-
1
-
-
84903550504
-
-
ABI Research, ABI Research, accessed 04 March 2013.
-
ABI Research (2008) RFID moving beyond Chinese national ID program, ABI Research.http://www.ccidreport.com/market/article/content/3377/200803/178552.htmlaccesse d 04 March 2013.
-
(2008)
RFID moving beyond Chinese national ID program
-
-
-
2
-
-
84903515098
-
-
All Africa, accessed 04 March 2013.
-
All Africa (2010) Nigeria: e-Passport Deadline. http://allafrica.com/stories/201004190825.html accessed 04 March 2013.
-
(2010)
Nigeria: e-Passport Deadline
-
-
-
3
-
-
10244234065
-
RFID technologies: supply chain applications and implementation issues
-
Angeles, R. (2005) RFID technologies: supply chain applications and implementation issues, Information Systems Management 22(1): 51-66.
-
(2005)
Information Systems Management
, vol.22
, Issue.1
, pp. 51-66
-
-
Angeles, R.1
-
5
-
-
84903550390
-
-
Australian Government, accessed 04 March 2013.
-
Australian Government (2008) Information Privacy Principles. http://www.privacy.gov.au/materials/types/infosheets/view/6541#d accessed 04 March 2013.
-
(2008)
Information Privacy Principles
-
-
-
6
-
-
84903525639
-
-
Ministry of Foreign Affairs, Canada, accessed 04 March 2013.
-
Baird, J. (2012) Passport Canada's fee-for-service proposal to parliament, Ministry of Foreign Affairs, Canada. http://www.pptc.gc.ca/publications/consultations/proposition-eng.pdf accessed 04 March 2013.
-
(2012)
Passport Canada's fee-for-service proposal to parliament
-
-
Baird, J.1
-
8
-
-
81355150547
-
Privacy in the digital age: A review of information privacy research in information systems
-
Bélanger, F. and Crossler, R.E. (2011) Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly 35(4): 1017-1042.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 1017-1042
-
-
Bélanger, F.1
Crossler, R.E.2
-
9
-
-
55249084997
-
The case research strategy in studies of Information Systems
-
Benbasat, I., Goldstein, D.K. and Mead, M. (1987) The case research strategy in studies of Information Systems. MIS Quarterly 11(3): 369-386.
-
(1987)
MIS Quarterly
, vol.11
, Issue.3
, pp. 369-386
-
-
Benbasat, I.1
Goldstein, D.K.2
Mead, M.3
-
11
-
-
34249996197
-
A qualitative study of information technology adoption: How ten organizations adopted Web-based training
-
Chan, S.C.H. and Ngai, E.W.T. (2007) A qualitative study of information technology adoption: How ten organizations adopted Web-based training. Information Systems Journal 17(3): 289-315.
-
(2007)
Information Systems Journal
, vol.17
, Issue.3
, pp. 289-315
-
-
Chan, S.C.H.1
Ngai, E.W.T.2
-
12
-
-
84856313573
-
-
Canadian Government, accessed 04 March 2013.
-
Canadian Government (2009) Privacy Legislation in Canada. http://www.priv.gc.ca/fsfi/02_05_d_15_e.cfm#contenttop accessed 04 March 2013.
-
(2009)
Privacy Legislation in Canada
-
-
-
15
-
-
79960036218
-
The impact of consumer perceptions of information privacy and security risks on the adoption of residual RFID technologies
-
Cazier, J. A., Jensen, A. S. and Dave, D. S. (2008) The impact of consumer perceptions of information privacy and security risks on the adoption of residual RFID technologies. Communications of the Association for Information Systems, 23(14): 235-256.
-
(2008)
Communications of the Association for Information Systems
, vol.23
, Issue.14
, pp. 235-256
-
-
Cazier, J.A.1
Jensen, A.S.2
Dave, D.S.3
-
16
-
-
34249996197
-
A qualitative study of information technology adoption: how ten organizations adopted Web-based training
-
Chan, S.C.H. and Ngai, E.W.T. (2007) A qualitative study of information technology adoption: how ten organizations adopted Web-based training, Information Systems Journal 17(3): 289-315.
-
(2007)
Information Systems Journal
, vol.17
, Issue.3
, pp. 289-315
-
-
Chan, S.C.H.1
Ngai, E.W.T.2
-
17
-
-
84971647799
-
Understanding the acceptance of RFID in the healthcare industry: extending the TAM model
-
Springer
-
Chong, A. Y-L and Chan, F. S. (2012). Understanding the acceptance of RFID in the healthcare industry: extending the TAM model, in Decision-Making for Supply Chain Integration: Decision Engineering, Volume 1, Springer, pp. 105-122.
-
(2012)
Decision-Making for Supply Chain Integration: Decision Engineering
, vol.1
, pp. 105-122
-
-
Chong, A.Y.-L.1
Chan, F.S.2
-
18
-
-
84890473134
-
Towards a personal data protection regime in Malaysia
-
Khaw, L.T. (2002) Towards a personal data protection regime in Malaysia, Journal of Malaysian and Comparative Law (11), http://www.commonlii.org/my/journals/JMCL/2002/11.html.
-
(2002)
Journal of Malaysian and Comparative Law
, Issue.11
-
-
Khaw, L.T.1
-
21
-
-
0001073758
-
Building theories from case study research
-
Eisenhardt, K.M. (1989) Building theories from case study research, The Academy of Management Review 14(4): 532-550.
-
(1989)
The Academy of Management Review
, vol.14
, Issue.4
, pp. 532-550
-
-
Eisenhardt, K.M.1
-
25
-
-
26444442422
-
Scanning with a purpose-supporting the fair information principles in RFID protocols
-
Berlin: Springer/Heidelberg
-
Floerkemeier, C., Schneider, R. and Langheinrich, M. (2005) Scanning with a purpose-supporting the fair information principles in RFID protocols, in Ubiquitous Computing Systems, Berlin: Springer/Heidelberg, pp. 214-231.
-
(2005)
Ubiquitous Computing Systems
, pp. 214-231
-
-
Floerkemeier, C.1
Schneider, R.2
Langheinrich, M.3
-
26
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
Garfinkel, S.L., Juels, A. and Pappu, R. (2005) RFID privacy: An overview of problems and proposed solutions. Security & Privacy, IEEE 3: 34-43.
-
(2005)
Security & Privacy, IEEE
, vol.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
27
-
-
1842528520
-
Wal-Mart cancels 'smart shelf' trial
-
accessed 04 March 2013.
-
Gilbert, A. and Shim, R. (2003) Wal-Mart cancels 'smart shelf' trial, in CNet News. http://news.cnet.com/2100-1017_3-1023934.html accessed 04 March 2013.
-
(2003)
CNet News
-
-
Gilbert, A.1
Shim, R.2
-
28
-
-
84903531319
-
-
Hong Kong Government. Office of the Privacy Commissioner for Personal Data, accessed 04 March 2013.
-
Hong Kong Government (2012) The Hong Kong Personal Data (Privacy) Ordinance 2012. Office of the Privacy Commissioner for Personal Data. http://www.gld.gov.hk/egazette/pdf/20121627/es12012162718.pdf accessed 04 March 2013.
-
(2012)
The Hong Kong Personal Data (Privacy) Ordinance 2012
-
-
-
29
-
-
43749090660
-
Consumer acceptance of RFID technology: an exploratory study
-
Hossain, M. and Prybutok, V. (2008) Consumer acceptance of RFID technology: an exploratory study, IEEE Transactions on Engineering Management 55(2): 316-328.
-
(2008)
IEEE Transactions on Engineering Management
, vol.55
, Issue.2
, pp. 316-328
-
-
Hossain, M.1
Prybutok, V.2
-
30
-
-
36249029420
-
-
ICAO, accessed 04 March 2013.
-
ICAO (2009) International Civil Aviation Organization. http://www.icao.int/cgi/statesDB4.pl?en accessed 04 March 2013.
-
(2009)
International Civil Aviation Organization
-
-
-
31
-
-
84903518739
-
-
Parliament of Australia, accessed 04 March 2013.
-
Jordan, R. (2010) Identity cards and the access card.Parliament of Australia. http://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/ Publications_Archive/archive/identitycards accessed 04 March 2013.
-
(2010)
Identity cards and the access card
-
-
Jordan, R.1
-
33
-
-
33847249519
-
Security and privacy issues in e-passports
-
Juels, A., Molnar, D. and Wagner, D. (2005) Security and privacy issues in e-passports, First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 74-88: http://www.library.ca.gov/crb/rfidap/docs/Juelsetall-SecurityandPrivacyofE-Passports.pdf.
-
(2005)
First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 74-88
-
-
Juels, A.1
Molnar, D.2
Wagner, D.3
-
34
-
-
0003380736
-
Qualitative research methods for evaluating computer information systems
-
J.G. Anderson, C.E. Aydin and S.J. Jay (Eds.), Sage, Thousand Oaks, CA
-
Kaplan, B. and J.A. Maxwell. (1994) Qualitative research methods for evaluating computer information systems, in Evaluating Health Care Information Systems: Methods and Applications, J.G. Anderson, C.E. Aydin and S.J. Jay (Eds.), Sage, Thousand Oaks, CA, pp. 45-68.
-
(1994)
Evaluating Health Care Information Systems: Methods and Applications
, pp. 45-68
-
-
Kaplan, B.1
Maxwell, J.A.2
-
35
-
-
22944437086
-
RFID tags: Commercial applications vs privacy rights
-
Kelly, E. P. and G. S. Erickson (2005) RFID tags: Commercial applications vs. privacy rights, Industrial Management + Data Systems, 105(5/6): 703-713.
-
(2005)
Industrial Management + Data Systems
, vol.105
, Issue.5-6
, pp. 703-713
-
-
Kelly, E.P.1
Erickson, G.S.2
-
37
-
-
84903527568
-
-
accessed 04 March 2013.
-
Kowlessar, G. (2012) Warner: e-passports by 2017. http://guardian.co.tt/news/2012-12-06/warner-epassports-2017 accessed 04 March 2013.
-
(2012)
Warner: e-passports by 2017
-
-
Kowlessar, G.1
-
38
-
-
0346137883
-
The invisible becomes manifest: Information privacy in a digital age
-
Kurtz, L.A. (1998) The invisible becomes manifest: Information privacy in a digital age. Washburn Law Journal 38: 151-174.
-
(1998)
Washburn Law Journal
, vol.38
, pp. 151-174
-
-
Kurtz, L.A.1
-
39
-
-
67650674080
-
A survey of RFID privacy approaches
-
Langheinrich, M. (2009) A survey of RFID privacy approaches, Personal and Ubiquitous Computing, 13(6): 413-421.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 413-421
-
-
Langheinrich, M.1
-
41
-
-
67649518947
-
An Empirical Study on Organizational Determinants of RFID Adoption in the Logistics Industry
-
Lin, C.-Y., 2009. An Empirical Study on Organizational Determinants of RFID Adoption in the Logistics Industry. Journal of Technology Management & Innovation 4, 1-7.
-
(2009)
Journal of Technology Management & Innovation
, vol.4
, pp. 1-7
-
-
Lin, C.-Y.1
-
42
-
-
84903546650
-
Wal-Mart Cancels RFID Smart-shelf Trial
-
accessed 04 March 2013.
-
Masnick, M. (2003) Wal-Mart Cancels RFID Smart-shelf Trial, in Techdirt. http://www.techdirt.com/articles/20030709/1138246.shtml accessed 04 March 2013.
-
(2003)
Techdirt
-
-
Masnick, M.1
-
43
-
-
25444474052
-
E-Government in Australia: the challenges to privacy of personal information
-
McDonagh, M. (2002) E-Government in Australia: the challenges to privacy of personal information, International Journal of Law and Information Technology, 10:(3): 327-343.
-
(2002)
International Journal of Law and Information Technology
, vol.10
, Issue.3
, pp. 327-343
-
-
McDonagh, M.1
-
46
-
-
84891295853
-
Privacy Concerns Mount Over Retail Use of RFID Technology
-
accessed 04 March 2013.
-
Murray, C. J. (2003) Privacy Concerns Mount Over Retail Use of RFID Technology, Electronic Engineering Times. http://eetimes.com/electronics-news/4046620/Privacy-concerns-mountover-retail-use-of-RFID-technology, accessed 04 March 2013.
-
(2003)
Electronic Engineering Times
-
-
Murray, C.J.1
-
47
-
-
25444432606
-
RFID privacy issues and technical challenges
-
Ohkubo, M., Suzuki, K. and Kinoshita, S. (2005) RFID privacy issues and technical challenges, ACM, 48(9): 66-71.
-
(2005)
ACM
, vol.48
, Issue.9
, pp. 66-71
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
48
-
-
81355132819
-
State of the information privacy literature: where are we now and where should we go
-
Pavlou, P.A. (2011) State of the information privacy literature: where are we now and where should we go, MIS Quarterly 35(4): 977-988.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 977-988
-
-
Pavlou, P.A.1
-
49
-
-
0032733331
-
Enhancing the quality and credibility of qualitative analysis
-
Patton, M. Q. (1999) Enhancing the quality and credibility of qualitative analysis, Health Services Research 34(5): 1189-1208.
-
(1999)
Health Services Research
, vol.34
, Issue.5
, pp. 1189-1208
-
-
Patton, M.Q.1
-
50
-
-
23944471341
-
An ethical exploration of privacy and radio frequency identification
-
Peslak, A. R. (2005) An ethical exploration of privacy and radio frequency identification, Journal of Business Ethics 59(4): 327-345.
-
(2005)
Journal of Business Ethics
, vol.59
, Issue.4
, pp. 327-345
-
-
Peslak, A.R.1
-
51
-
-
84872968336
-
Semi-passive RFID development platform for implementing and attacking security tags
-
Plos, T. Aigner, M., Baier, T., Hutter, M., Plos, T. and Wenger, E. (2012) Semi-passive RFID development platform for implementing and attacking security tags, International Journal of RFID Security and Cryptography (IJRFIDSC): (1:1/2): 16-24.
-
(2012)
International Journal of RFID Security and Cryptography (IJRFIDSC)
, vol.1
, Issue.1-2
, pp. 16-24
-
-
Plos, T.1
Aigner, M.2
Baier, T.3
Hutter, M.4
Plos, T.5
Wenger, E.6
-
53
-
-
84903547228
-
-
Privacy International, Privacy International, accessed 04 March 2013.
-
Privacy International (2006) 2006 International Privacy Survey: Ranking by Country, Privacy International, http://www.privacyinternational.org/survey/phr2005/aboutphrtable.pdf accessed 04 March 2013.
-
(2006)
2006 International Privacy Survey: Ranking by Country
-
-
-
54
-
-
84900330461
-
What is RFID?
-
RFID Journal
-
RFID Journal (2005) What is RFID? RFID Journal, http://www.rfidjournal.com/articles/view?1339.
-
(2005)
RFID Journal
-
-
-
55
-
-
84903546504
-
ID Cards for Australian?
-
ABC News, accessed 04 March 2013.
-
Saunders, L. (2008) ID Cards for Australian?,The Drum Opinion. ABC News. http://www.abc.net.au/unleashed/31898.html accessed 04 March 2013.
-
(2008)
The Drum Opinion
-
-
Saunders, L.1
-
57
-
-
33750305132
-
Value priorities as combining core factors between CSR and reputation-A qualitative study
-
Siltaoja, M.E. (2006) Value priorities as combining core factors between CSR and reputation-A qualitative study, Journal of Business Ethics 68(1): 91-111.
-
(2006)
Journal of Business Ethics
, vol.68
, Issue.1
, pp. 91-111
-
-
Siltaoja, M.E.1
-
58
-
-
0000981743
-
Information privacy: measuring individuals' concerns about organizational practices
-
Smith, H.J., Milberg, S.J. and Burke, S.J. (1996) Information privacy: measuring individuals' concerns about organizational practices, MIS Quarterly, 20(2): 167-196.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
Burke, S.J.3
-
59
-
-
84887413605
-
Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on Smartphone users
-
Sutanto, J., Palme, E., Tan, C.-H. and Phang, C.W. (2013) Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on Smartphone users, MIS Quarterly, 37(4): 1141-1164.
-
(2013)
MIS Quarterly
, vol.37
, Issue.4
, pp. 1141-1164
-
-
Sutanto, J.1
Palme, E.2
Tan, C.-H.3
Phang, C.W.4
-
60
-
-
84903518711
-
-
accessed 04 March 2013.
-
Tedjasaputra, A. (2006) MyKad: Technology for Whom? http://www.rfid-asia.info/2006/07/mykadtechnology-for-whom.htm accessed 04 March 2013.
-
(2006)
MyKad: Technology for Whom?
-
-
Tedjasaputra, A.1
-
61
-
-
34547663047
-
RFID, privacy and the perception of risk: a strategic framework
-
Thiesse, F. (2007) RFID, privacy and the perception of risk: a strategic framework. The Journal of Strategic Information Systems 16, 214-232.
-
(2007)
The Journal of Strategic Information Systems
, vol.16
, pp. 214-232
-
-
Thiesse, F.1
-
63
-
-
84903539323
-
-
U.S. Congress, Directive 95/46/EC of the European Parliament and of the Council, Official Journal of the European Communities.
-
U.S. Congress (1995) Directive 95/46/EC of the European Parliament and of the Council, Official Journal of the European Communities.
-
(1995)
-
-
-
64
-
-
84903552241
-
-
U.S. Congress, One Hundred Seventh Congress of the United States of America, edited by U.S Congress. Washington.
-
U.S. Congress (2002) One Hundred Seventh Congress of the United States of America, edited by U.S Congress. Washington.
-
(2002)
-
-
-
65
-
-
34547414125
-
RFID privacy based on public-key cryptography
-
Lecture Notes in Computer Science; Springer
-
Vaudenay, S. (2006) RFID privacy based on public-key cryptography, in Information Security and Cryptology-ICISC 2006, Lecture Notes in Computer Science; Springer, 4296: 1-6.
-
(2006)
Information Security and Cryptology-ICISC 2006
, vol.4296
, pp. 1-6
-
-
Vaudenay, S.1
-
66
-
-
84903518897
-
What is RFID?
-
accessed 04 March 2013.
-
Violino, B. (2005) What is RFID?, RFID Journal. http://www.rfidjournal.com/articles/view?1339 accessed 04 March 2013.
-
(2005)
RFID Journal
-
-
Violino, B.1
-
68
-
-
84899315721
-
RFID backers, privacy advocates seek common ground
-
accessed 04 March 2013.
-
Whiting, R. (2003) RFID backers, privacy advocates seek common ground, Information Week (11:17). http://www.informationweek.com/rfid-backers-privacy-advocates-seek-comm/16100902 accessed 04 March 2013.
-
(2003)
Information Week
, vol.11
, Issue.17
-
-
Whiting, R.1
-
69
-
-
84903532604
-
-
Wikipedia, accessed 04 March 2013.
-
Wikipedia (2009) Identity Document.http://en.wikipedia.org/wiki/Identity_document accessed 04 March 2013.
-
(2009)
Identity Document
-
-
-
70
-
-
33748744249
-
Challenges to global RFID adoption
-
Wu, N., Nystrom, M., Lin, T. and Yu, H. (2006) Challenges to global RFID adoption. Technovation 26(12): 1317-1323.
-
(2006)
Technovation
, vol.26
, Issue.12
, pp. 1317-1323
-
-
Wu, N.1
Nystrom, M.2
Lin, T.3
Yu, H.4
-
71
-
-
0003834664
-
-
Eighth Edition. Cengage Learning: Canada
-
Zikmund, W. G., Babin, B., Carr, J. C. and Griffin, M. (2010) Business Research Methods. Eighth Edition. Cengage Learning: Canada.
-
(2010)
Business Research Methods
-
-
Zikmund, W.G.1
Babin, B.2
Carr, J.C.3
Griffin, M.4
|