-
1
-
-
84900515472
-
Privacy in pervasive environments: Next general labeling protocols
-
Ackerman, M.S. (2004) 'Privacy in pervasive environments: next general labeling protocols', Personal and Ubiquitous Computing, Vol.8, No.6, pp.430-439.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 430-439
-
-
Ackerman, M.S.1
-
3
-
-
84969447074
-
U-government: A framework for the evolution of e-government
-
Belanger, F., Carter, L. and Schaupp, L.C. (2005) 'U-government: a framework for the evolution of e-government', Electronic Government, Vol.2, No.4, pp.426-445.
-
(2005)
Electronic Government
, vol.2
, Issue.4
, pp. 426-445
-
-
Belanger, F.1
Carter, L.2
Schaupp, L.C.3
-
4
-
-
33744900120
-
Role-based access control model for ubiquitous environment
-
Chae, S., Kim, W. and Kim, D. (2006) 'Role-based access control model for ubiquitous environment', Lecture Notes in Computer Science, Vol.3786, pp.354-363.
-
(2006)
Lecture Notes in Computer Science
, vol.3786
, pp. 354-363
-
-
Chae, S.1
Kim, W.2
Kim, D.3
-
5
-
-
2442654928
-
Perceived information security, financial liability and consumer trust in e-commerce transactions
-
Chellappa, R. and Pavlou, P. (2002) 'Perceived information security, financial liability and consumer trust in e-commerce transactions', Logistics Information Management, Vol.15, pp.358-368.
-
(2002)
Logistics Information Management
, vol.15
, pp. 358-368
-
-
Chellappa, R.1
Pavlou, P.2
-
6
-
-
57149123524
-
The empirical study of automotive telematics acceptance in Taiwan: Comparing three technology acceptance models
-
Chen, H. and Chen, S. (2009) 'The empirical study of automotive telematics acceptance in Taiwan: comparing three technology acceptance models', Int. J. Mobile Communications, Vol.7, No.1, pp.50-65.
-
(2009)
Int. J. Mobile Communications
, vol.7
, Issue.1
, pp. 50-65
-
-
Chen, H.1
Chen, S.2
-
7
-
-
37849043107
-
RFID in retail: A framework for examining consumers' ethical perceptions
-
Chen, J.V. and Pfleuger, P. (2008) 'RFID in retail: a framework for examining consumers' ethical perceptions', Int. J. Mobile Communications, Vol.6, No.1, pp.53-66.
-
(2008)
Int. J. Mobile Communications
, vol.6
, Issue.1
, pp. 53-66
-
-
Chen, J.V.1
Pfleuger, P.2
-
8
-
-
37849041287
-
A model of consumer acceptance of mobile payment
-
Chen, L.D. (2008) 'A model of consumer acceptance of mobile payment', Int. J. Mobile Communications, Vol.6, No.1, pp.32-52.
-
(2008)
Int. J. Mobile Communications
, vol.6
, Issue.1
, pp. 32-52
-
-
Chen, L.D.1
-
10
-
-
0141988044
-
-
2nd ed., Sage Publications, Thousand Oaks, CA
-
Creswell, J.W. (2003) Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 2nd ed., Sage Publications, Thousand Oaks, CA.
-
(2003)
Research Design: Qualitative, Quantitative, and Mixed Methods Approaches
-
-
Creswell, J.W.1
-
11
-
-
0001960725
-
Test validation educational measurement
-
Thorndike, R.L. (Ed.):, 2nd ed., Science Publication, Washington
-
Cronbach, L.J. (1971) 'Test validation educational measurement', in Thorndike, R.L. (Ed.): American Council on Education, 2nd ed., Science Publication, Washington, pp.443-507.
-
(1971)
American Council on Education
, pp. 443-507
-
-
Cronbach, L.J.1
-
12
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis, F. (1989) 'Perceived usefulness, perceived ease of use, and user acceptance of information technology', MIS Quarterly, Vol.13, No.3, pp.319-340.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.1
-
13
-
-
33646354609
-
Consumer trust, perceived security and privacy policy
-
Flavian, C. and Guinaliu, M. (2006) 'Consumer trust, perceived security and privacy policy', Industrial Management and Data Systems, Vol.106, No.5, pp.601-620.
-
(2006)
Industrial Management and Data Systems
, vol.106
, Issue.5
, pp. 601-620
-
-
Flavian, C.1
Guinaliu, M.2
-
14
-
-
0000009769
-
Evaluating structural equation models with unobservable and measurement error
-
Fornell, C. and Larcker, D.F. (1981) 'Evaluating structural equation models with unobservable and measurement error', Journal of Marketing Research, Vol.18, pp.39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
15
-
-
50849097878
-
Privacy issues in the era of ubiquitous commerce
-
Galanxhi, H. and Nah, F.F. (2006) 'Privacy issues in the era of ubiquitous commerce', Electronic Markets, Vol.16, No.3, pp.222-232.
-
(2006)
Electronic Markets
, vol.16
, Issue.3
, pp. 222-232
-
-
Galanxhi, H.1
Nah, F.F.2
-
16
-
-
4444274701
-
Consumer trust in B2C e-commerce and the importance of social presence
-
Gefen, D. and Straub, D. W. (2004) 'Consumer trust in B2C e-commerce and the importance of social presence', Omega, Vol.32, No.6, pp.407-424.
-
(2004)
Omega
, vol.32
, Issue.6
, pp. 407-424
-
-
Gefen, D.1
Straub, D.W.2
-
17
-
-
25444432074
-
RFID and the perception of control
-
Gunther, O. and Spiekermann, S. (2005) 'RFID and the perception of control', Communications of the ACM, Vol.48, No.9, pp.73-76.
-
(2005)
Communications of the ACM
, vol.48
, Issue.9
, pp. 73-76
-
-
Gunther, O.1
Spiekermann, S.2
-
18
-
-
0003506109
-
-
4th ed., Prentice-Hall, Englewood Cliffs, NJ
-
Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C. (1995) Multivariate Data Analysis with Readings, 4th ed., Prentice-Hall, Englewood Cliffs, NJ.
-
(1995)
Multivariate Data Analysis with Readings
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
19
-
-
43749090660
-
Consumer acceptance of RFID technology
-
Hossain, M.M. and Prybutok, V.R. (2008) 'Consumer acceptance of RFID technology', IEEE Transactions on Engineering Management, Vol.55, No.2, pp.316-328.
-
(2008)
IEEE Transactions on Engineering Management
, vol.55
, Issue.2
, pp. 316-328
-
-
Hossain, M.M.1
Prybutok, V.R.2
-
20
-
-
84898298169
-
U-city: The next paradigm of urban development
-
Foth, M. (Ed.): (Chapter 26), IGI Global, Hershey, PA
-
Hwang, J. (2008) 'U-city: the next paradigm of urban development', in Foth, M. (Ed.): Urban Informatics: Community Integration and Implementation (Chapter 26), IGI Global, Hershey, PA.
-
(2008)
Urban Informatics: Community Integration and Implementation
-
-
Hwang, J.1
-
21
-
-
0002135118
-
Consumer trust in an Internet store: A cross-cultural validation
-
Available:
-
Jarvenpaa, S.L. and Tractinsky, N. (1999) 'Consumer trust in an Internet store: a cross-cultural validation', Journal of Computer Mediated Communication, Vol.5, No.2, pp.1-36, Available: http://www.ascusc.org/jcmc/vol5/issue2/ jarvenpaa.html
-
(1999)
Journal of Computer Mediated Communication
, vol.5
, Issue.2
, pp. 1-36
-
-
Jarvenpaa, S.L.1
Tractinsky, N.2
-
23
-
-
34248147072
-
On the usefulness and ease of use of location-based services
-
Junglas, I.A. (2007) 'On the usefulness and ease of use of location-based services', International Journal of Mobile Communications, Vol.5, No.4, pp.389-408.
-
(2007)
International Journal of Mobile Communications
, vol.5
, Issue.4
, pp. 389-408
-
-
Junglas, I.A.1
-
24
-
-
76449093298
-
Investigating mobile wireless technology adoption: An extension of the technology acceptance model
-
Kim, S. and Garrison, G. (2008) 'Investigating mobile wireless technology adoption: an extension of the technology acceptance model', Information Systems Frontiers, Vol.5, pp.385-396.
-
(2008)
Information Systems Frontiers
, vol.5
, pp. 385-396
-
-
Kim, S.1
Garrison, G.2
-
25
-
-
34547888732
-
Enhancing the user experience with pervasive information systems
-
Kourouthanassis, P.E., Giaglis, G.M. and Vrehopoulos, A. (2008) 'Enhancing the user experience with pervasive information systems', International Journal of Information Management, Vol.27, No.5, pp.319-335.
-
(2008)
International Journal of Information Management
, vol.27
, Issue.5
, pp. 319-335
-
-
Kourouthanassis, P.E.1
Giaglis, G.M.2
Vrehopoulos, A.3
-
26
-
-
38149135822
-
Privacy protection for a secure u-city life
-
Lee, C., Lee, B. and Kong, Y. (2007) 'Privacy protection for a secure u-city life', Lecture Notes in Computer Science, Vol.4490, pp.685-692.
-
(2007)
Lecture Notes in Computer Science
, vol.4490
, pp. 685-692
-
-
Lee, C.1
Lee, B.2
Kong, Y.3
-
27
-
-
33744917835
-
An effective method for the location privacy in ubiquitous computing
-
Lee, G., Kim, W. and Kim, D. (2005) 'An effective method for the location privacy in ubiquitous computing', Lecture Notes in Computer Science, Vol.3823, pp.1006-1015.
-
(2005)
Lecture Notes in Computer Science
, vol.3823
, pp. 1006-1015
-
-
Lee, G.1
Kim, W.2
Kim, D.3
-
28
-
-
84901569597
-
Toward u-city: Concept, planning, and experiences in Korea
-
Yigitcanlar, T. (Ed.):, University of Queensland, Australia
-
Lee, S., Han, J., Leem, Y. and Yigitcanlar, T. (2008) 'Toward u-city: concept, planning, and experiences in Korea', in Yigitcanlar, T. (Ed.): Creative Urban Regions: Harnessing Urban Technologies to Support Knowledge City Initiatives, University of Queensland, Australia, pp.148-168.
-
(2008)
Creative Urban Regions: Harnessing Urban Technologies to Support Knowledge City Initiatives
, pp. 148-168
-
-
Lee, S.1
Han, J.2
Leem, Y.3
Yigitcanlar, T.4
-
29
-
-
59749089258
-
Activity-based scenarios for and approaches to ubiquitous e-Learning
-
Lefrere, P. (2009) 'Activity-based scenarios for and approaches to ubiquitous e-Learning', Personal and Ubiquitous Computing, Vol.13, pp.219-227.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, pp. 219-227
-
-
Lefrere, P.1
-
30
-
-
53449089315
-
Understanding privacy regulation in ubicomp interactions
-
Lehikoinen, J., Lehikoinen, J. and Huuskonen, P. (2008) 'Understanding privacy regulation in ubicomp interactions', Personal and Ubiquitous Computing, Vol.12, pp.543-553.
-
(2008)
Personal and Ubiquitous Computing
, vol.12
, pp. 543-553
-
-
Lehikoinen, J.1
Lehikoinen, J.2
Huuskonen, P.3
-
31
-
-
49249103650
-
Gender and loyalty in the context of mobile services
-
Lim, H. and Kumar, A. (2008) 'Gender and loyalty in the context of mobile services', Int. J. Mobile Communications, Vol.6, No.6, pp.714-728.
-
(2008)
Int. J. Mobile Communications
, vol.6
, Issue.6
, pp. 714-728
-
-
Lim, H.1
Kumar, A.2
-
32
-
-
67649512581
-
The adoption behaviour for mobile video call services
-
Lin, J. and Liu, E. (2009) 'The adoption behaviour for mobile video call services', Int. J. Mobile Communications, Vol.7, No.6, pp.646-666.
-
(2009)
Int. J. Mobile Communications
, vol.7
, Issue.6
, pp. 646-666
-
-
Lin, J.1
Liu, E.2
-
33
-
-
10644254580
-
Beyond concern: A privacy-trust-behavioral intention model of electronic commerce
-
Liu, C., Marchewka, J., Lu, J. and Yu, C. (2005) 'Beyond concern: a privacy-trust-behavioral intention model of electronic commerce', Information and Management, Vol.41, No.2, pp.289-304.
-
(2005)
Information and Management
, vol.41
, Issue.2
, pp. 289-304
-
-
Liu, C.1
Marchewka, J.2
Lu, J.3
Yu, C.4
-
34
-
-
33845729507
-
Structural equation modeling of factors that influence consumer internet purchase intentions of services
-
Nijite, D. and Parsa, H.G. (2005) 'Structural equation modeling of factors that influence consumer internet purchase intentions of services', Journal of Services Research, Vol.5, No.1, pp.43-59.
-
(2005)
Journal of Services Research
, vol.5
, Issue.1
, pp. 43-59
-
-
Nijite, D.1
Parsa, H.G.2
-
35
-
-
25444432606
-
RFID privacy issues and technical challenges
-
Ohkubo, M., Suzuki, K. and Kinoshita, S. (2005) 'RFID privacy issues and technical challenges', Communications of the ACM, Vol.48, No.9, pp.66-71.
-
(2005)
Communications of the ACM
, vol.48
, Issue.9
, pp. 66-71
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
36
-
-
50649098826
-
Using user preferences to enhance privacy in pervasive systems
-
13-18 April, Cancun, Mexico
-
Papadopoulou, E. (2007) 'Using user preferences to enhance privacy in pervasive systems', Proceeding of 3rd International Conference on Systems, 13-18 April, Cancun, Mexico, pp.271-276.
-
(2007)
Proceeding of 3rd International Conference on Systems
, pp. 271-276
-
-
Papadopoulou, E.1
-
37
-
-
3242661881
-
A cross-cultural comparison of Internet buying behavior
-
Park, C. and Jun, J. (2003) 'A cross-cultural comparison of Internet buying behavior', International Marketing Review, Vol.20, No.5, pp.534-553.
-
(2003)
International Marketing Review
, vol.20
, Issue.5
, pp. 534-553
-
-
Park, C.1
Jun, J.2
-
39
-
-
2442676514
-
Building effective online marketplaces with institution-based trust
-
Pavlou, P.A. and Gefen, D. (2004) 'Building effective online marketplaces with institution-based trust', Information Systems Research, Vol.15, No.1, pp.37-59.
-
(2004)
Information Systems Research
, vol.15
, Issue.1
, pp. 37-59
-
-
Pavlou, P.A.1
Gefen, D.2
-
41
-
-
67650917936
-
The importance of perceived trust, security and privacy in online trading systems
-
Roca, J., Garcia, J.J. and Vega, J.J. (2009) 'The importance of perceived trust, security and privacy in online trading systems', Information Management and Computer Security, Vol.17, No.2, pp.96-113.
-
(2009)
Information Management and Computer Security
, vol.17
, Issue.2
, pp. 96-113
-
-
Roca, J.1
Garcia, J.J.2
Vega, J.J.3
-
43
-
-
0002179878
-
Flaming, complaining, abstaining: How online users respond to privacy concerns
-
Sheehan, K.B. and Hoy, M.G. (1999) 'Flaming, complaining, abstaining: how online users respond to privacy concerns', Journal of Advertising, Vol.28, No.3, pp.37-51.
-
(1999)
Journal of Advertising
, vol.28
, Issue.3
, pp. 37-51
-
-
Sheehan, K.B.1
Hoy, M.G.2
-
44
-
-
57049088579
-
An experimental study on ubiquitous commerce adoption
-
Sheng, H., Nah, F. and Siau, K. (2008) 'An experimental study on ubiquitous commerce adoption', Journal of Association for Information Systems, Vol.9, No.6, pp.344-376.
-
(2008)
Journal of Association for Information Systems
, vol.9
, Issue.6
, pp. 344-376
-
-
Sheng, H.1
Nah, F.2
Siau, K.3
-
45
-
-
34347346117
-
User acceptance of mobile internet: Implication for convergence technologies
-
Shin, D. (2007) 'User acceptance of mobile internet: implication for convergence technologies', Interacting with Computers, Vol.19, No.4, pp.472-483.
-
(2007)
Interacting with Computers
, vol.19
, Issue.4
, pp. 472-483
-
-
Shin, D.1
-
46
-
-
38149017015
-
What do people do with digital multimedia broadcasting? Path analysis of structural equation modeling
-
Shin, D. (2008) 'What do people do with digital multimedia broadcasting? Path analysis of structural equation modeling', International Journal of Mobile Communications, Vol.6, No.1, pp.258-275.
-
(2008)
International Journal of Mobile Communications
, vol.6
, Issue.1
, pp. 258-275
-
-
Shin, D.1
-
47
-
-
59249088422
-
Determinants of customer acceptance of multi-service network: An implication for IP-based technologies
-
Shin, D. (2009a) 'Determinants of customer acceptance of multi-service network: an implication for IP-based technologies', Information and Management, Vol.46, No.1, pp.16-22.
-
(2009)
Information and Management
, vol.46
, Issue.1
, pp. 16-22
-
-
Shin, D.1
-
48
-
-
70350074357
-
A cross-national study of mobile internet usage: A comparison of US and Korean mobile internet users
-
Shin, D. (2009b) 'A cross-national study of mobile internet usage: a comparison of US and Korean mobile internet users', Journal of Global Information Management, Vol.17, No.4, pp.29-54.
-
(2009)
Journal of Global Information Management
, vol.17
, Issue.4
, pp. 29-54
-
-
Shin, D.1
-
50
-
-
34547663047
-
RFID, privacy and the perception of risk
-
Thiesse, F. (2007) 'RFID, privacy and the perception of risk', Journal of Strategic Information Systems, Vol.16, pp.214-232.
-
(2007)
Journal of Strategic Information Systems
, vol.16
, pp. 214-232
-
-
Thiesse, F.1
-
51
-
-
76449102073
-
-
Online Book Publication, Available at:, Accessed 2 December 2007
-
Towsend, A. (2008) Envisioning the Ubiquitous City, Online Book Publication, Available at: http://urban.blogs.com/research/2004/12/book- envisionin.html, Accessed 2 December 2007.
-
(2008)
Envisioning the Ubiquitous City
-
-
Towsend, A.1
-
52
-
-
0035780881
-
Privacy and security concerns as major barriers for ecommerce
-
Udo, G.J. (2001) 'Privacy and security concerns as major barriers for ecommerce', Information Management and Computer Security, Vol. 9, No.4, pp.165-174.
-
(2001)
Information Management and Computer Security
, vol.9
, Issue.4
, pp. 165-174
-
-
Udo, G.J.1
-
53
-
-
33947424708
-
Convenience and TAM in a ubiquitous computing environment
-
Yoon, C. and Kim, S. (2007) 'Convenience and TAM in a ubiquitous computing environment', Electronic Commerce Research and Applications, Vol.6, No.1, pp.102-112.
-
(2007)
Electronic Commerce Research and Applications
, vol.6
, Issue.1
, pp. 102-112
-
-
Yoon, C.1
Kim, S.2
|