-
2
-
-
79951918985
-
Cloud computing adoption and usage in community colleges
-
Behrend T., Wiebe E., London J., Johnson E. Cloud computing adoption and usage in community colleges. Behaviour & Information Technology 2011, 30(2):231-240.
-
(2011)
Behaviour & Information Technology
, vol.30
, Issue.2
, pp. 231-240
-
-
Behrend, T.1
Wiebe, E.2
London, J.3
Johnson, E.4
-
3
-
-
84969447074
-
U-government: A framework for the evolution of e-government
-
Belanger F., Carter L., Schaupp L.C. U-government: A framework for the evolution of e-government. Electronic Government 2005, 2(4):426-445.
-
(2005)
Electronic Government
, vol.2
, Issue.4
, pp. 426-445
-
-
Belanger, F.1
Carter, L.2
Schaupp, L.C.3
-
4
-
-
33745082091
-
Model of adoption of technology in households
-
Brown S.A., Venkatesh V. Model of adoption of technology in households. MIS Quarterly 2005, 29(3):399-426.
-
(2005)
MIS Quarterly
, vol.29
, Issue.3
, pp. 399-426
-
-
Brown, S.A.1
Venkatesh, V.2
-
5
-
-
2442654928
-
Perceived information security, financial liability and consumer trust in e-commerce transactions
-
Chellappa R., Pavlou P. Perceived information security, financial liability and consumer trust in e-commerce transactions. Logistics Information Management 2002, 15:358-368.
-
(2002)
Logistics Information Management
, vol.15
, pp. 358-368
-
-
Chellappa, R.1
Pavlou, P.2
-
6
-
-
57149123524
-
The empirical study of automotive telematics acceptance in Taiwan
-
Chen H., Chen S. The empirical study of automotive telematics acceptance in Taiwan. International Journal of Mobile Communications 2009, 7(1):50-65.
-
(2009)
International Journal of Mobile Communications
, vol.7
, Issue.1
, pp. 50-65
-
-
Chen, H.1
Chen, S.2
-
7
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis F. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 1989, 13(3):319-340.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.1
-
8
-
-
77957895284
-
The economic impact of cloud computing on business creation, employment and output in the E.U
-
Etro F. The economic impact of cloud computing on business creation, employment and output in the E.U. Review of Business and Economics 2009, 54(2):179-208.
-
(2009)
Review of Business and Economics
, vol.54
, Issue.2
, pp. 179-208
-
-
Etro, F.1
-
9
-
-
33646354609
-
Consumer trust, perceived security and privacy policy
-
Flavin C., Guinaliu M. Consumer trust, perceived security and privacy policy. Industrial Management & Data Systems 2006, 106(5):601-620.
-
(2006)
Industrial Management & Data Systems
, vol.106
, Issue.5
, pp. 601-620
-
-
Flavin, C.1
Guinaliu, M.2
-
10
-
-
0000009769
-
Evaluating structural equation models with unobservable and measurement error
-
Fornell C., Larcker D.F. Evaluating structural equation models with unobservable and measurement error. Journal of Marketing Research 1981, 18:39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
11
-
-
0003506109
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Hair J.F., Anderson R.E., Tatham R.L., Black W.C. Multivariate data analysis with readings 1995, Prentice-Hall, Englewood Cliffs, NJ. 4th ed.
-
(1995)
Multivariate data analysis with readings
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
12
-
-
56949108033
-
Expanding the TAM to examine personal computing technology utilization in government agencies in developing countries
-
Hamner M., Qazi R. Expanding the TAM to examine personal computing technology utilization in government agencies in developing countries. Government Information Quarterly 2009, 26:128-136.
-
(2009)
Government Information Quarterly
, vol.26
, pp. 128-136
-
-
Hamner, M.1
Qazi, R.2
-
15
-
-
33744777132
-
Determinants of user acceptance of the e-government services: The case of online tax filing and payment system
-
Hung S., Chang C., Yu T. Determinants of user acceptance of the e-government services: The case of online tax filing and payment system. Government Information Quarterly 2006, 23:97-122.
-
(2006)
Government Information Quarterly
, vol.23
, pp. 97-122
-
-
Hung, S.1
Chang, C.2
Yu, T.3
-
16
-
-
62949178775
-
User acceptance of intergovernmental services
-
Hung S., Tang K., Chang C., Ke C. User acceptance of intergovernmental services. Government Information Quarterly 2009, 26:387-397.
-
(2009)
Government Information Quarterly
, vol.26
, pp. 387-397
-
-
Hung, S.1
Tang, K.2
Chang, C.3
Ke, C.4
-
19
-
-
84875407079
-
-
Korea Communications Commissions, Seoul, Korea, (June 2011)
-
KCC A white paper on cloud computing blueprint 2011, Korea Communications Commissions, Seoul, Korea, (June 2011).
-
(2011)
KCC A white paper on cloud computing blueprint
-
-
-
20
-
-
76449093298
-
Investigating mobile wireless technology adoption
-
Kim S., Garrison G. Investigating mobile wireless technology adoption. Information Systems Frontiers 2008, 5:385-396.
-
(2008)
Information Systems Frontiers
, vol.5
, pp. 385-396
-
-
Kim, S.1
Garrison, G.2
-
22
-
-
84901569597
-
Toward u-city: Concept, planning, and experiences in Korea
-
University of Queensland, Australia, T. Yigitcanlar (Ed.)
-
Lee S., Han J., Leem Y., Yigitcanlar T. Toward u-city: Concept, planning, and experiences in Korea. Creative urban regions: Harnessing urban technologies to support knowledge city initiatives 2008, 148-168. University of Queensland, Australia. T. Yigitcanlar (Ed.).
-
(2008)
Creative urban regions: Harnessing urban technologies to support knowledge city initiatives
, pp. 148-168
-
-
Lee, S.1
Han, J.2
Leem, Y.3
Yigitcanlar, T.4
-
23
-
-
33744917835
-
An effective method for the location privacy in ubiquitous computing
-
Lee G., Kim W., Kim D. An effective method for the location privacy in ubiquitous computing. Lecture Notes in Computer Science 2005, 3823:1006-1015.
-
(2005)
Lecture Notes in Computer Science
, vol.3823
, pp. 1006-1015
-
-
Lee, G.1
Kim, W.2
Kim, D.3
-
25
-
-
62949224776
-
User acceptance of Malaysian government multipurpose smartcard applications
-
Loo W., Yeow P., Chong S. User acceptance of Malaysian government multipurpose smartcard applications. Government Information Quarterly 2009, 26:358-367.
-
(2009)
Government Information Quarterly
, vol.26
, pp. 358-367
-
-
Loo, W.1
Yeow, P.2
Chong, S.3
-
26
-
-
79951515545
-
Cloud computing: The business perspective
-
Marston S., Li Z., Bandyopadhyay S., Zhang J., Ghalsasi A. Cloud computing: The business perspective. Decision Support Systems 2011, 51(1):176-189.
-
(2011)
Decision Support Systems
, vol.51
, Issue.1
, pp. 176-189
-
-
Marston, S.1
Li, Z.2
Bandyopadhyay, S.3
Zhang, J.4
Ghalsasi, A.5
-
27
-
-
77954051808
-
-
National Institute of Standards and Technology, Information Technology Laboratory, (October 7, 2009. Available at
-
Mell P., Grance T. The NIST definition of cloud computing 2009, National Institute of Standards and Technology, Information Technology Laboratory, (October 7, 2009. Available at http://www.csrc.nist.gov/publications/drafts).
-
(2009)
The NIST definition of cloud computing
-
-
Mell, P.1
Grance, T.2
-
28
-
-
77953614890
-
Identifying the security risks associated with governmental use of cloud computing
-
Paquette S., Jaeger P., Wilson S. Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 2010, 27(3):245-253.
-
(2010)
Government Information Quarterly
, vol.27
, Issue.3
, pp. 245-253
-
-
Paquette, S.1
Jaeger, P.2
Wilson, S.3
-
29
-
-
33749071356
-
Using the technology acceptance model to explain how attitudes determine internet usage
-
Porter C.E., Donthu N. Using the technology acceptance model to explain how attitudes determine internet usage. Journal of Business Research 2006, 59(9):999-1007.
-
(2006)
Journal of Business Research
, vol.59
, Issue.9
, pp. 999-1007
-
-
Porter, C.E.1
Donthu, N.2
-
30
-
-
33646417079
-
Understanding e-learning continuance intention: An extension of the technology acceptance model
-
Roca J.C., Chiu C.-M., Martinez F.J. Understanding e-learning continuance intention: An extension of the technology acceptance model. International Journal of Human-Computer Studies 2006, 64(8):683-696.
-
(2006)
International Journal of Human-Computer Studies
, vol.64
, Issue.8
, pp. 683-696
-
-
Roca, J.C.1
Chiu, C.-M.2
Martinez, F.J.3
-
31
-
-
34347346117
-
User acceptance of mobile internet: Implication for convergence technologies
-
Shin D. User acceptance of mobile internet: Implication for convergence technologies. Interacting with Computers 2007, 19(4):472-483.
-
(2007)
Interacting with Computers
, vol.19
, Issue.4
, pp. 472-483
-
-
Shin, D.1
-
32
-
-
38149017015
-
What do people do with digital multimedia broadcasting?
-
Shin D. What do people do with digital multimedia broadcasting?. International Journal of Mobile Communications 2008, 6(1):258-275.
-
(2008)
International Journal of Mobile Communications
, vol.6
, Issue.1
, pp. 258-275
-
-
Shin, D.1
-
33
-
-
77955428343
-
The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption
-
Shin D. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers 2010, 22(5):428-438.
-
(2010)
Interacting with Computers
, vol.22
, Issue.5
, pp. 428-438
-
-
Shin, D.1
-
34
-
-
84856807255
-
What makes consumers use VoIP over mobile phones?
-
Shin D. What makes consumers use VoIP over mobile phones?. Telecommunications Policy 2012, 36(4):311-323.
-
(2012)
Telecommunications Policy
, vol.36
, Issue.4
, pp. 311-323
-
-
Shin, D.1
-
35
-
-
77955641901
-
Privacy and consumer risks in cloud computing
-
Svantesson D., Clarke R. Privacy and consumer risks in cloud computing. Computer Law & Security Review 2010, 26(4):391-397.
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.4
, pp. 391-397
-
-
Svantesson, D.1
Clarke, R.2
-
37
-
-
81255167296
-
Evaluation of user behavior trust in cloud computing
-
Tian L., Lin C., Ni Y. Evaluation of user behavior trust in cloud computing. 2010 international conference on computer application and system modeling, Taiyuan, China, 22-24 Oct. 2010 2010, 567-572.
-
(2010)
2010 international conference on computer application and system modeling, Taiyuan, China, 22-24 Oct. 2010
, pp. 567-572
-
-
Tian, L.1
Lin, C.2
Ni, Y.3
-
38
-
-
0035780881
-
Privacy and security concerns as major barriers for e-commerce
-
Udo G.J. Privacy and security concerns as major barriers for e-commerce. Information Management and Computer Security 2001, 9(4):165-174.
-
(2001)
Information Management and Computer Security
, vol.9
, Issue.4
, pp. 165-174
-
-
Udo, G.J.1
-
40
-
-
0002888544
-
Longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges
-
Venkatesh V., Brown S.A. Longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges. MISQ 2001, 25(1):71-102.
-
(2001)
MISQ
, vol.25
, Issue.1
, pp. 71-102
-
-
Venkatesh, V.1
Brown, S.A.2
-
42
-
-
84875395301
-
Towards interusability: HCI for cloud computing and embedded devices
-
Voi H., Light A., Rowland C. Towards interusability: HCI for cloud computing and embedded devices. CHI 2011, May 7-12, 2011, Vancouver, BC, Canada 2011.
-
(2011)
CHI 2011, May 7-12, 2011, Vancouver, BC, Canada
-
-
Voi, H.1
Light, A.2
Rowland, C.3
-
43
-
-
80051911580
-
The cloudy future of government IT: Cloud computing and the public sector around the world
-
Wyld D. The cloudy future of government IT: Cloud computing and the public sector around the world. International Journal of Web & Semantic Technology 2010, 1(1):1-20.
-
(2010)
International Journal of Web & Semantic Technology
, vol.1
, Issue.1
, pp. 1-20
-
-
Wyld, D.1
-
44
-
-
79954446452
-
What tasks are suitable for handheld devices?
-
Xu S., Fang X., Chan S., Brzezinski J. What tasks are suitable for handheld devices?. Proceedings of HCI international 2003, human computer interaction: Theory and practice 2003, 2:333-337.
-
(2003)
Proceedings of HCI international 2003, human computer interaction: Theory and practice
, vol.2
, pp. 333-337
-
-
Xu, S.1
Fang, X.2
Chan, S.3
Brzezinski, J.4
-
46
-
-
33947424708
-
Convenience and TAM in a ubiquitous computing environment: The case of wireless LAN
-
Yoon C., Kim S. Convenience and TAM in a ubiquitous computing environment: The case of wireless LAN. Electronic Commerce Research and Applications 2007, 6(1):102-112.
-
(2007)
Electronic Commerce Research and Applications
, vol.6
, Issue.1
, pp. 102-112
-
-
Yoon, C.1
Kim, S.2
-
47
-
-
79954986542
-
Securing e-government and e-voting with an open cloud computing architecture
-
Zissis D., Lekkas D. Securing e-government and e-voting with an open cloud computing architecture. Government Information Quarterly 2011, 28(2):239-251.
-
(2011)
Government Information Quarterly
, vol.28
, Issue.2
, pp. 239-251
-
-
Zissis, D.1
Lekkas, D.2
|