메뉴 건너뛰기




Volumn 19, Issue 1, 2018, Pages 95-107

Alignment of IT Authority and Citizens of Proposed Smart Cities in India: System Security and Privacy Perspective

Author keywords

Adoption; Citizens; E governance; Flexibility; Privacy; Smart city of India; System security; User experience

Indexed keywords


EID: 85042439909     PISSN: 09722696     EISSN: 09740198     Source Type: Journal    
DOI: 10.1007/s40171-017-0173-5     Document Type: Article
Times cited : (69)

References (52)
  • 1
    • 34147205913 scopus 로고    scopus 로고
    • An empirical study of the anticipated consumer response to RFID product item tagging
    • Angeles, R. (2007). An empirical study of the anticipated consumer response to RFID product item tagging. Industrial Management & Data Systems, 107(4), 461–483.
    • (2007) Industrial Management & Data Systems , vol.107 , Issue.4 , pp. 461-483
    • Angeles, R.1
  • 2
    • 0003258063 scopus 로고
    • The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration
    • Barclay, D., Thompson, R., & Higgins, C. (1995). The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration. Technology Studies, 2(2), 285–309.
    • (1995) Technology Studies , vol.2 , Issue.2 , pp. 285-309
    • Barclay, D.1    Thompson, R.2    Higgins, C.3
  • 3
    • 79955925744 scopus 로고    scopus 로고
    • The algorithm analysis of E-commerce security issue for on-line payment transaction system in banking technology
    • Barskar, R., Jayant, A., Bharti, J., Ahmed, G. F. (2010). The algorithm analysis of E-commerce security issues for online payment transaction system in banking technology. Journal of Computer Science and Information Security, 8(1), 307–312.
    • (2010) Journal of Computer Science and Information Security , vol.8 , Issue.1 , pp. 307-312
    • Barskar, R.1    Jayant, A.2    Bharti, J.3    Ahmed, G.F.4
  • 5
    • 33846367309 scopus 로고    scopus 로고
    • People-often the weakest link in security, but one of the best places to start
    • Bresz, F. P. (2004). People-often the weakest link in security, but one of the best places to start. Journal of Health Care Compliance, 6(4), 57–60.
    • (2004) Journal of Health Care Compliance , vol.6 , Issue.4 , pp. 57-60
    • Bresz, F.P.1
  • 6
    • 0003095695 scopus 로고    scopus 로고
    • The partial least square approach to structural equation modeling
    • Marcoulides GA, (ed), Erlbaum, Mahwah, NJ
    • Chin, W. W. (1998). The partial least square approach to structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Mahwah, NJ: Erlbaum.
    • (1998) Modern methods for business research , pp. 295-336
    • Chin, W.W.1
  • 7
    • 4544247079 scopus 로고    scopus 로고
    • Protocol for automated negotiations with buyer anonymity and seller reputation
    • Cranor, L. F., & Resnick, P. (2000). Protocol for automated negotiations with buyer anonymity and seller reputation. Netnomics, 2, 1–23.
    • (2000) Netnomics , vol.2 , pp. 1-23
    • Cranor, L.F.1    Resnick, P.2
  • 8
    • 0033464665 scopus 로고    scopus 로고
    • Information privacy concern, procedural fairness and impersonal trust: An empirical investigation
    • Culnan, M. J., & Pamcle, K. A. (1999). Information privacy concern, procedural fairness and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.
    • (1999) Organization Science , vol.10 , Issue.1 , pp. 104-115
    • Culnan, M.J.1    Pamcle, K.A.2
  • 9
    • 0037368865 scopus 로고    scopus 로고
    • The DeLone and McLean model of information systems success: A ten year update
    • DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten year update. Journal of Management Information Systems, 19(4), 9–30.
    • (2003) Journal of Management Information Systems , vol.19 , Issue.4 , pp. 9-30
    • Delone, W.H.1    McLean, E.R.2
  • 11
    • 84868100794 scopus 로고    scopus 로고
    • The New York Times Magazine, Accessed Oct 2016
    • Duhigg, C. (2012). How companies learn your secrets. The New York Times Magazine. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html. Accessed Oct 2016.
    • (2012) How companies learn your secrets
    • Duhigg, C.1
  • 12
    • 0036765493 scopus 로고    scopus 로고
    • Management’s role in information security in a cyber economy
    • Dutta, A., & McCrohan, K. (2002). Management’s role in information security in a cyber economy. California Management Review, 45(1), 67–87.
    • (2002) California Management Review , vol.45 , Issue.1 , pp. 67-87
    • Dutta, A.1    McCrohan, K.2
  • 13
    • 79960803568 scopus 로고    scopus 로고
    • Ernst & Young, Accessed 3 Oct 2016
    • Ernst & Young. (2008). Ernst & Young 2008 Global Information Security Survey. http://faisaldanka.wordpress.com/2008/10/20/ernst-young-2008-globa-informationsecurity-survey. Accessed 3 Oct 2016.
    • (2008) Ernst & Young, Global Information Security Survey
  • 15
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. JMR, Journal of Marketing Research, 18(1), 39–50.
    • (1981) JMR, Journal of Marketing Research , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 16
    • 21144482295 scopus 로고
    • Information technology, marketing practice, and consumer privacy: Ethical issue
    • Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issue. Journal of Public & Marketing, 12, 106–119.
    • (1993) Journal of Public & Marketing , vol.12 , pp. 106-119
    • Foxman, E.R.1    Kilcoyne, P.2
  • 20
    • 85022085662 scopus 로고    scopus 로고
    • Big data analytics—A review on theoretical contributions and tools used in literature
    • Grover, P., & Kar, A. K. (2017). Big data analytics—A review on theoretical contributions and tools used in literature. Forthcoming in Global Journal of Flexible Systems Management, 18(3), 203–229.
    • (2017) Forthcoming in Global Journal of Flexible Systems Management , vol.18 , Issue.3 , pp. 203-229
    • Grover, P.1    Kar, A.K.2
  • 21
    • 0036330173 scopus 로고    scopus 로고
    • Information security policy—What do international security standards say
    • Hone, K., & Eloff, J. H. P. (2002). Information security policy—What do international security standards say. Computers & Security, 21(5), 402–409.
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 402-409
    • Hone, K.1    Eloff, J.H.P.2
  • 22
    • 0000230521 scopus 로고    scopus 로고
    • Use of partial least squares (PLS) in strategic management research: A review of four recent studies
    • Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195–204.
    • (1999) Strategic Management Journal , vol.20 , Issue.2 , pp. 195-204
    • Hulland, J.1
  • 23
    • 84919822267 scopus 로고    scopus 로고
    • Behavioral flexibility: The use of upward impression management tactics by subordinates for good performance rating from leader and impact of organizational & leader’s machiavellianism
    • Jaiswal, P., & Bhal, K. T. (2014). Behavioural flexibility: The use of upward impression management tactics by subordinates for good performance rating from leader and impact of organizational & leader’s machiavellianism. Global Journal of Flexible Systems Management, 15(4), 313–326.
    • (2014) Global Journal of Flexible Systems Management , vol.15 , Issue.4 , pp. 313-326
    • Jaiswal, P.1    Bhal, K.T.2
  • 25
    • 84928335164 scopus 로고    scopus 로고
    • Flexible pricing models for cloud computing based on group decision making under consensus
    • Kar, A. K., & Rakshit, A. (2015). Flexible pricing models for cloud computing based on group decision making under consensus. Global Journal of Flexible Systems Management, 16(2), 1–14.
    • (2015) Global Journal of Flexible Systems Management , vol.16 , Issue.2 , pp. 1-14
    • Kar, A.K.1    Rakshit, A.2
  • 26
    • 0028368878 scopus 로고
    • On tariffs, policing, and admission control of multi-service networks
    • Kelly, F. P. (1994). On tariffs, policing, and admission control of multi-service networks. Operational Research Letters, 15, 1–9.
    • (1994) Operational Research Letters , vol.15 , pp. 1-9
    • Kelly, F.P.1
  • 29
    • 84905749571 scopus 로고    scopus 로고
    • Flexible decision approach for analyzing performance of sustainable supply chains under risks/uncertainty
    • Mangla, S. K., Kumar, P., & Barua, M. K. (2014). Flexible decision approach for analysing performance of sustainable supply chains under risks/uncertainty. Global Journal of Flexible Systems Management, 15(2), 113–130.
    • (2014) Global Journal of Flexible Systems Management , vol.15 , Issue.2 , pp. 113-130
    • Mangla, S.K.1    Kumar, P.2    Barua, M.K.3
  • 30
    • 0009925685 scopus 로고    scopus 로고
    • Initial trust formation in new organizational relationships
    • McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473–490.
    • (1998) Academy of Management Review , vol.23 , Issue.3 , pp. 473-490
    • McKnight, D.L.1    Cummings, L.L.2    Chervany, N.3
  • 31
    • 73449149291 scopus 로고
    • Development of an instrument to measure the perceptions of adopting an information technology innovation
    • Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222.
    • (1991) Information Systems Research , vol.2 , Issue.3 , pp. 192-222
    • Moore, G.C.1    Benbasat, I.2
  • 33
    • 0011043226 scopus 로고    scopus 로고
    • Who owns digital works?
    • Okerson, A. (1996). Who owns digital works? Scientific America, 275(1), 80–84.
    • (1996) Scientific America , vol.275 , Issue.1 , pp. 80-84
    • Okerson, A.1
  • 34
    • 0004310779 scopus 로고
    • Penguin Books, Harmondsworth
    • Piggott, S. (1950). Pre-historic India (p. 165). Harmondsworth: Penguin Books.
    • (1950) Pre-historic India , pp. 165
    • Piggott, S.1
  • 35
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P. M., MacKenzie, S. B., & Lee, J. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    MacKenzie, S.B.2    Lee, J.Y.3
  • 36
    • 0036567901 scopus 로고    scopus 로고
    • Key dimensions of business-to-commerce websites
    • Ranganathan, C., & Ganapathy, S. (2002). Key dimensions of business-to-commerce websites. Information & Management, 39, 437–465.
    • (2002) Information & Management , vol.39 , pp. 437-465
    • Ranganathan, C.1    Ganapathy, S.2
  • 38
    • 38149048170 scopus 로고    scopus 로고
    • Between extreme rejection and cautious acceptance: consumers’ reactions to RFID-based IS in retail
    • Rothensee, M., & Spiekermann, S. (2008). Between extreme rejection and cautious acceptance: consumers’ reactions to RFID-based IS in retail. Social Science Computer Review, 26(1), 75–86.
    • (2008) Social Science Computer Review , vol.26 , Issue.1 , pp. 75-86
    • Rothensee, M.1    Spiekermann, S.2
  • 39
    • 85040565418 scopus 로고    scopus 로고
    • Security and privacy incredulities of in-car wireless networks: A tire pressure monitoring system case study
    • Berkeley, CA, USA. USENIX Association, Accessed Oct 2016
    • Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., & Xu, W. (2010). Security and privacy incredulities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the 19th USENIX Conference on Security, Berkeley, CA, USA. USENIX Association. http://www.winlab.rutgers.edu/~gruteser/papers/xu_tpms10.pdf. Accessed Oct 2016.
    • (2010) In Proceedings of the 19th USENIX Conference on Security
    • Rouf, I.1    Miller, R.2    Mustafa, H.3    Taylor, T.4    Oh, S.5    Xu, W.6
  • 40
    • 0942289517 scopus 로고    scopus 로고
    • The impact of religious affiliation on trust in the context of electronic commerce
    • Siala, H., O’Keefe, R. M., & Hone, K. S. (2004). The impact of religious affiliation on trust in the context of electronic commerce. Interacting with Computers, 16(1), 07–27.
    • (2004) Interacting with Computers , vol.16 , Issue.1 , pp. 7-27
    • Siala, H.1    O’Keefe, R.M.2    Hone, K.S.3
  • 44
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441–469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 45
    • 84948653064 scopus 로고    scopus 로고
    • Creating flexibility through technological and attitudinal change
    • Sushil, (2015). Creating flexibility through technological and attitudinal change. Global Journal of Flexible Systems Management, 16(4), 309–311.
    • (2015) Global Journal of Flexible Systems Management , vol.16 , Issue.4 , pp. 309-311
    • Sushil1
  • 46
    • 84941969284 scopus 로고    scopus 로고
    • Protective measures in E-Commerce to deal with security threats arising out of social issues—A framework. International Journal of Computer
    • Tripathy, B., & Mishra, J. (2013). Protective measures in E-Commerce to deal with security threats arising out of social issues—A framework. International Journal of Computer Engineering and Technology, 4(1), 46–53.
    • (2013) Engineering and Technology , vol.4 , Issue.1 , pp. 46-53
    • Tripathy, B.1    Mishra, J.2
  • 47
    • 0037360262 scopus 로고    scopus 로고
    • Understanding on-line purchase intentions: Contribution from technology and trust perspectives
    • Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding on-line purchase intentions: Contribution from technology and trust perspectives. European Journal of Information System, 12(1), 47–48.
    • (2003) European Journal of Information System , vol.12 , Issue.1 , pp. 47-48
    • Van der Heijden, H.1    Verhagen, T.2    Creemers, M.3
  • 48
    • 0027943145 scopus 로고
    • Comparing the predictive accuracy of models using a simple randomization test
    • Van der Voet, H. (1994). Comparing the predictive accuracy of models using a simple randomization test. Chemometrics and Intelligent Laboratory Systems, 25(2), 313–323.
    • (1994) Chemometrics and Intelligent Laboratory Systems , vol.25 , Issue.2 , pp. 313-323
    • Van der Voet, H.1
  • 49
    • 3042812983 scopus 로고    scopus 로고
    • The ten deadly sins of information security management
    • Von Solms, B., & Von Solms, R. (2004). The ten deadly sins of information security management. Computers & Security, 23, 371–376.
    • (2004) Computers & Security , vol.23 , pp. 371-376
    • Von Solms, B.1    Von Solms, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.