syst..
[14] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[15] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[16] Ibrahim Arpaci,et al. Antecedents and consequences of cloud computing adoption in education to achieve knowledge management , 2017, Comput. Hum. Behav..
[17] Tamara Dinev,et al. Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact , 2005, Int. J. Electron. Commer..
[18] Eunil Park,et al. An Integrated Adoption Model of Mobile Cloud Services: Exploration of Key Determinants and Extension of Technology Acceptance Model , 2014, Telematics Informatics.
[19] Wynne W. Chin,et al. Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.
[20] Detmar W. Straub,et al. Reconceptualizing System Usage: An Approach and Empirical Test , 2006, Inf. Syst. Res..
[21] Ibrahim Arpaci,et al. Effects of security and privacy concerns on educational use of cloud services , 2015, Comput. Hum. Behav..
[22] Dietmar Nedbal,et al. Diffusion and Acceptance of Cloud Computing in SMEs: Towards a Valence Model of Relevant Factors , 2014, 2014 47th Hawaii International Conference on System Sciences.
[23] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[24] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[25] Juhani Iivari,et al. Why do individuals use computer technology? A Finnish case study , 1995, Inf. Manag..
[26] Ron Weber,et al. Editor’s comments , 2003, MIS Q..
[27] Rajkumar Buyya,et al. Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.
[28] Ron Weber,et al. Editor's comment: theoretically speaking , 2003 .
[29] Kalle Lyytinen,et al. Research Commentary: The Next Wave of Nomadic Computing , 2002, Inf. Syst. Res..
[30] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .
[31] Heng-Li Yang,et al. User continuance intention to use cloud storage service , 2015, Comput. Hum. Behav..
[32] Sang Pil Han,et al. Estimating Demand for Mobile Applications in the New Economy , 2014, Manag. Sci..
[33] David J. Ketchen,et al. Addressing Common Method Variance: Guidelines for Survey Research on Information Technology, Operations, and Supply Chain Management , 2011, IEEE Transactions on Engineering Management.
[34] Jonathan Murray,et al. Diffusing the Cloud: Cloud Computing and Implications for Public Policy , 2011 .
[35] Li Qin,et al. Impact of Privacy Concern in Social Networking Websites , 2012, Internet Res..
[36] Eric N. Wiebe,et al. Cloud computing adoption and usage in community colleges , 2011, Behav. Inf. Technol..
[37] Arumugam Seetharaman,et al. The usage and adoption of cloud computing by small and medium businesses , 2013, Int. J. Inf. Manag..
[38] Gary Hackbarth,et al. Computer playfulness and anxiety: positive and negative mediators of the system experience effect on perceived ease of use , 2003, Inf. Manag..
[39] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[40] Detmar W. Straub,et al. The psychological origins of perceived usefulness and ease-of-use , 1999, Inf. Manag..
[41] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[42] Karsten Schwan,et al. STRATUS: Assembling Virtual Platforms from Device Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[43] Jiafu Wan,et al. Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[44] Wanda J. Orlikowski,et al. Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..
[45] Nachiappan Subramanian,et al. Integration of logistics and cloud computing service providers: Cost and green benefits in the Chinese context , 2014 .
[46] Sung Yul Ryoo,et al. An empirical investigation of end-users' switching toward cloud computing: A two factor theory perspective , 2013, Comput. Hum. Behav..
[47] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[48] Roger Clarke,et al. Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..
[49] Wen-Lung Shiau,et al. Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach , 2016, Inf. Manag..
[50] Izak Benbasat,et al. Predicting Intention to Adopt Interorganizational Linkages: An Institutional Perspective , 2003, MIS Q..
[51] In Lee,et al. An empirical examination of factors influencing the intention to use mobile payment , 2010, Comput. Hum. Behav..
[52] Tiago Oliveira,et al. Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors , 2014, Inf. Manag..
[53] Viswanath Venkatesh,et al. Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration Research , 2010, J. Manag. Inf. Syst..
[54] Jeffrey Nichols,et al. An infrastructure for extending applications' user experiences across multiple personal devices , 2008, UIST '08.
[55] Cheryl Brown,et al. An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites , 2013 .
[56] Mauricio Featherman,et al. The intangibility of e-services: effects on perceived risk and acceptance , 2010, DATB.
[57] Ibrahim Arpaci,et al. Understanding and predicting students' intention to use mobile cloud storage services , 2016, Comput. Hum. Behav..
[58] Janice C. Sipior,et al. The Internet Jurisdiction Risk of Cloud Computing , 2010, Inf. Syst. Manag..
[59] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[60] Clyde W. Holsapple,et al. Measuring perceived security in B2C electronic commerce website usage: A respecification and validation , 2014, Decis. Support Syst..
[61] H. Raghav Rao,et al. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2008, Decis. Support Syst..
[62] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[63] Detmar W. Straub,et al. Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..
[64] F De Turck,et al. Platform for Efficient Switching between Multiple Devices in the Intensive Care Unit , 2014, Methods of Information in Medicine.
[65] Jorge Gonçalves,et al. Mobile cloud storage: a contextual experience , 2014, MobileHCI '14.
[66] Claudia Loebbecke,et al. The Emergence of Ebooks: Just Another Media Industry Joining the Converging Digital World? An Explorative Study on User Preferences and Industry Structure Changes , 2010 .
[67] Viswanath Venkatesh,et al. Mobile Application Usability: Conceptualization and Instrument Development , 2015, MIS Q..
[68] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[69] Gurpreet Dhillon,et al. A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..
[70] Xiaolong Su,et al. Review of Mobile cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[71] I. Ajzen. The theory of planned behavior , 1991 .
[72] Kar Yan Tam,et al. Understanding the Adoption of Multipurpose Information Appliances: The Case of Mobile Data Services , 2006, Inf. Syst. Res..
[73] Adamantios Diamantopoulos,et al. The error term in formative measurement models: interpretation and modeling implications , 2006 .
[74] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[75] Susan A. Brown,et al. Do I really have to? User acceptance of mandated technology , 2002, Eur. J. Inf. Syst..
[76] Robert Joan. An Overture of Mobile Cloud Computing and its Applications , 2014, CloudCom 2014.
[77] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[78] Frank Teuteberg,et al. The role of trust and risk perceptions in cloud archiving — Results from an empirical study , 2014 .
[79] Anol Bhattacherjee,et al. Why end-users move to the cloud: a migration-theoretic analysis , 2014, Eur. J. Inf. Syst..
[80] Mary Tate,et al. A Descriptive Literature Review and Classification of Cloud Computing Research , 2012, Commun. Assoc. Inf. Syst..
[81] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[82] Tiago Oliveira,et al. Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context , 2013, Decis. Support Syst..
[83] Ananth Chiravuri,et al. An Empirical Investigation of Cloud Computing for Personal Use , 2010 .
[84] Dijiang Huang,et al. Mobile Cloud Computing: Foundations and Service Models , 2017 .
[85] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[86] Thomas Hess,et al. Opportunities and risks of software-as-a-service: Findings from a survey of IT executives , 2011, Decis. Support Syst..
[87] Loretta Mastroeni,et al. Economic decision criteria for the migration to cloud storage , 2016, Eur. J. Inf. Syst..