-
1
-
-
0035368522
-
Online banking: A field study of drivers, development challenges and expectations
-
Aladwani, A., 2001. "Online banking: a field study of drivers, development challenges and expectations", International Journal of Information Management, 21(3): 213-25.
-
(2001)
International Journal of Information Management
, vol.21
, Issue.3
, pp. 213-225
-
-
Aladwani, A.1
-
2
-
-
5844306659
-
Privacy and security on the Internet: How to secure your personal information and company data
-
Attaran and VanLaar, 1999. "Privacy and security on the Internet: how to secure your personal information and company data", Information Management and Computer Security, pp: 241-46.
-
(1999)
Information Management and Computer Security
, pp. 241-246
-
-
Attaran1
van Laar2
-
3
-
-
81755182476
-
Banks on guard against hackers
-
Boston Herald
-
Barlotta, J., 1999. "Banks on guard against hackers", Business Today, Boston Herald, pp: 31.
-
(1999)
Business Today
, pp. 31
-
-
Barlotta, J.1
-
4
-
-
84986019135
-
The adoption of internet financial services: A qualitative study
-
Black, N.F., A. Lockett, H. Winklhofer and C. Ennew, 2001. "The adoption of internet financial services: a qualitative study", International Journal of Retail & Distribution Management, 29(8): 390-8.
-
(2001)
International Journal of Retail & Distribution Management
, vol.29
, Issue.8
, pp. 390-398
-
-
Black, N.F.1
Lockett, A.2
Winklhofer, H.3
Ennew, C.4
-
5
-
-
0242665376
-
Information security is information risk management
-
ACM Press, New York, NY
-
Blakely, B., E. McDermott and D. Geer, 2001. "Information security is information risk management", Proceedings of the 2001 Workshop on New Security Paradigms, ACM Press, New York, NY, pp: 97-104.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms
, pp. 97-104
-
-
Blakely, B.1
McDermott, E.2
Geer, D.3
-
6
-
-
84986067752
-
Service quality in Internet banking: The importance of customer role
-
Broderick, A.J. and S. Vachirapornpuk, 2002. "Service quality in Internet banking: the importance of customer role", Marketing Intelligence & Planning, 20(6): 327-335.
-
(2002)
Marketing Intelligence & Planning
, vol.20
, Issue.6
, pp. 327-335
-
-
Broderick, A.J.1
Vachirapornpuk, S.2
-
7
-
-
49249105650
-
-
available at:, (accessed February 2007)
-
Bruce, L., 2003. "Information security-key issues and developments", available at: www.pwcglobal.com/jm/images/pdf/Information%20Security%20Risk.pdf (accessed February 2007).
-
(2003)
Information security-key issues and developments
-
-
Bruce, L.1
-
8
-
-
81755175787
-
-
Business Week, Business Week, 16 March
-
Business Week, 1998. "Business Week/Harris poll: online security", Business Week, 16 March, pp: 102.
-
(1998)
Business Week/Harris poll: Online security
, pp. 102
-
-
-
9
-
-
2442654928
-
Perceived information security, financial liability and consumer trust in electronic commerce transactions
-
Chellappa, R.K. and P.A. Pavlou, 2002. "Perceived information security, financial liability and consumer trust in electronic commerce transactions", Logistics information Management, 15(5/6): 358-368.
-
(2002)
Logistics information Management
, vol.15
, Issue.5-6
, pp. 358-368
-
-
Chellappa, R.K.1
Pavlou, P.A.2
-
11
-
-
84986047311
-
The diffusion of Internet banking among Singapore consumers
-
Cunningham, J.B., 2003. "The diffusion of Internet banking among Singapore consumers", International Journal of Bank Marketing, 21(1): 16-28.
-
(2003)
International Journal of Bank Marketing
, vol.21
, Issue.1
, pp. 16-28
-
-
Cunningham, J.B.1
-
12
-
-
0031502147
-
An examination of the nature of trust in buyer-seller relationship
-
Doney, P.M., J.P. Cannon, 1997. "An examination of the nature of trust in buyer-seller relationship", Journal of Marketing, 61(4): 35-51.
-
(1997)
Journal of Marketing
, vol.61
, Issue.4
, pp. 35-51
-
-
Doney, P.M.1
Cannon, J.P.2
-
13
-
-
3242723608
-
The call of the web: Should you take the plunge with an internet home page? And, if so, how?
-
Duclaux, D., 1996. "The call of the web: should you take the plunge with an internet home page? And, if so, how?", ABA Banking Journal, 88: 200-16.
-
(1996)
ABA Banking Journal
, vol.88
, pp. 200-216
-
-
Duclaux, D.1
-
15
-
-
70449332446
-
-
FFIEC (Federal financial Institutions Examination Council), viewed at, last accessed June 2008
-
FFIEC (Federal financial Institutions Examination Council), 2009, Authentication in an Internet. Banking Environment, viewed at http://www.ffiec.gov, last accessed June 2008.
-
(2009)
Authentication in an Internet. Banking Environment
-
-
-
17
-
-
84986047311
-
The diffusion of internet banking among Singapore consumers
-
Gerrard, P. and J. Cunningham, 2003. "The diffusion of internet banking among Singapore consumers", International Journal of Bank Marketing, 21(1): 16-28.
-
(2003)
International Journal of Bank Marketing
, vol.21
, Issue.1
, pp. 16-28
-
-
Gerrard, P.1
Cunningham, J.2
-
19
-
-
0003506109
-
-
Prentice-Hall International, Upper Saddle River, NJ
-
Hair, J.F., R.E. Anderson, R.L. Tatham and W.C. Black, 1998. "Multivariate Data Analysis", Prentice-Hall International, Upper Saddle River, NJ.
-
(1998)
Multivariate Data Analysis
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
20
-
-
0003506109
-
-
6th ed., Prentice-Hall, Englewood Cliffs, NJ
-
Hair, J., W. Black, B. Babin, R. Anderson and R. Tatham, 2005. "Multivariate Data Analysis", 6th ed., Prentice-Hall, Englewood Cliffs, NJ.
-
(2005)
Multivariate Data Analysis
-
-
Hair, J.1
Black, W.2
Babin, B.3
Anderson, R.4
Tatham, R.5
-
21
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
Hoffer, J. and D. Straub, 1989. "The 9 to 5 underground: are you policing computer crimes?", Sloan Management Review, 30(4): 35-43.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-43
-
-
Hoffer, J.1
Straub, D.2
-
22
-
-
81755187542
-
-
School of Computing and Mathematics, Deakin University, Geelong., thesis (honours)
-
Hutchinson, D., 2000. "A framework of authentication for Internet banking", School of Computing and Mathematics, Deakin University, Geelong., thesis (honours).
-
(2000)
A framework of authentication for Internet banking
-
-
Hutchinson, D.1
-
23
-
-
81755175784
-
A framework of security authentication for internet banking
-
paper presented at the, September, Austrian Computer Society, Linz
-
Hutchinson, D. and M. Warren, 2001. "A framework of security authentication for internet banking", paper presented at the Conference on Information Integration and Web-based Applications & Services (IIWAS), September, Austrian Computer Society, Linz.
-
(2001)
Conference on Information Integration and Web-based Applications & Services (IIWAS)
-
-
Hutchinson, D.1
Warren, M.2
-
25
-
-
57349153095
-
Factors determining organizational commitment on security controls in accounting-based information systems
-
Intan Salwani, M., M.D. Norzaidi and C.C. Siong, 2009. "Factors determining organizational commitment on security controls in accounting-based information systems", Int. J. Services and Standards, 5(1): 51-66.
-
(2009)
Int. J. Services and Standards
, vol.5
, Issue.1
, pp. 51-66
-
-
Intan Salwani, M.1
Norzaidi, M.D.2
Siong, C.C.3
-
26
-
-
67650680126
-
The role of perceived usefulness, perceived ease of use, security and privacy, and customer attitude to engender customer adaption in the context of electronic banking
-
Jahangir, N. and N. Begum, 2008. "The role of perceived usefulness, perceived ease of use, security and privacy, and customer attitude to engender customer adaption in the context of electronic banking", Africa Journal of Business Management, 2(1): 32-40.
-
(2008)
Africa Journal of Business Management
, vol.2
, Issue.1
, pp. 32-40
-
-
Jahangir, N.1
Begum, N.2
-
27
-
-
0039101844
-
Trust requirements in e-business: A conceptual framework for understanding the needs and concerns of different stakeholders
-
Jones, S., M. Wilikens, P. Morris, M. Masera, 2000. "Trust requirements in e-business: a conceptual framework for understanding the needs and concerns of different stakeholders", Communications of the ACM, 43(12): 81-7.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 81-87
-
-
Jones, S.1
Wilikens, M.2
Morris, P.3
Masera, M.4
-
28
-
-
81755175781
-
-
Kelly, G. and B. McKenzie, 2002. "Security, privacy, and confidentiality issues", pp: 127-36.
-
(2002)
Security, privacy, and confidentiality issues
, pp. 127-136
-
-
Kelly, G.1
McKenzie, B.2
-
32
-
-
3543101536
-
Electronic commerce usage in business-to-business purchasing
-
Min, H., W.P. Galle, 1999. "Electronic commerce usage in business-to-business purchasing", International Journal of Operations & Production Management, 19(9): 909-21.
-
(1999)
International Journal of Operations & Production Management
, vol.19
, Issue.9
, pp. 909-921
-
-
Min, H.1
Galle, W.P.2
-
33
-
-
21344475322
-
The commitment Trust theory of relationship marketing
-
Morgan, R. and Hunt, 1994. "The commitment Trust theory of relationship marketing" Journal of Marketing, 58: 20-38.
-
(1994)
Journal of Marketing
, vol.58
, pp. 20-38
-
-
Morgan, R.1
Hunt2
-
34
-
-
81755187545
-
-
National Office for the Information Economy (NOIE), Australian Bankers Association (ABA) and Australian Information Industry Association (AIIA), August, available at:
-
National Office for the Information Economy (NOIE), Australian Bankers Association (ABA) and Australian Information Industry Association (AIIA), 1999. "Banking on the Internet: a guide to personal internet banking services", August, available at: www.noie.gov.au.
-
(1999)
Banking on the Internet: A guide to personal internet banking services
-
-
-
35
-
-
84869147734
-
Building Security and Trust in Online Banking
-
in, Portland, USA, 02-07 April 2005, ACM Press, New York
-
Nilson, M., A. Adams, S. Herd, 2005. "Building Security and Trust in Online Banking", in CHI '05 Extended Abstracts on Human Factors in Computing Systems, Portland, USA, 02-07 April 2005, ACM Press, New York, pp: 1701-1704.
-
(2005)
CHI '05 Extended Abstracts on Human Factors in Computing Systems
, pp. 1701-1704
-
-
Nilson, M.1
Adams, A.2
Herd, S.3
-
36
-
-
81755164139
-
Evaluating the intranet acceptance with the extended tasktechnology fit model: Empirical evidence in Malaysian maritime industry
-
and the paper was presented at IJAS Conference, Harvard University, MA, USA
-
Norzaidi, M.D. and Intan Salwani, 2010. Evaluating the intranet acceptance with the extended tasktechnology fit model: empirical evidence in Malaysian maritime industry, International Journal of Arts and Science, 3(12): 294-306 and the paper was presented at IJAS Conference, Harvard University, MA, USA.
-
(2010)
International Journal of Arts and Science
, vol.3
, Issue.12
, pp. 294-306
-
-
Norzaidi, M.D.1
Salwani, I.2
-
37
-
-
79955619489
-
The indirect effects of intranet functionalities on middle managers' performance
-
Norzaidi, M.D., S.C. Chong and Intan M. Salwani, 2011. "The indirect effects of intranet functionalities on middle managers' performance", Kybernetes, 40(1/2): 166-181.
-
(2011)
Kybernetes
, vol.40
, Issue.1-2
, pp. 166-181
-
-
Norzaidi, M.D.1
Chong, S.C.2
Intan Salwani, M.3
-
38
-
-
44349161327
-
TECHRPOVED model: A new invention of information technology (IT) diagnostic tool
-
paper presented at, Pittsburgh, PA
-
Norzaidi, M.D. and M. Intan Salwani, 2007a. "TECHRPOVED model: a new invention of information technology (IT) diagnostic tool", paper presented at Invention and New Products (INPEX), Pittsburgh, PA.
-
(2007)
Invention and New Products (INPEX)
-
-
Norzaidi, M.D.1
Intan Salwani, M.2
-
39
-
-
44349170482
-
Perceived resistance, user resistance and managers' performance in the Malaysian port industry
-
Norzaidi, M.D., S.C. Chong and M. Intan Salwani, 2008a. "Perceived resistance, user resistance and managers' performance in the Malaysian port industry", Aslib Proceedings: New Information Perspectives, 60(3): 242-64.
-
(2008)
Aslib Proceedings: New Information Perspectives
, vol.60
, Issue.3
, pp. 242-264
-
-
Norzaidi, M.D.1
Chong, S.C.2
Intan Salwani, M.3
-
42
-
-
84986131366
-
An empirical investigation of the Turkish consumers' acceptance of Internet banking services
-
Polatoglu, V.N. and S. Ekin, 2001. "An empirical investigation of the Turkish consumers' acceptance of Internet banking services", International Journal of Bank Marketing, 19(4): 156-165.
-
(2001)
International Journal of Bank Marketing
, vol.19
, Issue.4
, pp. 156-165
-
-
Polatoglu, V.N.1
Ekin, S.2
-
45
-
-
0000541109
-
An Extension of Shapiro and Wilk's W Test for Normality to Large Samples
-
Royston, J.P., 1982. "An Extension of Shapiro and Wilk's W Test for Normality to Large Samples", Applied Statistics, 31(2): 115-124.
-
(1982)
Applied Statistics
, vol.31
, Issue.2
, pp. 115-124
-
-
Royston, J.P.1
-
46
-
-
84986105989
-
Information security in business environments
-
MCB University Press
-
Sandersons, E. and K.A. Forcht, 1996. "Information security in business environments", Information Management & Computer Security, MCB University Press, 4/1: 32-37.
-
(1996)
Information Management & Computer Security
, vol.4
, Issue.1
, pp. 32-37
-
-
Sandersons, E.1
Forcht, K.A.2
-
48
-
-
84993077279
-
Adoption of internet banking by Australian consumers: An empirical investigation
-
Sathye, M., 1999. "Adoption of internet banking by Australian consumers: an empirical investigation", International Journal of Bank Marketing, 17(7): 324-34.
-
(1999)
International Journal of Bank Marketing
, vol.17
, Issue.7
, pp. 324-334
-
-
Sathye, M.1
-
49
-
-
16444376120
-
Two-Factor Authentication: Too Little, Too Late
-
Schneier, B., 2005. "Two-Factor Authentication: Too Little, Too Late", Communications of the ACM, 48(4).
-
(2005)
Communications of the ACM
, vol.48
, Issue.4
-
-
Schneier, B.1
-
53
-
-
0000898845
-
An Analysis of Variance Test for Normality (Complete Samples)
-
(December)
-
Shapiro, S.S. and M.B. Wilk, 1965. "An Analysis of Variance Test for Normality (Complete Samples)", Biometrika, 52(3/4)(December): 591-611.
-
(1965)
Biometrika
, vol.52
, Issue.3-4
, pp. 591-611
-
-
Shapiro, S.S.1
Wilk, M.B.2
-
54
-
-
57049088579
-
An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy corcerns
-
Sheng, H., F.F.H. Nah and K. Siau, 2008. "An experimental study on ubiquitous commerce adoption: impact of personalization and privacy corcerns, " Journal of the AIS, 9(6): 344-76.
-
(2008)
Journal of the AIS
, vol.9
, Issue.6
, pp. 344-376
-
-
Sheng, H.1
Nah, F.F.H.2
Siau, K.3
-
55
-
-
3042771085
-
The use of a decomposed theory of planned behavior to study internet banking in Taiwan
-
Shih, Y. and K. Fang, 2004. "The use of a decomposed theory of planned behavior to study internet banking in Taiwan", Internet Research, 14(3): 213-23.
-
(2004)
Internet Research
, vol.14
, Issue.3
, pp. 213-223
-
-
Shih, Y.1
Fang, K.2
-
57
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
Smith, H.J., S.J. Milberg and S.J. Burke, 1996. "Information privacy: measuring individuals' concerns about organizational practices, " MIS Quarterly, 20(2): 167-96.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
Burke, S.J.3
-
58
-
-
40249113990
-
Internet banking and quality of service: Perspective from a developing nation in the Middle East
-
Sohail, M.S. and N.M. Shaikh, 2008. "Internet banking and quality of service: Perspective from a developing nation in the Middle East", Online Information Review, 32(1): 58-72.
-
(2008)
Online Information Review
, vol.32
, Issue.1
, pp. 58-72
-
-
Sohail, M.S.1
Shaikh, N.M.2
-
59
-
-
81755187548
-
Making money off 'typosquatting': Firms tap domain typos to grab clicks and ad bucks
-
in, 22 September, available at:
-
Sullivan, B., 2000. "Making money off 'typosquatting': firms tap domain typos to grab clicks and ad bucks", in MSNBC Technology Section, 22 September, available at: http://zdnet.com.
-
(2000)
MSNBC Technology Section
-
-
Sullivan, B.1
-
61
-
-
0033657872
-
Information security-the third wave?
-
Von Solms, B., 2000. "Information security-the third wave?", Computers & Security, 19(7): 615-20.
-
(2000)
Computers & Security
, vol.19
, Issue.7
, pp. 615-620
-
-
von Solms, B.1
-
62
-
-
0034814690
-
Information security-a multidimensional discipline
-
Von Solms, B., 2001. "Information security-a multidimensional discipline", Computers & Security, 20(6): 501-8.
-
(2001)
Computers & Security
, vol.20
, Issue.6
, pp. 501-508
-
-
von Solms, B.1
-
63
-
-
33747053670
-
Information security-the fourth wave
-
Von Solms, B., 2006. "Information security-the fourth wave", Computers & Security, 25(3): 165-8.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 165-168
-
-
von Solms, B.1
-
64
-
-
30844462543
-
Diffusion of mobile entertainment in Malaysia: Drivers and barriers
-
Wong, C.C. and P.L. Hiew, 2005. "Diffusion of mobile entertainment in Malaysia: drivers and barriers", Enformatika, 5: 263-6.
-
(2005)
Enformatika
, vol.5
, pp. 263-266
-
-
Wong, C.C.1
Hiew, P.L.2
|