메뉴 건너뛰기




Volumn 30, Issue 2, 2013, Pages 194-203

User centric cloud service model in public sectors: Policy implications of cloud services

Author keywords

Access; Cloud computing; Cloud policy; Public sector; Reliability; Security; Technology acceptance model

Indexed keywords


EID: 84875404865     PISSN: 0740624X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.giq.2012.06.012     Document Type: Article
Times cited : (120)

References (47)
  • 3
    • 84969447074 scopus 로고    scopus 로고
    • U-government: A framework for the evolution of e-government
    • Belanger F., Carter L., Schaupp L.C. U-government: A framework for the evolution of e-government. Electronic Government 2005, 2(4):426-445.
    • (2005) Electronic Government , vol.2 , Issue.4 , pp. 426-445
    • Belanger, F.1    Carter, L.2    Schaupp, L.C.3
  • 4
    • 33745082091 scopus 로고    scopus 로고
    • Model of adoption of technology in households
    • Brown S.A., Venkatesh V. Model of adoption of technology in households. MIS Quarterly 2005, 29(3):399-426.
    • (2005) MIS Quarterly , vol.29 , Issue.3 , pp. 399-426
    • Brown, S.A.1    Venkatesh, V.2
  • 5
    • 2442654928 scopus 로고    scopus 로고
    • Perceived information security, financial liability and consumer trust in e-commerce transactions
    • Chellappa R., Pavlou P. Perceived information security, financial liability and consumer trust in e-commerce transactions. Logistics Information Management 2002, 15:358-368.
    • (2002) Logistics Information Management , vol.15 , pp. 358-368
    • Chellappa, R.1    Pavlou, P.2
  • 6
    • 57149123524 scopus 로고    scopus 로고
    • The empirical study of automotive telematics acceptance in Taiwan
    • Chen H., Chen S. The empirical study of automotive telematics acceptance in Taiwan. International Journal of Mobile Communications 2009, 7(1):50-65.
    • (2009) International Journal of Mobile Communications , vol.7 , Issue.1 , pp. 50-65
    • Chen, H.1    Chen, S.2
  • 7
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis F. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 1989, 13(3):319-340.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.1
  • 8
    • 77957895284 scopus 로고    scopus 로고
    • The economic impact of cloud computing on business creation, employment and output in the E.U
    • Etro F. The economic impact of cloud computing on business creation, employment and output in the E.U. Review of Business and Economics 2009, 54(2):179-208.
    • (2009) Review of Business and Economics , vol.54 , Issue.2 , pp. 179-208
    • Etro, F.1
  • 9
    • 33646354609 scopus 로고    scopus 로고
    • Consumer trust, perceived security and privacy policy
    • Flavin C., Guinaliu M. Consumer trust, perceived security and privacy policy. Industrial Management & Data Systems 2006, 106(5):601-620.
    • (2006) Industrial Management & Data Systems , vol.106 , Issue.5 , pp. 601-620
    • Flavin, C.1    Guinaliu, M.2
  • 10
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable and measurement error
    • Fornell C., Larcker D.F. Evaluating structural equation models with unobservable and measurement error. Journal of Marketing Research 1981, 18:39-50.
    • (1981) Journal of Marketing Research , vol.18 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 12
    • 56949108033 scopus 로고    scopus 로고
    • Expanding the TAM to examine personal computing technology utilization in government agencies in developing countries
    • Hamner M., Qazi R. Expanding the TAM to examine personal computing technology utilization in government agencies in developing countries. Government Information Quarterly 2009, 26:128-136.
    • (2009) Government Information Quarterly , vol.26 , pp. 128-136
    • Hamner, M.1    Qazi, R.2
  • 15
    • 33744777132 scopus 로고    scopus 로고
    • Determinants of user acceptance of the e-government services: The case of online tax filing and payment system
    • Hung S., Chang C., Yu T. Determinants of user acceptance of the e-government services: The case of online tax filing and payment system. Government Information Quarterly 2006, 23:97-122.
    • (2006) Government Information Quarterly , vol.23 , pp. 97-122
    • Hung, S.1    Chang, C.2    Yu, T.3
  • 19
    • 84875407079 scopus 로고    scopus 로고
    • Korea Communications Commissions, Seoul, Korea, (June 2011)
    • KCC A white paper on cloud computing blueprint 2011, Korea Communications Commissions, Seoul, Korea, (June 2011).
    • (2011) KCC A white paper on cloud computing blueprint
  • 20
    • 76449093298 scopus 로고    scopus 로고
    • Investigating mobile wireless technology adoption
    • Kim S., Garrison G. Investigating mobile wireless technology adoption. Information Systems Frontiers 2008, 5:385-396.
    • (2008) Information Systems Frontiers , vol.5 , pp. 385-396
    • Kim, S.1    Garrison, G.2
  • 23
    • 33744917835 scopus 로고    scopus 로고
    • An effective method for the location privacy in ubiquitous computing
    • Lee G., Kim W., Kim D. An effective method for the location privacy in ubiquitous computing. Lecture Notes in Computer Science 2005, 3823:1006-1015.
    • (2005) Lecture Notes in Computer Science , vol.3823 , pp. 1006-1015
    • Lee, G.1    Kim, W.2    Kim, D.3
  • 25
    • 62949224776 scopus 로고    scopus 로고
    • User acceptance of Malaysian government multipurpose smartcard applications
    • Loo W., Yeow P., Chong S. User acceptance of Malaysian government multipurpose smartcard applications. Government Information Quarterly 2009, 26:358-367.
    • (2009) Government Information Quarterly , vol.26 , pp. 358-367
    • Loo, W.1    Yeow, P.2    Chong, S.3
  • 27
    • 77954051808 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Information Technology Laboratory, (October 7, 2009. Available at
    • Mell P., Grance T. The NIST definition of cloud computing 2009, National Institute of Standards and Technology, Information Technology Laboratory, (October 7, 2009. Available at http://www.csrc.nist.gov/publications/drafts).
    • (2009) The NIST definition of cloud computing
    • Mell, P.1    Grance, T.2
  • 28
    • 77953614890 scopus 로고    scopus 로고
    • Identifying the security risks associated with governmental use of cloud computing
    • Paquette S., Jaeger P., Wilson S. Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 2010, 27(3):245-253.
    • (2010) Government Information Quarterly , vol.27 , Issue.3 , pp. 245-253
    • Paquette, S.1    Jaeger, P.2    Wilson, S.3
  • 29
    • 33749071356 scopus 로고    scopus 로고
    • Using the technology acceptance model to explain how attitudes determine internet usage
    • Porter C.E., Donthu N. Using the technology acceptance model to explain how attitudes determine internet usage. Journal of Business Research 2006, 59(9):999-1007.
    • (2006) Journal of Business Research , vol.59 , Issue.9 , pp. 999-1007
    • Porter, C.E.1    Donthu, N.2
  • 30
    • 33646417079 scopus 로고    scopus 로고
    • Understanding e-learning continuance intention: An extension of the technology acceptance model
    • Roca J.C., Chiu C.-M., Martinez F.J. Understanding e-learning continuance intention: An extension of the technology acceptance model. International Journal of Human-Computer Studies 2006, 64(8):683-696.
    • (2006) International Journal of Human-Computer Studies , vol.64 , Issue.8 , pp. 683-696
    • Roca, J.C.1    Chiu, C.-M.2    Martinez, F.J.3
  • 31
    • 34347346117 scopus 로고    scopus 로고
    • User acceptance of mobile internet: Implication for convergence technologies
    • Shin D. User acceptance of mobile internet: Implication for convergence technologies. Interacting with Computers 2007, 19(4):472-483.
    • (2007) Interacting with Computers , vol.19 , Issue.4 , pp. 472-483
    • Shin, D.1
  • 32
    • 38149017015 scopus 로고    scopus 로고
    • What do people do with digital multimedia broadcasting?
    • Shin D. What do people do with digital multimedia broadcasting?. International Journal of Mobile Communications 2008, 6(1):258-275.
    • (2008) International Journal of Mobile Communications , vol.6 , Issue.1 , pp. 258-275
    • Shin, D.1
  • 33
    • 77955428343 scopus 로고    scopus 로고
    • The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption
    • Shin D. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers 2010, 22(5):428-438.
    • (2010) Interacting with Computers , vol.22 , Issue.5 , pp. 428-438
    • Shin, D.1
  • 34
    • 84856807255 scopus 로고    scopus 로고
    • What makes consumers use VoIP over mobile phones?
    • Shin D. What makes consumers use VoIP over mobile phones?. Telecommunications Policy 2012, 36(4):311-323.
    • (2012) Telecommunications Policy , vol.36 , Issue.4 , pp. 311-323
    • Shin, D.1
  • 35
    • 77955641901 scopus 로고    scopus 로고
    • Privacy and consumer risks in cloud computing
    • Svantesson D., Clarke R. Privacy and consumer risks in cloud computing. Computer Law & Security Review 2010, 26(4):391-397.
    • (2010) Computer Law & Security Review , vol.26 , Issue.4 , pp. 391-397
    • Svantesson, D.1    Clarke, R.2
  • 38
    • 0035780881 scopus 로고    scopus 로고
    • Privacy and security concerns as major barriers for e-commerce
    • Udo G.J. Privacy and security concerns as major barriers for e-commerce. Information Management and Computer Security 2001, 9(4):165-174.
    • (2001) Information Management and Computer Security , vol.9 , Issue.4 , pp. 165-174
    • Udo, G.J.1
  • 39
  • 40
    • 0002888544 scopus 로고    scopus 로고
    • Longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges
    • Venkatesh V., Brown S.A. Longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges. MISQ 2001, 25(1):71-102.
    • (2001) MISQ , vol.25 , Issue.1 , pp. 71-102
    • Venkatesh, V.1    Brown, S.A.2
  • 43
    • 80051911580 scopus 로고    scopus 로고
    • The cloudy future of government IT: Cloud computing and the public sector around the world
    • Wyld D. The cloudy future of government IT: Cloud computing and the public sector around the world. International Journal of Web & Semantic Technology 2010, 1(1):1-20.
    • (2010) International Journal of Web & Semantic Technology , vol.1 , Issue.1 , pp. 1-20
    • Wyld, D.1
  • 46
    • 33947424708 scopus 로고    scopus 로고
    • Convenience and TAM in a ubiquitous computing environment: The case of wireless LAN
    • Yoon C., Kim S. Convenience and TAM in a ubiquitous computing environment: The case of wireless LAN. Electronic Commerce Research and Applications 2007, 6(1):102-112.
    • (2007) Electronic Commerce Research and Applications , vol.6 , Issue.1 , pp. 102-112
    • Yoon, C.1    Kim, S.2
  • 47
    • 79954986542 scopus 로고    scopus 로고
    • Securing e-government and e-voting with an open cloud computing architecture
    • Zissis D., Lekkas D. Securing e-government and e-voting with an open cloud computing architecture. Government Information Quarterly 2011, 28(2):239-251.
    • (2011) Government Information Quarterly , vol.28 , Issue.2 , pp. 239-251
    • Zissis, D.1    Lekkas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.