-
1
-
-
84872946372
-
Towards a trusted national identities framework
-
Adjei, J.K. (2012), “Towards a trusted national identities framework”, Info, Vol. 15 No. 1, pp. 4-4.
-
(2012)
Info
, vol.15
, Issue.1
, pp. 4
-
-
Adjei, J.K.1
-
2
-
-
84921041109
-
Building Trusted National Identity Management Systems
-
The Fifth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
-
Adjei, J.K. and Olesen, H. (2012), “Building Trusted National Identity Management Systems. In CENTRIC 2012”, The Fifth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 19-26.
-
(2012)
CENTRIC 2012
, pp. 19-26
-
-
Adjei, J.K.1
Olesen, H.2
-
3
-
-
80052321442
-
Keeping identity private
-
Adjei, J. and Olesen, H. (2011), “Keeping identity private”, IEEE Vehicular Technology Magazine, Vol. 6 No. 3, pp. 70-79.
-
(2011)
IEEE Vehicular Technology Magazine
, vol.6
, Issue.3
, pp. 70-79
-
-
Adjei, J.1
Olesen, H.2
-
4
-
-
84877820034
-
Cloud computing adoption by SMEs in the north east of England
-
Alshamaila, Y., Papagiannidis, S. and Li, F. (2013), “Cloud computing adoption by SMEs in the north east of England”, Journal of Enterprise Information Management, Vol. 26 No. 3, pp. 250-275.
-
(2013)
Journal of Enterprise Information Management
, vol.26
, Issue.3
, pp. 250-275
-
-
Alshamaila, Y.1
Papagiannidis, S.2
Li, F.3
-
5
-
-
0002672359
-
A model of distributor firm and manufacturer firm working partnerships
-
Anderson, J.C. and Narus, J.A. (1990), “A model of distributor firm and manufacturer firm working partnerships”, The Journal of Marketing, Vol. 54 No. 1, pp. 42-58.
-
(1990)
The Journal of Marketing
, vol.54
, Issue.1
, pp. 42-58
-
-
Anderson, J.C.1
Narus, J.A.2
-
6
-
-
0031287589
-
The contingent value of social capital
-
Burt, R.S. (1997), “The contingent value of social capital”, Administrative Science Quarterly, Vol. 42 No. 2, pp. 339-365.
-
(1997)
Administrative Science Quarterly
, vol.42
, Issue.2
, pp. 339-365
-
-
Burt, R.S.1
-
7
-
-
84870459478
-
Information privacy
-
Camenisch, J. (2012), “Information privacy”, Computer Networks, available at: www.sciencedirect.com/science/article/pii/S1389128612003660
-
(2012)
Computer Networks
-
-
Camenisch, J.1
-
9
-
-
77953242539
-
-
From Edison to Google, WW Norton & Company, 500 Fifth Avenue, New York, NY
-
Carr, N. (2009), The Big Switch: Rewiring the World, From Edison to Google, WW Norton & Company, 500 Fifth Avenue, New York, NY.
-
(2009)
The Big Switch: Rewiring the World
-
-
Carr, N.1
-
11
-
-
84873269247
-
Future directions of information and telecommunication systems through the technological advancement convergence
-
Caytiles, R.D. and Park, B. (2013), “Future directions of information and telecommunication systems through the technological advancement convergence”, International Journal of Multimedia & Ubiquitous Engineering, Vol. 8 No. 1.
-
(2013)
International Journal of Multimedia & Ubiquitous Engineering
, vol.8
, Issue.1
-
-
Caytiles, R.D.1
Park, B.2
-
12
-
-
0036803735
-
Editor’s comments
-
Conlon, E. (2002), “Editor’s comments”, Academy of Management Review, Vol. 27 No. 4, pp. 489-492.
-
(2002)
Academy of Management Review
, vol.27
, Issue.4
, pp. 489-492
-
-
Conlon, E.1
-
13
-
-
78650292615
-
Building theory about theory building: What constitutes a theoretical contribution?
-
Corley, K.G. and Gioia, D.A. (2011), “Building theory about theory building: what constitutes a theoretical contribution?”, Academy of Management Review, Vol. 36 No. 1, pp. 12-32.
-
(2011)
Academy of Management Review
, vol.36
, Issue.1
, pp. 12-32
-
-
Corley, K.G.1
Gioia, D.A.2
-
14
-
-
0035555754
-
Addressing the digital divide
-
Cullen, R. (2001), “Addressing the digital divide”, Online Information Review, Vol. 25 No. 5, pp. 311-320.
-
(2001)
Online Information Review
, vol.25
, Issue.5
, pp. 311-320
-
-
Cullen, R.1
-
15
-
-
0001138494
-
Self-determination in a work organization
-
Deci, E.L., Connell, J.P. and Ryan, R.M. (1989), “Self-determination in a work organization”, Journal of Applied Psychology, Vol. 74 No. 4, pp. 580-590.
-
(1989)
Journal of Applied Psychology
, vol.74
, Issue.4
, pp. 580-590
-
-
Deci, E.L.1
Connell, J.P.2
Ryan, R.M.3
-
16
-
-
84872967475
-
Mobile cloud computing: State of the art and outlook
-
Dihal, S., Bouwman, H., de Reuver, M., Warnier, M. and Carlsson, C. (2013), “Mobile cloud computing: state of the art and outlook”, Info, Vol. 15 No. 1, pp. 4-16.
-
(2013)
Info
, vol.15
, Issue.1
, pp. 4-16
-
-
Dihal, S.1
Bouwman, H.2
de Reuver, M.3
Warnier, M.4
Carlsson, C.5
-
17
-
-
84885212669
-
Ubiquitous mobile instrumentation
-
New York, NY
-
Ferreira, D., Koehler, C., Karapanos, E. and Kostakos, V. (2013), “Ubiquitous mobile instrumentation”, Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, New York, NY, pp. 1409-1412.
-
(2013)
Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication
, pp. 1409-1412
-
-
Ferreira, D.1
Koehler, C.2
Karapanos, E.3
Kostakos, V.4
-
18
-
-
0000813037
-
Congruence, contingency, and theory building
-
Fry, L.W. and Smith, D.A. (1987), “Congruence, contingency, and theory building”, The Academy of Management Review, Vol. 12 No. 1, pp. 117-132.
-
(1987)
The Academy of Management Review
, vol.12
, Issue.1
, pp. 117-132
-
-
Fry, L.W.1
Smith, D.A.2
-
19
-
-
0001951820
-
Can we trust trust
-
electronic edition, Department of Sociology, University of Oxford, chapter 13
-
Gambetta, D. (2000), “Can we trust trust”, Trust: Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, chapter 13, pp. 213-237, available at: www.sociology.ox.ac.uk/papers/gambetta213-237.pdf
-
(2000)
Trust: Making and Breaking Cooperative Relations
, pp. 213-237
-
-
Gambetta, D.1
-
20
-
-
77955712658
-
Toward dynamic and attribute based publication, discovery and selection for cloud computing
-
Goscinski, A. and Brock, M. (2010), “Toward dynamic and attribute based publication, discovery and selection for cloud computing”, Future Generation Computer Systems, Vol. 26 No. 7, pp. 947-970.
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.7
, pp. 947-970
-
-
Goscinski, A.1
Brock, M.2
-
22
-
-
79959433819
-
-
NIST Special Publication 800-144, Gaithersburg, MD
-
Jansen, W. and Grance, T. (2011), “Guidelines on security and privacy in public cloud computing”, NIST Special Publication 800-144, Gaithersburg, MD, p. 60.
-
(2011)
Guidelines on security and privacy in public cloud computing
, pp. 60
-
-
Jansen, W.1
Grance, T.2
-
23
-
-
70449095034
-
Cloud Computing: Today and Tomorrow
-
Kim, W. (2009), “Cloud Computing: Today and Tomorrow”, Journal of object technology, Vol. 8 No. 1, pp. 65-72.
-
(2009)
Journal of object technology
, vol.8
, Issue.1
, pp. 65-72
-
-
Kim, W.1
-
24
-
-
84963063075
-
Trust as a social reality
-
Lewis, J.D. and Weigert, A. (1985), “Trust as a social reality”, Social Forces, Vol. 63 No. 4, pp. 967-985.
-
(1985)
Social Forces
, vol.63
, Issue.4
, pp. 967-985
-
-
Lewis, J.D.1
Weigert, A.2
-
25
-
-
80054948421
-
Understanding the determinants of cloud computing adoption
-
Low, C., Chen, Y. and Wu, M. (2011), “Understanding the determinants of cloud computing adoption”, Industrial Management & Data Systems, Vol. 111 No. 7, pp. 1006-1023.
-
(2011)
Industrial Management & Data Systems
, vol.111
, Issue.7
, pp. 1006-1023
-
-
Low, C.1
Chen, Y.2
Wu, M.3
-
26
-
-
84890609381
-
Disruptive Technologies: Advances that will Transform Life
-
McKinsey Global Institute
-
Manyika, J., Chui, M., Bughin, J., Dobbs, R., Bisson, P. and Marrs, A. (2013), Disruptive Technologies: Advances that will Transform Life, Business, and the Global Economy, McKinsey Global Institute.
-
(2013)
Business, and the Global Economy
-
-
Manyika, J.1
Chui, M.2
Bughin, J.3
Dobbs, R.4
Bisson, P.5
Marrs, A.6
-
27
-
-
79951515545
-
Cloud computing—-the business perspective
-
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J. and Ghalsasi, A. (2011), “Cloud computing—-the business perspective”, Decision Support Systems, Vol. 51 No. 1, pp. 176-189.
-
(2011)
Decision Support Systems
, vol.51
, Issue.1
, pp. 176-189
-
-
Marston, S.1
Li, Z.2
Bandyopadhyay, S.3
Zhang, J.4
Ghalsasi, A.5
-
28
-
-
0042495505
-
An integrative model of organizational trust
-
Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995), “An integrative model of organizational trust”, Academy of Management Review, Vol. 20 No. 3, pp. 709-734.
-
(1995)
Academy of Management Review
, vol.20
, Issue.3
, pp. 709-734
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, F.D.3
-
29
-
-
84861307113
-
The NIST definition of cloud computing (draft)
-
Mell, P. and Grance, T. (2011), “The NIST definition of cloud computing (draft)”, NIST Special Publication, Vol. 800 No. 145, p. 7.
-
(2011)
NIST Special Publication
, vol.800
, Issue.145
, pp. 7
-
-
Mell, P.1
Grance, T.2
-
30
-
-
79952367895
-
Privacy, security and trust issues arising from cloud computing
-
Indianapolis, IN
-
Pearson, S. and Benameur, A. (2010), “Privacy, security and trust issues arising from cloud computing”, 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), IEEE, Indianapolis, IN.
-
(2010)
2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), IEEE
-
-
Pearson, S.1
Benameur, A.2
-
32
-
-
0011603572
-
Influence of subordinate characteristics on trust and use of participative decision strategies in a management simulation
-
Rosen, B. and Jerdee, T.H. (1977), “Influence of subordinate characteristics on trust and use of participative decision strategies in a management simulation”, Journal of Applied Psychology, Vol. 62 No. 5, pp. 628-631.
-
(1977)
Journal of Applied Psychology
, vol.62
, Issue.5
, pp. 628-631
-
-
Rosen, B.1
Jerdee, T.H.2
-
33
-
-
0031166167
-
Moore’s law: Past, present and future
-
Schaller, R.R. (1997), “Moore’s law: past, present and future”, IEEE Spectrum, Vol. 34 No. 6, pp. 52-59.
-
(1997)
IEEE Spectrum
, vol.34
, Issue.6
, pp. 52-59
-
-
Schaller, R.R.1
-
34
-
-
78650871219
-
The open group identity management work area
-
(March 2004)
-
Slone, S. (2004), “The open group identity management work area”, Identity Management (March 2004).
-
(2004)
Identity Management
-
-
Slone, S.1
-
35
-
-
84921031774
-
Editor’s comments
-
Smith, K.G. (1997), “Editor’s comments”, Academy of Management Review, Vol. 22 No. 1, pp. 7-10.
-
(1997)
Academy of Management Review
, vol.22
, Issue.1
, pp. 7-10
-
-
Smith, K.G.1
-
37
-
-
84997421780
-
Barriers to government cloud adoption: The ghanaian perspective
-
Tweneboah-Koduah, S., Endicott-Popovsky, B. and Tsetse, A. (2014), “Barriers to government cloud adoption: the ghanaian perspective”, International Journal of Managing Information Technology, Vol. 6 No. 3.
-
(2014)
International Journal of Managing Information Technology
, vol.6
, Issue.3
-
-
Tweneboah-Koduah, S.1
Endicott-Popovsky, B.2
Tsetse, A.3
-
38
-
-
78149234791
-
Service-oriented computing and cloud computing: Challenges and opportunities
-
Wei, Y. and Blake, M.B. (2010), “Service-oriented computing and cloud computing: challenges and opportunities”, Internet Computing, IEEE, Vol. 14 No. 6, pp. 72-75.
-
(2010)
Internet Computing, IEEE
, vol.14
, Issue.6
, pp. 72-75
-
-
Wei, Y.1
Blake, M.B.2
-
39
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
Weiser, M. (1993), “Some computer science issues in ubiquitous computing”, Communcation of ACM, Vol. 36 No. 7, pp. 75-84.
-
(1993)
Communcation of ACM
, vol.36
, Issue.7
, pp. 75-84
-
-
Weiser, M.1
-
40
-
-
78049523157
-
Internet banking: An initial look at Ghanaian bank consumer perceptions
-
Woldie, A., Hinson, R., Iddrisu, H. and Boateng, R. (2008), “Internet banking: an initial look at Ghanaian bank consumer perceptions”, Bank and Bank Systems, Vol. 3 No. 2, pp. 35-46.
-
(2008)
Bank and Bank Systems
, vol.3
, Issue.2
, pp. 35-46
-
-
Woldie, A.1
Hinson, R.2
Iddrisu, H.3
Boateng, R.4
|