메뉴 건너뛰기




Volumn 8, Issue 2, 2010, Pages 169-186

Ubiquitous computing acceptance model: End user concern about security, privacy and risk

Author keywords

Mobile communication; Pervasive computing; U city; Ubiquitous computing; Ubiquitous computing acceptance model; UCAM

Indexed keywords

COMPUTING ENVIRONMENTS; EASE OF USE; END USERS; MOBILE COMMUNICATION; MOBILE COMMUNICATIONS; PERVASIVE COMPUTING; POTENTIAL USERS; PRIMARY FACTORS; USER ATTITUDES;

EID: 76449119622     PISSN: 1470949X     EISSN: None     Source Type: Journal    
DOI: 10.1504/IJMC.2010.031446     Document Type: Article
Times cited : (53)

References (53)
  • 1
    • 84900515472 scopus 로고    scopus 로고
    • Privacy in pervasive environments: Next general labeling protocols
    • Ackerman, M.S. (2004) 'Privacy in pervasive environments: next general labeling protocols', Personal and Ubiquitous Computing, Vol.8, No.6, pp.430-439.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 430-439
    • Ackerman, M.S.1
  • 3
    • 84969447074 scopus 로고    scopus 로고
    • U-government: A framework for the evolution of e-government
    • Belanger, F., Carter, L. and Schaupp, L.C. (2005) 'U-government: a framework for the evolution of e-government', Electronic Government, Vol.2, No.4, pp.426-445.
    • (2005) Electronic Government , vol.2 , Issue.4 , pp. 426-445
    • Belanger, F.1    Carter, L.2    Schaupp, L.C.3
  • 4
    • 33744900120 scopus 로고    scopus 로고
    • Role-based access control model for ubiquitous environment
    • Chae, S., Kim, W. and Kim, D. (2006) 'Role-based access control model for ubiquitous environment', Lecture Notes in Computer Science, Vol.3786, pp.354-363.
    • (2006) Lecture Notes in Computer Science , vol.3786 , pp. 354-363
    • Chae, S.1    Kim, W.2    Kim, D.3
  • 5
    • 2442654928 scopus 로고    scopus 로고
    • Perceived information security, financial liability and consumer trust in e-commerce transactions
    • Chellappa, R. and Pavlou, P. (2002) 'Perceived information security, financial liability and consumer trust in e-commerce transactions', Logistics Information Management, Vol.15, pp.358-368.
    • (2002) Logistics Information Management , vol.15 , pp. 358-368
    • Chellappa, R.1    Pavlou, P.2
  • 6
    • 57149123524 scopus 로고    scopus 로고
    • The empirical study of automotive telematics acceptance in Taiwan: Comparing three technology acceptance models
    • Chen, H. and Chen, S. (2009) 'The empirical study of automotive telematics acceptance in Taiwan: comparing three technology acceptance models', Int. J. Mobile Communications, Vol.7, No.1, pp.50-65.
    • (2009) Int. J. Mobile Communications , vol.7 , Issue.1 , pp. 50-65
    • Chen, H.1    Chen, S.2
  • 7
    • 37849043107 scopus 로고    scopus 로고
    • RFID in retail: A framework for examining consumers' ethical perceptions
    • Chen, J.V. and Pfleuger, P. (2008) 'RFID in retail: a framework for examining consumers' ethical perceptions', Int. J. Mobile Communications, Vol.6, No.1, pp.53-66.
    • (2008) Int. J. Mobile Communications , vol.6 , Issue.1 , pp. 53-66
    • Chen, J.V.1    Pfleuger, P.2
  • 8
    • 37849041287 scopus 로고    scopus 로고
    • A model of consumer acceptance of mobile payment
    • Chen, L.D. (2008) 'A model of consumer acceptance of mobile payment', Int. J. Mobile Communications, Vol.6, No.1, pp.32-52.
    • (2008) Int. J. Mobile Communications , vol.6 , Issue.1 , pp. 32-52
    • Chen, L.D.1
  • 11
    • 0001960725 scopus 로고
    • Test validation educational measurement
    • Thorndike, R.L. (Ed.):, 2nd ed., Science Publication, Washington
    • Cronbach, L.J. (1971) 'Test validation educational measurement', in Thorndike, R.L. (Ed.): American Council on Education, 2nd ed., Science Publication, Washington, pp.443-507.
    • (1971) American Council on Education , pp. 443-507
    • Cronbach, L.J.1
  • 12
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis, F. (1989) 'Perceived usefulness, perceived ease of use, and user acceptance of information technology', MIS Quarterly, Vol.13, No.3, pp.319-340.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.1
  • 13
    • 33646354609 scopus 로고    scopus 로고
    • Consumer trust, perceived security and privacy policy
    • Flavian, C. and Guinaliu, M. (2006) 'Consumer trust, perceived security and privacy policy', Industrial Management and Data Systems, Vol.106, No.5, pp.601-620.
    • (2006) Industrial Management and Data Systems , vol.106 , Issue.5 , pp. 601-620
    • Flavian, C.1    Guinaliu, M.2
  • 14
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable and measurement error
    • Fornell, C. and Larcker, D.F. (1981) 'Evaluating structural equation models with unobservable and measurement error', Journal of Marketing Research, Vol.18, pp.39-50.
    • (1981) Journal of Marketing Research , vol.18 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 15
    • 50849097878 scopus 로고    scopus 로고
    • Privacy issues in the era of ubiquitous commerce
    • Galanxhi, H. and Nah, F.F. (2006) 'Privacy issues in the era of ubiquitous commerce', Electronic Markets, Vol.16, No.3, pp.222-232.
    • (2006) Electronic Markets , vol.16 , Issue.3 , pp. 222-232
    • Galanxhi, H.1    Nah, F.F.2
  • 16
    • 4444274701 scopus 로고    scopus 로고
    • Consumer trust in B2C e-commerce and the importance of social presence
    • Gefen, D. and Straub, D. W. (2004) 'Consumer trust in B2C e-commerce and the importance of social presence', Omega, Vol.32, No.6, pp.407-424.
    • (2004) Omega , vol.32 , Issue.6 , pp. 407-424
    • Gefen, D.1    Straub, D.W.2
  • 17
    • 25444432074 scopus 로고    scopus 로고
    • RFID and the perception of control
    • Gunther, O. and Spiekermann, S. (2005) 'RFID and the perception of control', Communications of the ACM, Vol.48, No.9, pp.73-76.
    • (2005) Communications of the ACM , vol.48 , Issue.9 , pp. 73-76
    • Gunther, O.1    Spiekermann, S.2
  • 20
    • 84898298169 scopus 로고    scopus 로고
    • U-city: The next paradigm of urban development
    • Foth, M. (Ed.): (Chapter 26), IGI Global, Hershey, PA
    • Hwang, J. (2008) 'U-city: the next paradigm of urban development', in Foth, M. (Ed.): Urban Informatics: Community Integration and Implementation (Chapter 26), IGI Global, Hershey, PA.
    • (2008) Urban Informatics: Community Integration and Implementation
    • Hwang, J.1
  • 21
    • 0002135118 scopus 로고    scopus 로고
    • Consumer trust in an Internet store: A cross-cultural validation
    • Available:
    • Jarvenpaa, S.L. and Tractinsky, N. (1999) 'Consumer trust in an Internet store: a cross-cultural validation', Journal of Computer Mediated Communication, Vol.5, No.2, pp.1-36, Available: http://www.ascusc.org/jcmc/vol5/issue2/ jarvenpaa.html
    • (1999) Journal of Computer Mediated Communication , vol.5 , Issue.2 , pp. 1-36
    • Jarvenpaa, S.L.1    Tractinsky, N.2
  • 23
    • 34248147072 scopus 로고    scopus 로고
    • On the usefulness and ease of use of location-based services
    • Junglas, I.A. (2007) 'On the usefulness and ease of use of location-based services', International Journal of Mobile Communications, Vol.5, No.4, pp.389-408.
    • (2007) International Journal of Mobile Communications , vol.5 , Issue.4 , pp. 389-408
    • Junglas, I.A.1
  • 24
    • 76449093298 scopus 로고    scopus 로고
    • Investigating mobile wireless technology adoption: An extension of the technology acceptance model
    • Kim, S. and Garrison, G. (2008) 'Investigating mobile wireless technology adoption: an extension of the technology acceptance model', Information Systems Frontiers, Vol.5, pp.385-396.
    • (2008) Information Systems Frontiers , vol.5 , pp. 385-396
    • Kim, S.1    Garrison, G.2
  • 26
    • 38149135822 scopus 로고    scopus 로고
    • Privacy protection for a secure u-city life
    • Lee, C., Lee, B. and Kong, Y. (2007) 'Privacy protection for a secure u-city life', Lecture Notes in Computer Science, Vol.4490, pp.685-692.
    • (2007) Lecture Notes in Computer Science , vol.4490 , pp. 685-692
    • Lee, C.1    Lee, B.2    Kong, Y.3
  • 27
    • 33744917835 scopus 로고    scopus 로고
    • An effective method for the location privacy in ubiquitous computing
    • Lee, G., Kim, W. and Kim, D. (2005) 'An effective method for the location privacy in ubiquitous computing', Lecture Notes in Computer Science, Vol.3823, pp.1006-1015.
    • (2005) Lecture Notes in Computer Science , vol.3823 , pp. 1006-1015
    • Lee, G.1    Kim, W.2    Kim, D.3
  • 29
    • 59749089258 scopus 로고    scopus 로고
    • Activity-based scenarios for and approaches to ubiquitous e-Learning
    • Lefrere, P. (2009) 'Activity-based scenarios for and approaches to ubiquitous e-Learning', Personal and Ubiquitous Computing, Vol.13, pp.219-227.
    • (2009) Personal and Ubiquitous Computing , vol.13 , pp. 219-227
    • Lefrere, P.1
  • 31
    • 49249103650 scopus 로고    scopus 로고
    • Gender and loyalty in the context of mobile services
    • Lim, H. and Kumar, A. (2008) 'Gender and loyalty in the context of mobile services', Int. J. Mobile Communications, Vol.6, No.6, pp.714-728.
    • (2008) Int. J. Mobile Communications , vol.6 , Issue.6 , pp. 714-728
    • Lim, H.1    Kumar, A.2
  • 32
    • 67649512581 scopus 로고    scopus 로고
    • The adoption behaviour for mobile video call services
    • Lin, J. and Liu, E. (2009) 'The adoption behaviour for mobile video call services', Int. J. Mobile Communications, Vol.7, No.6, pp.646-666.
    • (2009) Int. J. Mobile Communications , vol.7 , Issue.6 , pp. 646-666
    • Lin, J.1    Liu, E.2
  • 33
    • 10644254580 scopus 로고    scopus 로고
    • Beyond concern: A privacy-trust-behavioral intention model of electronic commerce
    • Liu, C., Marchewka, J., Lu, J. and Yu, C. (2005) 'Beyond concern: a privacy-trust-behavioral intention model of electronic commerce', Information and Management, Vol.41, No.2, pp.289-304.
    • (2005) Information and Management , vol.41 , Issue.2 , pp. 289-304
    • Liu, C.1    Marchewka, J.2    Lu, J.3    Yu, C.4
  • 34
    • 33845729507 scopus 로고    scopus 로고
    • Structural equation modeling of factors that influence consumer internet purchase intentions of services
    • Nijite, D. and Parsa, H.G. (2005) 'Structural equation modeling of factors that influence consumer internet purchase intentions of services', Journal of Services Research, Vol.5, No.1, pp.43-59.
    • (2005) Journal of Services Research , vol.5 , Issue.1 , pp. 43-59
    • Nijite, D.1    Parsa, H.G.2
  • 35
    • 25444432606 scopus 로고    scopus 로고
    • RFID privacy issues and technical challenges
    • Ohkubo, M., Suzuki, K. and Kinoshita, S. (2005) 'RFID privacy issues and technical challenges', Communications of the ACM, Vol.48, No.9, pp.66-71.
    • (2005) Communications of the ACM , vol.48 , Issue.9 , pp. 66-71
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 36
    • 50649098826 scopus 로고    scopus 로고
    • Using user preferences to enhance privacy in pervasive systems
    • 13-18 April, Cancun, Mexico
    • Papadopoulou, E. (2007) 'Using user preferences to enhance privacy in pervasive systems', Proceeding of 3rd International Conference on Systems, 13-18 April, Cancun, Mexico, pp.271-276.
    • (2007) Proceeding of 3rd International Conference on Systems , pp. 271-276
    • Papadopoulou, E.1
  • 37
    • 3242661881 scopus 로고    scopus 로고
    • A cross-cultural comparison of Internet buying behavior
    • Park, C. and Jun, J. (2003) 'A cross-cultural comparison of Internet buying behavior', International Marketing Review, Vol.20, No.5, pp.534-553.
    • (2003) International Marketing Review , vol.20 , Issue.5 , pp. 534-553
    • Park, C.1    Jun, J.2
  • 39
    • 2442676514 scopus 로고    scopus 로고
    • Building effective online marketplaces with institution-based trust
    • Pavlou, P.A. and Gefen, D. (2004) 'Building effective online marketplaces with institution-based trust', Information Systems Research, Vol.15, No.1, pp.37-59.
    • (2004) Information Systems Research , vol.15 , Issue.1 , pp. 37-59
    • Pavlou, P.A.1    Gefen, D.2
  • 41
    • 67650917936 scopus 로고    scopus 로고
    • The importance of perceived trust, security and privacy in online trading systems
    • Roca, J., Garcia, J.J. and Vega, J.J. (2009) 'The importance of perceived trust, security and privacy in online trading systems', Information Management and Computer Security, Vol.17, No.2, pp.96-113.
    • (2009) Information Management and Computer Security , vol.17 , Issue.2 , pp. 96-113
    • Roca, J.1    Garcia, J.J.2    Vega, J.J.3
  • 43
    • 0002179878 scopus 로고    scopus 로고
    • Flaming, complaining, abstaining: How online users respond to privacy concerns
    • Sheehan, K.B. and Hoy, M.G. (1999) 'Flaming, complaining, abstaining: how online users respond to privacy concerns', Journal of Advertising, Vol.28, No.3, pp.37-51.
    • (1999) Journal of Advertising , vol.28 , Issue.3 , pp. 37-51
    • Sheehan, K.B.1    Hoy, M.G.2
  • 45
    • 34347346117 scopus 로고    scopus 로고
    • User acceptance of mobile internet: Implication for convergence technologies
    • Shin, D. (2007) 'User acceptance of mobile internet: implication for convergence technologies', Interacting with Computers, Vol.19, No.4, pp.472-483.
    • (2007) Interacting with Computers , vol.19 , Issue.4 , pp. 472-483
    • Shin, D.1
  • 46
    • 38149017015 scopus 로고    scopus 로고
    • What do people do with digital multimedia broadcasting? Path analysis of structural equation modeling
    • Shin, D. (2008) 'What do people do with digital multimedia broadcasting? Path analysis of structural equation modeling', International Journal of Mobile Communications, Vol.6, No.1, pp.258-275.
    • (2008) International Journal of Mobile Communications , vol.6 , Issue.1 , pp. 258-275
    • Shin, D.1
  • 47
    • 59249088422 scopus 로고    scopus 로고
    • Determinants of customer acceptance of multi-service network: An implication for IP-based technologies
    • Shin, D. (2009a) 'Determinants of customer acceptance of multi-service network: an implication for IP-based technologies', Information and Management, Vol.46, No.1, pp.16-22.
    • (2009) Information and Management , vol.46 , Issue.1 , pp. 16-22
    • Shin, D.1
  • 48
    • 70350074357 scopus 로고    scopus 로고
    • A cross-national study of mobile internet usage: A comparison of US and Korean mobile internet users
    • Shin, D. (2009b) 'A cross-national study of mobile internet usage: a comparison of US and Korean mobile internet users', Journal of Global Information Management, Vol.17, No.4, pp.29-54.
    • (2009) Journal of Global Information Management , vol.17 , Issue.4 , pp. 29-54
    • Shin, D.1
  • 50
  • 51
    • 76449102073 scopus 로고    scopus 로고
    • Online Book Publication, Available at:, Accessed 2 December 2007
    • Towsend, A. (2008) Envisioning the Ubiquitous City, Online Book Publication, Available at: http://urban.blogs.com/research/2004/12/book- envisionin.html, Accessed 2 December 2007.
    • (2008) Envisioning the Ubiquitous City
    • Towsend, A.1
  • 52
    • 0035780881 scopus 로고    scopus 로고
    • Privacy and security concerns as major barriers for ecommerce
    • Udo, G.J. (2001) 'Privacy and security concerns as major barriers for ecommerce', Information Management and Computer Security, Vol. 9, No.4, pp.165-174.
    • (2001) Information Management and Computer Security , vol.9 , Issue.4 , pp. 165-174
    • Udo, G.J.1
  • 53
    • 33947424708 scopus 로고    scopus 로고
    • Convenience and TAM in a ubiquitous computing environment
    • Yoon, C. and Kim, S. (2007) 'Convenience and TAM in a ubiquitous computing environment', Electronic Commerce Research and Applications, Vol.6, No.1, pp.102-112.
    • (2007) Electronic Commerce Research and Applications , vol.6 , Issue.1 , pp. 102-112
    • Yoon, C.1    Kim, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.