-
1
-
-
34147205913
-
An empirical study of the anticipated consumer response to RFID product item tagging
-
Angeles, R. (2007). An empirical study of the anticipated consumer response to RFID product item tagging. Industrial Management & Data Systems, 107(4), 461–483.
-
(2007)
Industrial Management & Data Systems
, vol.107
, Issue.4
, pp. 461-483
-
-
Angeles, R.1
-
2
-
-
0003258063
-
The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration
-
Barclay, D., Thompson, R., & Higgins, C. (1995). The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration. Technology Studies, 2(2), 285–309.
-
(1995)
Technology Studies
, vol.2
, Issue.2
, pp. 285-309
-
-
Barclay, D.1
Thompson, R.2
Higgins, C.3
-
3
-
-
79955925744
-
The algorithm analysis of E-commerce security issue for on-line payment transaction system in banking technology
-
Barskar, R., Jayant, A., Bharti, J., Ahmed, G. F. (2010). The algorithm analysis of E-commerce security issues for online payment transaction system in banking technology. Journal of Computer Science and Information Security, 8(1), 307–312.
-
(2010)
Journal of Computer Science and Information Security
, vol.8
, Issue.1
, pp. 307-312
-
-
Barskar, R.1
Jayant, A.2
Bharti, J.3
Ahmed, G.F.4
-
4
-
-
85042434074
-
-
In Proceedings of Barcelona Smart Cities Congress, Barcelona, Spain
-
Bartol, A., Hernandez-Serranoy, J., Soriano, M., Dohler, M., Kountouris, A., & Barthel, D. (2011). Security and privacy in your smart city. In Proceedings of Barcelona Smart Cities Congress, Barcelona, Spain, pp. 1–6.
-
(2011)
Security and privacy in your smart city
, pp. 1-6
-
-
Bartol, A.1
Hernandez-Serranoy, J.2
Soriano, M.3
Dohler, M.4
Kountouris, A.5
Barthel, D.6
-
5
-
-
33846367309
-
People-often the weakest link in security, but one of the best places to start
-
Bresz, F. P. (2004). People-often the weakest link in security, but one of the best places to start. Journal of Health Care Compliance, 6(4), 57–60.
-
(2004)
Journal of Health Care Compliance
, vol.6
, Issue.4
, pp. 57-60
-
-
Bresz, F.P.1
-
6
-
-
0003095695
-
The partial least square approach to structural equation modeling
-
Marcoulides GA, (ed), Erlbaum, Mahwah, NJ
-
Chin, W. W. (1998). The partial least square approach to structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Mahwah, NJ: Erlbaum.
-
(1998)
Modern methods for business research
, pp. 295-336
-
-
Chin, W.W.1
-
7
-
-
4544247079
-
Protocol for automated negotiations with buyer anonymity and seller reputation
-
Cranor, L. F., & Resnick, P. (2000). Protocol for automated negotiations with buyer anonymity and seller reputation. Netnomics, 2, 1–23.
-
(2000)
Netnomics
, vol.2
, pp. 1-23
-
-
Cranor, L.F.1
Resnick, P.2
-
8
-
-
0033464665
-
Information privacy concern, procedural fairness and impersonal trust: An empirical investigation
-
Culnan, M. J., & Pamcle, K. A. (1999). Information privacy concern, procedural fairness and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.
-
(1999)
Organization Science
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.J.1
Pamcle, K.A.2
-
9
-
-
0037368865
-
The DeLone and McLean model of information systems success: A ten year update
-
DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten year update. Journal of Management Information Systems, 19(4), 9–30.
-
(2003)
Journal of Management Information Systems
, vol.19
, Issue.4
, pp. 9-30
-
-
Delone, W.H.1
McLean, E.R.2
-
11
-
-
84868100794
-
-
The New York Times Magazine, Accessed Oct 2016
-
Duhigg, C. (2012). How companies learn your secrets. The New York Times Magazine. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html. Accessed Oct 2016.
-
(2012)
How companies learn your secrets
-
-
Duhigg, C.1
-
12
-
-
0036765493
-
Management’s role in information security in a cyber economy
-
Dutta, A., & McCrohan, K. (2002). Management’s role in information security in a cyber economy. California Management Review, 45(1), 67–87.
-
(2002)
California Management Review
, vol.45
, Issue.1
, pp. 67-87
-
-
Dutta, A.1
McCrohan, K.2
-
13
-
-
79960803568
-
-
Ernst & Young, Accessed 3 Oct 2016
-
Ernst & Young. (2008). Ernst & Young 2008 Global Information Security Survey. http://faisaldanka.wordpress.com/2008/10/20/ernst-young-2008-globa-informationsecurity-survey. Accessed 3 Oct 2016.
-
(2008)
Ernst & Young, Global Information Security Survey
-
-
-
15
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. JMR, Journal of Marketing Research, 18(1), 39–50.
-
(1981)
JMR, Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
16
-
-
21144482295
-
Information technology, marketing practice, and consumer privacy: Ethical issue
-
Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issue. Journal of Public & Marketing, 12, 106–119.
-
(1993)
Journal of Public & Marketing
, vol.12
, pp. 106-119
-
-
Foxman, E.R.1
Kilcoyne, P.2
-
17
-
-
10444233507
-
U-commerce: Emerging trends and research issues
-
Galanxhi-Janaqi, H., & Nah, F. F.-H. (2004). U-commerce: Emerging trends and research issues. Industrial Management & Data Systems, 104(9), 744–755.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.9
, pp. 744-755
-
-
Galanxhi-Janaqi, H.1
Nah, F.F.-H.2
-
20
-
-
85022085662
-
Big data analytics—A review on theoretical contributions and tools used in literature
-
Grover, P., & Kar, A. K. (2017). Big data analytics—A review on theoretical contributions and tools used in literature. Forthcoming in Global Journal of Flexible Systems Management, 18(3), 203–229.
-
(2017)
Forthcoming in Global Journal of Flexible Systems Management
, vol.18
, Issue.3
, pp. 203-229
-
-
Grover, P.1
Kar, A.K.2
-
21
-
-
0036330173
-
Information security policy—What do international security standards say
-
Hone, K., & Eloff, J. H. P. (2002). Information security policy—What do international security standards say. Computers & Security, 21(5), 402–409.
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Hone, K.1
Eloff, J.H.P.2
-
22
-
-
0000230521
-
Use of partial least squares (PLS) in strategic management research: A review of four recent studies
-
Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195–204.
-
(1999)
Strategic Management Journal
, vol.20
, Issue.2
, pp. 195-204
-
-
Hulland, J.1
-
23
-
-
84919822267
-
Behavioral flexibility: The use of upward impression management tactics by subordinates for good performance rating from leader and impact of organizational & leader’s machiavellianism
-
Jaiswal, P., & Bhal, K. T. (2014). Behavioural flexibility: The use of upward impression management tactics by subordinates for good performance rating from leader and impact of organizational & leader’s machiavellianism. Global Journal of Flexible Systems Management, 15(4), 313–326.
-
(2014)
Global Journal of Flexible Systems Management
, vol.15
, Issue.4
, pp. 313-326
-
-
Jaiswal, P.1
Bhal, K.T.2
-
24
-
-
84941969287
-
Analysis of security measure implemented on G2C online payment systems in India
-
Jeberson, W., Singh, G., & Sahu, G. P. (2011). Analysis of security measure implemented on G2C online payment systems in India. MIT International Journal of Computer Science and Information Technology, 1(1), 19–27.
-
(2011)
MIT International Journal of Computer Science and Information Technology
, vol.1
, Issue.1
, pp. 19-27
-
-
Jeberson, W.1
Singh, G.2
Sahu, G.P.3
-
25
-
-
84928335164
-
Flexible pricing models for cloud computing based on group decision making under consensus
-
Kar, A. K., & Rakshit, A. (2015). Flexible pricing models for cloud computing based on group decision making under consensus. Global Journal of Flexible Systems Management, 16(2), 1–14.
-
(2015)
Global Journal of Flexible Systems Management
, vol.16
, Issue.2
, pp. 1-14
-
-
Kar, A.K.1
Rakshit, A.2
-
26
-
-
0028368878
-
On tariffs, policing, and admission control of multi-service networks
-
Kelly, F. P. (1994). On tariffs, policing, and admission control of multi-service networks. Operational Research Letters, 15, 1–9.
-
(1994)
Operational Research Letters
, vol.15
, pp. 1-9
-
-
Kelly, F.P.1
-
29
-
-
84905749571
-
Flexible decision approach for analyzing performance of sustainable supply chains under risks/uncertainty
-
Mangla, S. K., Kumar, P., & Barua, M. K. (2014). Flexible decision approach for analysing performance of sustainable supply chains under risks/uncertainty. Global Journal of Flexible Systems Management, 15(2), 113–130.
-
(2014)
Global Journal of Flexible Systems Management
, vol.15
, Issue.2
, pp. 113-130
-
-
Mangla, S.K.1
Kumar, P.2
Barua, M.K.3
-
30
-
-
0009925685
-
Initial trust formation in new organizational relationships
-
McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473–490.
-
(1998)
Academy of Management Review
, vol.23
, Issue.3
, pp. 473-490
-
-
McKnight, D.L.1
Cummings, L.L.2
Chervany, N.3
-
31
-
-
73449149291
-
Development of an instrument to measure the perceptions of adopting an information technology innovation
-
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222.
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 192-222
-
-
Moore, G.C.1
Benbasat, I.2
-
33
-
-
0011043226
-
Who owns digital works?
-
Okerson, A. (1996). Who owns digital works? Scientific America, 275(1), 80–84.
-
(1996)
Scientific America
, vol.275
, Issue.1
, pp. 80-84
-
-
Okerson, A.1
-
34
-
-
0004310779
-
-
Penguin Books, Harmondsworth
-
Piggott, S. (1950). Pre-historic India (p. 165). Harmondsworth: Penguin Books.
-
(1950)
Pre-historic India
, pp. 165
-
-
Piggott, S.1
-
35
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P. M., MacKenzie, S. B., & Lee, J. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Lee, J.Y.3
-
36
-
-
0036567901
-
Key dimensions of business-to-commerce websites
-
Ranganathan, C., & Ganapathy, S. (2002). Key dimensions of business-to-commerce websites. Information & Management, 39, 437–465.
-
(2002)
Information & Management
, vol.39
, pp. 437-465
-
-
Ranganathan, C.1
Ganapathy, S.2
-
37
-
-
33846794868
-
Phishing for user security awareness
-
Ronald, C., Carver, C., & Ferguson, A. (2007). Phishing for user security awareness. Computers & Security, 26, 73–80.
-
(2007)
Computers & Security
, vol.26
, pp. 73-80
-
-
Ronald, C.1
Carver, C.2
Ferguson, A.3
-
38
-
-
38149048170
-
Between extreme rejection and cautious acceptance: consumers’ reactions to RFID-based IS in retail
-
Rothensee, M., & Spiekermann, S. (2008). Between extreme rejection and cautious acceptance: consumers’ reactions to RFID-based IS in retail. Social Science Computer Review, 26(1), 75–86.
-
(2008)
Social Science Computer Review
, vol.26
, Issue.1
, pp. 75-86
-
-
Rothensee, M.1
Spiekermann, S.2
-
39
-
-
85040565418
-
Security and privacy incredulities of in-car wireless networks: A tire pressure monitoring system case study
-
Berkeley, CA, USA. USENIX Association, Accessed Oct 2016
-
Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., & Xu, W. (2010). Security and privacy incredulities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the 19th USENIX Conference on Security, Berkeley, CA, USA. USENIX Association. http://www.winlab.rutgers.edu/~gruteser/papers/xu_tpms10.pdf. Accessed Oct 2016.
-
(2010)
In Proceedings of the 19th USENIX Conference on Security
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
-
40
-
-
0942289517
-
The impact of religious affiliation on trust in the context of electronic commerce
-
Siala, H., O’Keefe, R. M., & Hone, K. S. (2004). The impact of religious affiliation on trust in the context of electronic commerce. Interacting with Computers, 16(1), 07–27.
-
(2004)
Interacting with Computers
, vol.16
, Issue.1
, pp. 7-27
-
-
Siala, H.1
O’Keefe, R.M.2
Hone, K.S.3
-
43
-
-
27644489846
-
Managing conflicts in B2B E-commerce
-
Standifer, R. L., & Wall, J. A. J. (2003). Managing conflict in B2B E-Commerce. Business Horizons, 46(2), 65–70.
-
(2003)
Journal of Business Horizons
, vol.46
, Issue.2
, pp. 65-70
-
-
Standifer, R.L.1
Wall, J.A.2
-
44
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441–469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
45
-
-
84948653064
-
Creating flexibility through technological and attitudinal change
-
Sushil, (2015). Creating flexibility through technological and attitudinal change. Global Journal of Flexible Systems Management, 16(4), 309–311.
-
(2015)
Global Journal of Flexible Systems Management
, vol.16
, Issue.4
, pp. 309-311
-
-
Sushil1
-
46
-
-
84941969284
-
Protective measures in E-Commerce to deal with security threats arising out of social issues—A framework. International Journal of Computer
-
Tripathy, B., & Mishra, J. (2013). Protective measures in E-Commerce to deal with security threats arising out of social issues—A framework. International Journal of Computer Engineering and Technology, 4(1), 46–53.
-
(2013)
Engineering and Technology
, vol.4
, Issue.1
, pp. 46-53
-
-
Tripathy, B.1
Mishra, J.2
-
47
-
-
0037360262
-
Understanding on-line purchase intentions: Contribution from technology and trust perspectives
-
Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding on-line purchase intentions: Contribution from technology and trust perspectives. European Journal of Information System, 12(1), 47–48.
-
(2003)
European Journal of Information System
, vol.12
, Issue.1
, pp. 47-48
-
-
Van der Heijden, H.1
Verhagen, T.2
Creemers, M.3
-
48
-
-
0027943145
-
Comparing the predictive accuracy of models using a simple randomization test
-
Van der Voet, H. (1994). Comparing the predictive accuracy of models using a simple randomization test. Chemometrics and Intelligent Laboratory Systems, 25(2), 313–323.
-
(1994)
Chemometrics and Intelligent Laboratory Systems
, vol.25
, Issue.2
, pp. 313-323
-
-
Van der Voet, H.1
-
49
-
-
3042812983
-
The ten deadly sins of information security management
-
Von Solms, B., & Von Solms, R. (2004). The ten deadly sins of information security management. Computers & Security, 23, 371–376.
-
(2004)
Computers & Security
, vol.23
, pp. 371-376
-
-
Von Solms, B.1
Von Solms, R.2
-
50
-
-
0012437679
-
A framework for assessing the global diffusion of the internet
-
Wolcott, P., Press, L., McHenry, W., Goodman, S. E., & Foster, W. (2001). A framework for assessing the global diffusion of the internet. Journal of the Association for Information System, 2(6), 1–53.
-
(2001)
Journal of the Association for Information System
, vol.2
, Issue.6
, pp. 1-53
-
-
Wolcott, P.1
Press, L.2
McHenry, W.3
Goodman, S.E.4
Foster, W.5
-
51
-
-
84902594834
-
Cryptography best E-commerce security: A review
-
Yasmin, S., & Hasseb, K. (2012). Cryptography best E-commerce security: A review. International Journal of Computer Science and Information Technology, 9(2), 132–137.
-
(2012)
International Journal of Computer Science and Information Technology
, vol.9
, Issue.2
, pp. 132-137
-
-
Yasmin, S.1
Hasseb, K.2
-
52
-
-
85042428215
-
-
Yazdanifard, R., & Edres, N. A.-H. (2010). Security and privacy issues as a potential risk for further E-commerce development. In International Conference on Information, Communication and Management, IPCSIT (Vol. 16, pp. 23–27).
-
(2010)
Security and privacy issues as a potential risk for further E-commerce development. In International Conference on Information, Communication and Management, IPCSIT (Vol. 16, pp. 23–27)
-
-
Yazdanifard, R.1
Edres, N.A.-H.2
|