메뉴 건너뛰기




Volumn 32, Issue 1, 2015, Pages 33-44

Beyond user experience of cloud service: Implication for value sensitive approach

Author keywords

Cloud computing; Cloud policy; User experience; User value; Value sensitive approach

Indexed keywords

BEHAVIORAL RESEARCH; CLOUD COMPUTING; SERVICE INDUSTRY; WEB SERVICES;

EID: 84922338175     PISSN: 07365853     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tele.2014.02.002     Document Type: Article
Times cited : (43)

References (55)
  • 1
    • 84900515472 scopus 로고    scopus 로고
    • Privacy in pervasive environments
    • Ackerman, M.S., 2004. Privacy in pervasive environments. Personal Ubiquitous Comput. 8 (6), 430-439.
    • (2004) Personal Ubiquitous Comput. , vol.8 , Issue.6 , pp. 430-439
    • Ackerman, M.S.1
  • 3
    • 79951918985 scopus 로고    scopus 로고
    • Cloud computing adoption and usage in community colleges
    • Behrend, T., Wiebe, E., London, J., Johnson, E., 2011. Cloud computing adoption and usage in community colleges. Behav. Info. Technol. 30 (2), 231-240.
    • (2011) Behav. Info. Technol. , vol.30 , Issue.2 , pp. 231-240
    • Behrend, T.1    Wiebe, E.2    London, J.3    Johnson, E.4
  • 4
    • 84969447074 scopus 로고    scopus 로고
    • U-government: A framework for the evolution of e-government
    • Belanger, F., Carter, L., Schaupp, L.C., 2005. U-government: a framework for the evolution of e-government. Electron. Govern. 2 (4), 426-445.
    • (2005) Electron. Govern. , vol.2 , Issue.4 , pp. 426-445
    • Belanger, F.1    Carter, L.2    Schaupp, L.C.3
  • 5
    • 33745082091 scopus 로고    scopus 로고
    • Model of adoption of technology in households
    • Brown, S.A., Venkatesh, V., 2005. Model of adoption of technology in households. MIS Q. 29 (3), 399-426.
    • (2005) MIS Q , vol.29 , Issue.3 , pp. 399-426
    • Brown, S.A.1    Venkatesh, V.2
  • 6
    • 33744900120 scopus 로고    scopus 로고
    • Role-based access control model for ubiquitous environment
    • Chae, S., Kim, W., Kim, D., 2006. Role-based access control model for ubiquitous environment. Lecture Notes Comput. Sci. 3786, 354-363.
    • (2006) Lecture Notes Comput. Sci. , vol.3786 , pp. 354-363
    • Chae, S.1    Kim, W.2    Kim, D.3
  • 7
    • 2442654928 scopus 로고    scopus 로고
    • Perceived information security, financial liability and consumer trust in e-commerce transactions
    • Chellappa, R., Pavlou, P., 2002. Perceived information security, financial liability and consumer trust in e-commerce transactions. Logistics Info. Manag. 15, 358-368.
    • (2002) Logistics Info. Manag. , vol.15 , pp. 358-368
    • Chellappa, R.1    Pavlou, P.2
  • 8
    • 57149123524 scopus 로고    scopus 로고
    • The empirical study of automotive telematics acceptance in Taiwan
    • Chen, H., Chen, S., 2009. The empirical study of automotive telematics acceptance in Taiwan. Int. J. Mobile Commun. 7 (1), 50-65.
    • (2009) Int. J. Mobile Commun. , vol.7 , Issue.1 , pp. 50-65
    • Chen, H.1    Chen, S.2
  • 10
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis, F., 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13 (3), 319-340.
    • (1989) MIS Q , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.1
  • 11
    • 77957895284 scopus 로고    scopus 로고
    • The economic impact of cloud computing on business creation, employment and output in the E.U
    • Etro, F., 2009. The economic impact of cloud computing on business creation, employment and output in the E.U.. Rev. Bus. Econ. 54 (2), 179-208.
    • (2009) Rev. Bus. Econ. , vol.54 , Issue.2 , pp. 179-208
    • Etro, F.1
  • 12
    • 33646354609 scopus 로고    scopus 로고
    • Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site
    • Flavin, C., Guinaliu, M., 2006. Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Ind. Manag. Data Syst. 106 (5), 601-620.
    • (2006) Ind. Manag. Data Syst. , vol.106 , Issue.5 , pp. 601-620
    • Flavin, C.1    Guinaliu, M.2
  • 13
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable and measurement error
    • Fornell, C., Larcker, D.F., 1981. Evaluating structural equation models with unobservable and measurement error. J. Mark. Res. 18, 39-50.
    • (1981) J. Mark. Res. , vol.18 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 16
    • 0002690777 scopus 로고    scopus 로고
    • The evolution of the digital divide: How gaps in internet access may impact electronic commerce
    • Hoffman, D.L., Novak, T., Schlosser, A., 2000. The evolution of the digital divide: How gaps in Internet access may impact electronic commerce. J. Comp. Mediated Commun. 3 (5), .
    • (2000) J. Comp. Mediated Commun. , vol.3 , Issue.5
    • Hoffman, D.L.1    Novak, T.2    Schlosser, A.3
  • 17
    • 43749090660 scopus 로고    scopus 로고
    • Consumer acceptance of RFID technology
    • Hossain, M.M., Prybutok, V.R., 2008. Consumer acceptance of RFID technology. IEEE Trans. Eng. Manag. 55 (2), 316-328.
    • (2008) IEEE Trans. Eng. Manag. , vol.55 , Issue.2 , pp. 316-328
    • Hossain, M.M.1    Prybutok, V.R.2
  • 18
    • 33846088395 scopus 로고    scopus 로고
    • Consumer behavior in online game communities
    • Hsu, C., Lu, H., 2007. Consumer behavior in online game communities. Comp. Hum. Behav. 23, 1642-1659.
    • (2007) Comp. Hum. Behav. , vol.23 , pp. 1642-1659
    • Hsu, C.1    Lu, H.2
  • 19
    • 84855809370 scopus 로고    scopus 로고
    • Predicting attitudes toward knowledge sharing by e-mail
    • Hwang, Y., 2011. Predicting attitudes toward knowledge sharing by e-mail. Int. J. Hum. Comp. Interact. 27 (12), 1161-1176.
    • (2011) Int. J. Hum. Comp. Interact. , vol.27 , Issue.12 , pp. 1161-1176
    • Hwang, Y.1
  • 20
    • 79960910839 scopus 로고    scopus 로고
    • Knowing the past to understand the present
    • Joint, A., Baker, E., 2011. Knowing the past to understand the present. Comput. Law Secur. Rev. 27 (4), 407-415.
    • (2011) Comput. Law Secur. Rev. , vol.27 , Issue.4 , pp. 407-415
    • Joint, A.1    Baker, E.2
  • 22
    • 84866511690 scopus 로고    scopus 로고
    • Observations of achievement and motivation in using cloud computing driven CAD
    • Jou, M., Wang, J., 2013. Observations of achievement and motivation in using cloud computing driven CAD. Comput. Hum. Behav. 29 (2), 364-369.
    • (2013) Comput. Hum. Behav. , vol.29 , Issue.2 , pp. 364-369
    • Jou, M.1    Wang, J.2
  • 23
    • 76449093298 scopus 로고    scopus 로고
    • Investigating mobile wireless technology adoption
    • Kim, S., Garrison, G., 2008. Investigating mobile wireless technology adoption. Inf. Syst. Front. 5, 385-396.
    • (2008) Inf. Syst. Front. , vol.5 , pp. 385-396
    • Kim, S.1    Garrison, G.2
  • 24
    • 84867450966 scopus 로고    scopus 로고
    • Analysis of the adoption status of cloud computing by country
    • Kim, M., Kim, J., Lee, H., 2012. Analysis of the adoption status of cloud computing by country. Lect. Notes Electr. Eng. 181, 467-476.
    • (2012) Lect. Notes Electr. Eng. , vol.181 , pp. 467-476
    • Kim, M.1    Kim, J.2    Lee, H.3
  • 25
    • 84906779257 scopus 로고    scopus 로고
    • A secure smart-work service model based open stack for cloud computing
    • Kim, J., Jeong, H., Cho, I., Kang, S.M., Park, J.H., 2013. A secure smart-work service model based open stack for cloud computing. Cluster Comput. 1 (1), 1-12.
    • (2013) Cluster Comput. , vol.1 , Issue.1 , pp. 1-12
    • Kim, J.1    Jeong, H.2    Cho, I.3    Kang, S.M.4    Park, J.H.5
  • 27
    • 33744917835 scopus 로고    scopus 로고
    • An effective method for the location privacy in ubiquitous computing
    • Lee, G., Kim, W., Kim, D., 2005. An effective method for the location privacy in ubiquitous computing. Lect. Notes Comput. Sci. 3823, 1006-1015.
    • (2005) Lect. Notes Comput. Sci. , vol.3823 , pp. 1006-1015
    • Lee, G.1    Kim, W.2    Kim, D.3
  • 28
    • 38149135822 scopus 로고    scopus 로고
    • Privacy protection for a secure u-city life
    • Lee, C., Lee, B., Kong, Y., 2007. Privacy protection for a secure u-city life. Lect. Notes Comput. Sci. 4490, 685-692.
    • (2007) Lect. Notes Comput. Sci. , vol.4490 , pp. 685-692
    • Lee, C.1    Lee, B.2    Kong, Y.3
  • 31
    • 77954051808 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Information Technology Laboratory
    • Mell, P., Grance, T., 2009. The NIST Definition of Cloud Computing. National Institute of Standards and Technology, Information Technology Laboratory, .
    • (2009) The NIST Definition of Cloud Computing
    • Mell, P.1    Grance, T.2
  • 32
    • 84922339068 scopus 로고    scopus 로고
    • A white paper on cloud computing blueprint
    • Seoul, Korea
    • MSIP, 2013. A white paper on cloud computing blueprint. ICT and Planning of Korea, Seoul, Korea.
    • (2013) ICT and Planning of Korea
    • MSIP1
  • 33
    • 84865276314 scopus 로고    scopus 로고
    • The difference of awareness between public institutions and private enterprises for cloud computing security
    • Oh, J., Yoon, Y.B., Suh, J.R., Lee, B.G., 2012. The difference of awareness between public institutions and private enterprises for cloud computing security. Int. J. Secur. Appl. 6 (3), 1-10.
    • (2012) Int. J. Secur. Appl. , vol.6 , Issue.3 , pp. 1-10
    • Oh, J.1    Yoon, Y.B.2    Suh, J.R.3    Lee, B.G.4
  • 34
    • 77953614890 scopus 로고    scopus 로고
    • Identifying the security risks associated with governmental use of cloud computing
    • Paquette, S., Jaeger, P., Wilson, S., 2010. Identifying the security risks associated with governmental use of cloud computing. Govern. Info. Q. 27 (3), 245-253.
    • (2010) Govern. Info. Q. , vol.27 , Issue.3 , pp. 245-253
    • Paquette, S.1    Jaeger, P.2    Wilson, S.3
  • 35
    • 20444499779 scopus 로고    scopus 로고
    • E-SQUAL: A multiple-item scale for assessing electronic service quality
    • Parasuraman, A., Zeithaml, V.A., Malhotra, A., 2005. E-SQUAL: a multiple-item scale for assessing electronic service quality. J. Serv. Res. 7 (3), 213-233.
    • (2005) J. Serv. Res. , vol.7 , Issue.3 , pp. 213-233
    • Parasuraman, A.1    Zeithaml, V.A.2    Malhotra, A.3
  • 36
    • 84868201101 scopus 로고    scopus 로고
    • An empirical investigation of end-users' switching toward cloud computing: A two factor theory perspective
    • Park, S., Ryoo, S., 2013. An empirical investigation of end-users' switching toward cloud computing: a two factor theory perspective. Comput. Hum. Behav. 29 (1), 160-170.
    • (2013) Comput. Hum. Behav. , vol.29 , Issue.1 , pp. 160-170
    • Park, S.1    Ryoo, S.2
  • 37
    • 33749071356 scopus 로고    scopus 로고
    • Using the technology acceptance model to explain how attitudes determine internet usage
    • Porter, C.E., Donthu, N., 2006. Using the technology acceptance model to explain how attitudes determine Internet usage. J. Bus. Res. 59 (9), 999-1007.
    • (2006) J. Bus. Res. , vol.59 , Issue.9 , pp. 999-1007
    • Porter, C.E.1    Donthu, N.2
  • 38
    • 79960771485 scopus 로고    scopus 로고
    • The effects of social influence on user acceptance of online social networks
    • Qin, L., Kim, Y., Hsu, J., Tan, X., 2011. The effects of social influence on user acceptance of online social networks. Int. J. Hum.-Comput. Interact. 27 (9), 885-899.
    • (2011) Int. J. Hum.-Comput. Interact. , vol.27 , Issue.9 , pp. 885-899
    • Qin, L.1    Kim, Y.2    Hsu, J.3    Tan, X.4
  • 39
    • 57049088579 scopus 로고    scopus 로고
    • An experimental study on ubiquitous commerce adoption
    • Sheng, H., Nah, F., Siau, K., 2008. An experimental study on ubiquitous commerce adoption. J. Assoc. Info. Syst. 9 (6), 344-376.
    • (2008) J. Assoc. Info. Syst. , vol.9 , Issue.6 , pp. 344-376
    • Sheng, H.1    Nah, F.2    Siau, K.3
  • 40
    • 34347346117 scopus 로고    scopus 로고
    • User acceptance of mobile internet: Implication for convergence technologies
    • Shin, D., 2007. User acceptance of mobile Internet: Implication for convergence technologies. Interact. Comput. 19 (4), 472-483.
    • (2007) Interact. Comput. , vol.19 , Issue.4 , pp. 472-483
    • Shin, D.1
  • 41
    • 38149017015 scopus 로고    scopus 로고
    • What do people do with digital multimedia broadcasting?
    • Shin, D., 2008. What do people do with digital multimedia broadcasting? Int. J. Mobile Commun. 6 (1), 258-275.
    • (2008) Int. J. Mobile Commun. , vol.6 , Issue.1 , pp. 258-275
    • Shin, D.1
  • 42
    • 76449119622 scopus 로고    scopus 로고
    • Ubiquitous computing acceptance model
    • Shin, D., 2010. Ubiquitous computing acceptance model. Int. J. Mobile Commun. 8 (2), 169-186.
    • (2010) Int. J. Mobile Commun. , vol.8 , Issue.2 , pp. 169-186
    • Shin, D.1
  • 43
    • 84875404865 scopus 로고    scopus 로고
    • Cloud service model in public sectors
    • Shin, D., 2013. Cloud service model in public sectors. Govern. Info. Q. 30 (2), 194-203.
    • (2013) Govern. Info. Q. , vol.30 , Issue.2 , pp. 194-203
    • Shin, D.1
  • 44
    • 7644223159 scopus 로고    scopus 로고
    • Maintaining privacy in pervasive computing
    • Soppera, A., Burbridge, T., 2004. Maintaining privacy in pervasive computing. BT Technol. J. 22 (3), 106-118.
    • (2004) BT Technol. J. , vol.22 , Issue.3 , pp. 106-118
    • Soppera, A.1    Burbridge, T.2
  • 45
    • 77955641901 scopus 로고    scopus 로고
    • Privacy and consumer risks in cloud computing
    • Svantesson, D., Clarke, R., 2010. Privacy and consumer risks in cloud computing. Comput. Law Secur. Rev. 26 (4), 391-397.
    • (2010) Comput. Law Secur. Rev. , vol.26 , Issue.4 , pp. 391-397
    • Svantesson, D.1    Clarke, R.2
  • 46
    • 84857081144 scopus 로고    scopus 로고
    • Understanding the intention to use technology by preservice teachers
    • Teo, T., van Schaik, P., 2012. Understanding the intention to use technology by preservice teachers. Int. J. Hum.-Comput. Interact. 28 (3), 178-188.
    • (2012) Int. J. Hum.-Comput. Interact. , vol.28 , Issue.3 , pp. 178-188
    • Teo, T.1    Van Schaik, P.2
  • 47
    • 34547663047 scopus 로고    scopus 로고
    • RFID, privacy and the perception of risk
    • Thiesse, F., 2007. RFID, privacy and the perception of risk. J. Strateg. Info. Syst. 16, 214-232.
    • (2007) J. Strateg. Info. Syst. , vol.16 , pp. 214-232
    • Thiesse, F.1
  • 49
    • 0035780881 scopus 로고    scopus 로고
    • Privacy and security concerns as major barriers for e-commerce
    • Udo, G.J., 2001. Privacy and security concerns as major barriers for e-commerce. Info. Manag. Comput. Secur. 9 (4), 165-174.
    • (2001) Info. Manag. Comput. Secur. , vol.9 , Issue.4 , pp. 165-174
    • Udo, G.J.1
  • 50
    • 0002888544 scopus 로고    scopus 로고
    • Longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges
    • Venkatesh, V., Brown, S.A., 2001. Longitudinal investigation of personal computers in homes: adoption determinants and emerging challenges. MISQ 25 (1), 71-102.
    • (2001) MISQ , vol.25 , Issue.1 , pp. 71-102
    • Venkatesh, V.1    Brown, S.A.2
  • 54
    • 33947424708 scopus 로고    scopus 로고
    • Convenience and TAM in a ubiquitous computing environment
    • Yoon, C., Kim, S., 2007. Convenience and TAM in a ubiquitous computing environment. Electron. Commerce Res. Appl. 6 (1), 102-112.
    • (2007) Electron. Commerce Res. Appl. , vol.6 , Issue.1 , pp. 102-112
    • Yoon, C.1    Kim, S.2
  • 55
    • 84877029678 scopus 로고    scopus 로고
    • The establishment of security strategies for introducing cloud computing
    • Yoon, Y.B., Oh, J., Lee, B.G., 2013. The establishment of security strategies for introducing cloud computing. KSII Trans. Internet Info. Syst. 7 (4), 860-877.
    • (2013) KSII Trans. Internet Info. Syst. , vol.7 , Issue.4 , pp. 860-877
    • Yoon, Y.B.1    Oh, J.2    Lee, B.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.