-
1
-
-
85073089866
-
Land planning authorities and sustainable tourism in zanzibar
-
Rome: May 6-10
-
Abdul-Nasser, H. (2012), “Land planning authorities and sustainable tourism in zanzibar”, In the Conference of Knowing to Manage the Territory, Protect the Environment, Evaluate the Cultural Heritage, Rome, May 6-10, pp. 1-14.
-
(2012)
In the Conference of Knowing to Manage the Territory, Protect the Environment, Evaluate the Cultural Heritage
, pp. 1-14
-
-
Abdul-Nasser, H.1
-
2
-
-
44049085831
-
Information technology and its implications for internal auditing
-
Abu-Musa, A.A. (2008), “Information technology and its implications for internal auditing”, Managerial Auditing Journal, Vol. 23 No. 5, pp. 436-466.
-
(2008)
Managerial Auditing Journal
, vol.23
, Issue.5
, pp. 436-466
-
-
Abu-Musa, A.A.1
-
3
-
-
32544449814
-
Controlling cyberspace: applying the computer fraud and abuse act to the internet
-
Adams, J.M. (1996), “Controlling cyberspace: applying the computer fraud and abuse act to the internet”, Santa Clara Computer and High-Technology Law Journal, Vol. 12 No. 2, pp. 403-434.
-
(1996)
Santa Clara Computer and High-Technology Law Journal
, vol.12
, Issue.2
, pp. 403-434
-
-
Adams, J.M.1
-
5
-
-
57549087433
-
Using a modified technology acceptance model in hospitals
-
Aggelidis, V. and Chatzoglou, P. (2009), “Using a modified technology acceptance model in hospitals”, International Journal of Medical Informatics, Vol. 7 No. 8, pp. 115-126.
-
(2009)
International Journal of Medical Informatics
, vol.7
, Issue.8
, pp. 115-126
-
-
Aggelidis, V.1
Chatzoglou, P.2
-
6
-
-
85020013723
-
Social media in marketing: a review and analysis of the existing literature
-
Alalwan, A.A., Rana, N.P., Dwivedi, Y.K. and Algharabat, R.S. (2017), “Social media in marketing: a review and analysis of the existing literature”, Telematics and Informatics, Vol. 34 No. 7, pp. 1177-1190.
-
(2017)
Telematics and Informatics
, vol.34
, Issue.7
, pp. 1177-1190
-
-
Alalwan, A.A.1
Rana, N.P.2
Dwivedi, Y.K.3
Algharabat, R.S.4
-
8
-
-
84861823868
-
Predictors for e-government adoption in Jordan: deployment of an empirical evaluation based on a citizen‐centric approach
-
Alomari, M., Woods, P. and Sandhu, K. (2012), “Predictors for e-government adoption in Jordan: deployment of an empirical evaluation based on a citizen‐centric approach”, Information Technology & People, Vol. 25 No. 2, pp. 207-234.
-
(2012)
Information Technology & People
, vol.25
, Issue.2
, pp. 207-234
-
-
Alomari, M.1
Woods, P.2
Sandhu, K.3
-
9
-
-
85033407531
-
Use of social media in citizen-centric electronic government services: a literature analysis
-
Alryalat, M., Rana, N.P., Sahu, G.P., Dwivedi, Y.K. and Tajvidi, M. (2017), “Use of social media in citizen-centric electronic government services: a literature analysis”, International Journal of Electronic Government Research, Vol. 13 No. 3, pp. 55-79.
-
(2017)
International Journal of Electronic Government Research
, vol.13
, Issue.3
, pp. 55-79
-
-
Alryalat, M.1
Rana, N.P.2
Sahu, G.P.3
Dwivedi, Y.K.4
Tajvidi, M.5
-
10
-
-
85073082341
-
Preventing cyber crime: a study regarding awareness of cyber crime in tricity
-
Aparna, M. and Chauhan, M. (2012), “Preventing cyber crime: a study regarding awareness of cyber crime in tricity”, International Journal of Enterprise Computing and Business Systems, Vol. 2 No. 1, pp. 1-10.
-
(2012)
International Journal of Enterprise Computing and Business Systems
, vol.2
, Issue.1
, pp. 1-10
-
-
Aparna, M.1
Chauhan, M.2
-
11
-
-
84927509517
-
A holistic cyber security implementation framework
-
Atoum, I., Otoom, A. and Ali, A.A. (2014), “A holistic cyber security implementation framework”, Information Technology & People, Vol. 22 No. 3, pp. 251-264.
-
(2014)
Information Technology & People
, vol.22
, Issue.3
, pp. 251-264
-
-
Atoum, I.1
Otoom, A.2
Ali, A.A.3
-
12
-
-
85073082290
-
Awareness regarding cyber victimization among students of University of Sindh, Jamsharo
-
Avais, M.A., Wassan, A.A., Narejo, H. and Khan, J.A. (2014), “Awareness regarding cyber victimization among students of University of Sindh, Jamsharo”, International Journal of Asian Social Science, Vol. 4 No. 5, pp. 632-641.
-
(2014)
International Journal of Asian Social Science
, vol.4
, Issue.5
, pp. 632-641
-
-
Avais, M.A.1
Wassan, A.A.2
Narejo, H.3
Khan, J.A.4
-
13
-
-
4544379638
-
Development of e-government: a STOPE view
-
Bakry, S.H. (2004), “Development of e-government: a STOPE view”, International Journal of Network Management, Vol. 14 No. 5, pp. 339-350.
-
(2004)
International Journal of Network Management
, vol.14
, Issue.5
, pp. 339-350
-
-
Bakry, S.H.1
-
14
-
-
0031539651
-
The effects of organizational differences and trust on the effectiveness of selling partner relationships
-
Barclay, D.W. and Smith, J.B. (1997), “The effects of organizational differences and trust on the effectiveness of selling partner relationships”, Journal of Marketing, Vol. 61 No. 1, pp. 3-21.
-
(1997)
Journal of Marketing
, vol.61
, Issue.1
, pp. 3-21
-
-
Barclay, D.W.1
Smith, J.B.2
-
15
-
-
84927674457
-
Cyber security: understanding cyber crimes, computer forensics and legal perspectives
-
Wiley Publication
-
Belapure, S. and Godble, N. (2011), “Cyber security: understanding cyber crimes, computer forensics and legal perspectives”, Cyber Security, Wiley Publication.
-
(2011)
Cyber Security
-
-
Belapure, S.1
Godble, N.2
-
16
-
-
80052086324
-
Applying maximum likelihood and pls on different sample sizes: studies on seroquel model and employee behavior model
-
Esposito Vinzi, V., Chin, W.W., Henseler, J. and Wang, H., and,(Eds), Springer, Heidelberg
-
Borroso, C., Carrion, G.C. and Roldan, J.L. (2010), “Applying maximum likelihood and pls on different sample sizes: studies on seroquel model and employee behavior model”, in Esposito Vinzi, V., Chin, W.W., Henseler, J. and Wang, H. (Eds), Handbook of Partial Least Squares: Concepts, Methods and Applications, Springer, Heidelberg, pp. 427-447.
-
(2010)
Handbook of Partial Least Squares: Concepts, Methods and Applications
, pp. 427-447
-
-
Borroso, C.1
Carrion, G.C.2
Roldan, J.L.3
-
17
-
-
85073086441
-
-
(accessed, January 26, 2018
-
Bowen, M. (2009), “Computer crime”, available at: www.guru.net/ (accessed January 26, 2018).
-
(2009)
Computer crime
-
-
Bowen, M.1
-
18
-
-
84899413556
-
The emerging consensus on criminal conduct in cyberspace
-
Brenner, S.W. and Goodman, M.D. (2002), “The emerging consensus on criminal conduct in cyberspace”, International Journal of Law and Information Technology, Vol. 10 No. 2, pp. 139-223.
-
(2002)
International Journal of Law and Information Technology
, vol.10
, Issue.2
, pp. 139-223
-
-
Brenner, S.W.1
Goodman, M.D.2
-
19
-
-
84961648876
-
Buying or browsing? An exploration of shopping orientations and online purchase intention
-
Brown, M., Pope, N. and Voges, K. (2003), “Buying or browsing? An exploration of shopping orientations and online purchase intention”, European Journal of Marketing, Vol. 37 Nos 11/12, pp. 1666-1684.
-
(2003)
European Journal of Marketing
, vol.37
, Issue.11-12
, pp. 1666-1684
-
-
Brown, M.1
Pope, N.2
Voges, K.3
-
20
-
-
4344607488
-
Assessing law enforcement preparedness to address internet fraud
-
Burns, R., Whitworth, K. and Thompson, C. (2004), “Assessing law enforcement preparedness to address internet fraud”, Journal of Criminal Justice, Vol. 32 No. 5, pp. 477-493.
-
(2004)
Journal of Criminal Justice
, vol.32
, Issue.5
, pp. 477-493
-
-
Burns, R.1
Whitworth, K.2
Thompson, C.3
-
21
-
-
80051636492
-
Smart cities in Europe
-
Caragliu, A., Del Bo, C. and Nijkamp, P. (2011), “Smart cities in Europe”, Journal of Urban Technology, Vol. 16 No. 2, pp. 65-82.
-
(2011)
Journal of Urban Technology
, vol.16
, Issue.2
, pp. 65-82
-
-
Caragliu, A.1
Del Bo, C.2
Nijkamp, P.3
-
22
-
-
84940783105
-
Three keys of the city: resources, agglomeration economies, and sorting
-
Carlino, G.A. (2011), “Three keys of the city: resources, agglomeration economies, and sorting”, Business Review Quarterly, Vol. 3 No. 3, pp. 1-13.
-
(2011)
Business Review Quarterly
, vol.3
, Issue.3
, pp. 1-13
-
-
Carlino, G.A.1
-
23
-
-
85018708331
-
CHIS: a big data infrastructure to manage digital cultural items
-
September
-
Castiglione, A., Colace, F., Moscato, V. and Palmieri, F. (2018), “CHIS: a big data infrastructure to manage digital cultural items”, Future Generation Computer Systems, Vol. 86, September, pp. 1134-1145.
-
(2018)
Future Generation Computer Systems
, vol.86
, pp. 1134-1145
-
-
Castiglione, A.1
Colace, F.2
Moscato, V.3
Palmieri, F.4
-
24
-
-
0033336136
-
Distributed data mining in credit card fraud detection
-
Chan, P.K., Fan, W., Prodromidis, A.L. and Stolfo, S.J. (1999), “Distributed data mining in credit card fraud detection”, IEEE Intelligent System, Vol. 14 No. 6, pp. 67-74.
-
(1999)
IEEE Intelligent System
, vol.14
, Issue.6
, pp. 67-74
-
-
Chan, P.K.1
Fan, W.2
Prodromidis, A.L.3
Stolfo, S.J.4
-
25
-
-
84946237435
-
Smart Cities in developing economies: a literature review and policy insights
-
Chatterjee, S. and Kar, A.K. (2015), “Smart Cities in developing economies: a literature review and policy insights”, International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2335-2340.
-
(2015)
International Conference on Advances in Computing, Communications and Informatics (ICACCI)
, pp. 2335-2340
-
-
Chatterjee, S.1
Kar, A.K.2
-
26
-
-
85036520392
-
Effects of successful adoption of information technology enabled services in proposed smart cities of India: from user experience perspective
-
Chatterjee, S. and Kar, A.K. (2017), “Effects of successful adoption of information technology enabled services in proposed smart cities of India: from user experience perspective”, Journal of Science and Technology Policy Management, Vol. 9 No. 2, pp. 189-209.
-
(2017)
Journal of Science and Technology Policy Management
, vol.9
, Issue.2
, pp. 189-209
-
-
Chatterjee, S.1
Kar, A.K.2
-
27
-
-
85042439909
-
Alignment of IT authority and citizens of proposed smart cities in India: system security and privacy perspective
-
Chatterjee, S., Kar, A.K. and Gupta, M.P. (2017a), “Alignment of IT authority and citizens of proposed smart cities in India: system security and privacy perspective”, Global Journal of Flexible Systems Management, Vol. 19 No. 1, pp. 95-107.
-
(2017)
Global Journal of Flexible Systems Management
, vol.19
, Issue.1
, pp. 95-107
-
-
Chatterjee, S.1
Kar, A.K.2
Gupta, M.P.3
-
28
-
-
85013335962
-
Critical success factors to establish 5G network in smart cities: inputs for security and privacy
-
Chatterjee, S., Kar, A.K. and Gupta, M.P. (2017b), “Critical success factors to establish 5G network in smart cities: inputs for security and privacy”, Journal of Global Information Management, Vol. 25 No. 2, pp. 15-37.
-
(2017)
Journal of Global Information Management
, vol.25
, Issue.2
, pp. 15-37
-
-
Chatterjee, S.1
Kar, A.K.2
Gupta, M.P.3
-
29
-
-
85048756348
-
Success of IoT in Smart Cities of India: an empirical analysis
-
Chatterjee, S., Kar, A.K. and Gupta, M.P. (2018), “Success of IoT in Smart Cities of India: an empirical analysis”, Government Information Quarterly, Vol. 35 No. 3, pp. 349-361, available at: https://doi.org/10.1016/j.giq.2018.05.002
-
(2018)
Government Information Quarterly
, vol.35
, Issue.3
, pp. 349-361
-
-
Chatterjee, S.1
Kar, A.K.2
Gupta, M.P.3
-
30
-
-
84937891587
-
Analyses of issues of information security in Indian context
-
Chaturvedi, M., Singh, A.N., Gupta, M.P. and Bhattacharya, J. (2014), “Analyses of issues of information security in Indian context”, Information Technology & People, Vol. 8 No. 3, pp. 374-397.
-
(2014)
Information Technology & People
, vol.8
, Issue.3
, pp. 374-397
-
-
Chaturvedi, M.1
Singh, A.N.2
Gupta, M.P.3
Bhattacharya, J.4
-
31
-
-
0442298972
-
COPLINK: managing law enforcement data knowledge
-
Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W. and Schroeder, J. (2003), “COPLINK: managing law enforcement data knowledge”, Communications of the ACM, Vol. 46 No. 1, pp. 28-34.
-
(2003)
Communications of the ACM
, vol.46
, Issue.1
, pp. 28-34
-
-
Chen, H.1
Zeng, D.2
Atabakhsh, H.3
Wyzga, W.4
Schroeder, J.5
-
32
-
-
84862798172
-
What drives consumers to spread electronic word of mouth in online consumer-opinion platforms
-
Cheung, C.M. and Lee, M.K. (2012), “What drives consumers to spread electronic word of mouth in online consumer-opinion platforms”, Decision Support Systems, Vol. 53 No. 1, pp. 218-225.
-
(2012)
Decision Support Systems
, vol.53
, Issue.1
, pp. 218-225
-
-
Cheung, C.M.1
Lee, M.K.2
-
33
-
-
85040306560
-
Review of technology adoption frameworks in mobile commerce
-
Chhonker, M.S., Verma, D. and Kar, A.K. (2017), “Review of technology adoption frameworks in mobile commerce”, Information Technology and Quantitative Management, Vol. 122, pp. 888-895.
-
(2017)
Information Technology and Quantitative Management
, vol.122
, pp. 888-895
-
-
Chhonker, M.S.1
Verma, D.2
Kar, A.K.3
-
34
-
-
4243109031
-
On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution
-
Chin, W.W. and Todd, P.A. (1995), “On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution”, MIS Quarterly, Vol. 19 No. 2, pp. 237-246.
-
(1995)
MIS Quarterly
, vol.19
, Issue.2
, pp. 237-246
-
-
Chin, W.W.1
Todd, P.A.2
-
35
-
-
85032461057
-
The relationship between motivation and information sharing about products and services on Facebook
-
Cho, I., Park, H. and Kim, J.K. (2014), “The relationship between motivation and information sharing about products and services on Facebook”, Behaviour & Information Technology, Vol. 30 No. 1, pp. 1-11.
-
(2014)
Behaviour & Information Technology
, vol.30
, Issue.1
, pp. 1-11
-
-
Cho, I.1
Park, H.2
Kim, J.K.3
-
36
-
-
80051656644
-
Determinants of consumer engagement in electronic word-of-mouth (e WOM) in social networking sites
-
Chu, S.C. and Kim, Y. (2011), “Determinants of consumer engagement in electronic word-of-mouth (e WOM) in social networking sites”, International Journal of Advertising, Vol. 30 No. 1, pp. 47-75.
-
(2011)
International Journal of Advertising
, vol.30
, Issue.1
, pp. 47-75
-
-
Chu, S.C.1
Kim, Y.2
-
37
-
-
78650472272
-
An exploration of technology diffusion
-
(accessed, March 16, 2018
-
Comin, D.A. and Hobijn, B. (2010), “An exploration of technology diffusion”, American Economic Review, Vol. 100 No. 5, pp. 2031-2061, available at: www.dartmouth.edu/~dcomin/files/exploration_technology.pdf (accessed March 16, 2018).
-
(2010)
American Economic Review
, vol.100
, Issue.5
, pp. 2031-2061
-
-
Comin, D.A.1
Hobijn, B.2
-
38
-
-
63849287320
-
Veering toward digital disorder: computer-related crime and law enforcement preparedness
-
Correia, M. and Bowling, C. (1999), “Veering toward digital disorder: computer-related crime and law enforcement preparedness”, Police Quarterly, Vol. 2 No. 2, pp. 225-244.
-
(1999)
Police Quarterly
, vol.2
, Issue.2
, pp. 225-244
-
-
Correia, M.1
Bowling, C.2
-
39
-
-
84936823933
-
User acceptance of computer technology: a comparison of two theoretical models
-
Davis, F., Bagozzi, R. and Warshaw, P. (1989), “User acceptance of computer technology: a comparison of two theoretical models”, Management Science, Vol. 35 No. 8, pp. 982-1003.
-
(1989)
Management Science
, vol.35
, Issue.8
, pp. 982-1003
-
-
Davis, F.1
Bagozzi, R.2
Warshaw, P.3
-
40
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis, F.D. (1989), “Perceived usefulness, perceived ease of use, and user acceptance of information technology”, MIS Quarterly, Vol. 13 No. 3, pp. 319-340.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.D.1
-
41
-
-
84861820007
-
Examining perceptions of local law enforcement in the fight against crimes with a cyber component
-
Davis, J.T. (2012), “Examining perceptions of local law enforcement in the fight against crimes with a cyber component”, Policing: An International Journal of Police Strategies & Management, Vol. 35 No. 2, pp. 272-284.
-
(2012)
Policing: An International Journal of Police Strategies & Management
, vol.35
, Issue.2
, pp. 272-284
-
-
Davis, J.T.1
-
42
-
-
0036738975
-
Antecedents of B2C channel satisfaction and preference: validating e-commerce metrics
-
Devaraj, S., Fan, M. and Kohli, R. (2002), “Antecedents of B2C channel satisfaction and preference: validating e-commerce metrics”, Information Systems Research, Vol. 13 No. 3, pp. 316-333.
-
(2002)
Information Systems Research
, vol.13
, Issue.3
, pp. 316-333
-
-
Devaraj, S.1
Fan, M.2
Kohli, R.3
-
43
-
-
0042367634
-
Mining e-mail content for author identification forensics
-
De Vel, O., Anderson, A., Corney, M. and Mohay, G. (2001), “Mining e-mail content for author identification forensics”, SIGMOD Record, Vol. 30 No. 4, pp. 55-64.
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 55-64
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
44
-
-
85020296213
-
Re-examining the unified theory of acceptance and use of technology (UTAUT): towards a revised theoretical model
-
Dwivedi, Y.K., Rana, N.P., Jeyaraj, A., Clement, M. and Williams, M.D. (2017), “Re-examining the unified theory of acceptance and use of technology (UTAUT): towards a revised theoretical model”, Information Systems Frontiers, pp. 1-16, available at: https://doi.org/10.1007/s10796-017-9774-y
-
(2017)
Information Systems Frontiers
, pp. 1-16
-
-
Dwivedi, Y.K.1
Rana, N.P.2
Jeyaraj, A.3
Clement, M.4
Williams, M.D.5
-
45
-
-
85016509981
-
An empirical validation of a unified model of electronic government adoption (UMEGA)
-
Dwivedi, Y.K., Rana, N.P., Janssen, M., Lal, B., Williams, M.D. and Clement, R.M. (2017), “An empirical validation of a unified model of electronic government adoption (UMEGA)”, Government Information Quarterly, Vol. 34 No. 2, pp. 211-230.
-
(2017)
Government Information Quarterly
, vol.34
, Issue.2
, pp. 211-230
-
-
Dwivedi, Y.K.1
Rana, N.P.2
Janssen, M.3
Lal, B.4
Williams, M.D.5
Clement, R.M.6
-
46
-
-
78751493611
-
Branding in the digital age: you’re spending your money in all the wrong places
-
Edelman, D.C. (2010), “Branding in the digital age: you’re spending your money in all the wrong places”, Harvard Business Review, Vol. 88, pp. 63-69.
-
(2010)
Harvard Business Review
, vol.88
, pp. 63-69
-
-
Edelman, D.C.1
-
47
-
-
37249053884
-
Social network sites: definition, history, and scholarship
-
Ellison, N.B. (2007), “Social network sites: definition, history, and scholarship”, Journal of Computer-Mediated Communication, Vol. 13 No. 1, pp. 210-230.
-
(2007)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 210-230
-
-
Ellison, N.B.1
-
49
-
-
0003551671
-
-
Addison-Wesley, Reading, MA
-
Fishbein, M. and Ajzen, I. (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addison-Wesley, Reading, MA.
-
(1975)
Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
50
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C. and Larcker, D.F. (1981), “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research, Vol. 18 No. 1, pp. 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
51
-
-
80054004609
-
-
Economic Growth Center, Yale University, Discussion Paper 984, Connecticut
-
Foster, A.D. and Rosenzweig, M.R. (2010), “Microeconomics of technology adoption”, Economic Growth Center, Yale University, Discussion Paper No. 984, Connecticut.
-
(2010)
Microeconomics of technology adoption
-
-
Foster, A.D.1
Rosenzweig, M.R.2
-
52
-
-
77950941459
-
The effect of data breaches on shareholder wealth
-
Gatzlaff, K.M. and McCullough, K.A. (2010), “The effect of data breaches on shareholder wealth”, Risk Management and Insurance Review, Vol. 13 No. 1, pp. 61-83.
-
(2010)
Risk Management and Insurance Review
, vol.13
, Issue.1
, pp. 61-83
-
-
Gatzlaff, K.M.1
McCullough, K.A.2
-
53
-
-
85026856898
-
A general morphological analysis: delineating a cyber-security culture
-
Gcaza, N., Solms, R., Grobler, M.M. and Vuuren, J.J. (2017), “A general morphological analysis: delineating a cyber-security culture”, Information Technology & People, Vol. 25 No. 3, pp. 259-278.
-
(2017)
Information Technology & People
, vol.25
, Issue.3
, pp. 259-278
-
-
Gcaza, N.1
Solms, R.2
Grobler, M.M.3
Vuuren, J.J.4
-
54
-
-
0034413987
-
E-commerce: the role of familiarity and trust
-
Gefen, D. (2000), “E-commerce: the role of familiarity and trust”, The International Journal of Management Science, Vol. 28 No. 6, pp. 725-737.
-
(2000)
The International Journal of Management Science
, vol.28
, Issue.6
, pp. 725-737
-
-
Gefen, D.1
-
55
-
-
79960820734
-
Law enforcement’s ability to deal with digital crime and the implications for business
-
Gogolin, G. and Jones, J. (2010), “Law enforcement’s ability to deal with digital crime and the implications for business”, Information Security Journal: A Global Perspective, Vol. 19 No. 3, pp. 109-117.
-
(2010)
Information Security Journal: A Global Perspective
, vol.19
, Issue.3
, pp. 109-117
-
-
Gogolin, G.1
Jones, J.2
-
58
-
-
84912544838
-
Understanding the energy consumption and occupancy of a multipurpose academic building
-
Gul, M.S. and Patidar, S. (2015), “Understanding the energy consumption and occupancy of a multipurpose academic building”, Energy and Building, Vol. 87, pp. 155-165.
-
(2015)
Energy and Building
, vol.87
, pp. 155-165
-
-
Gul, M.S.1
Patidar, S.2
-
59
-
-
85027466477
-
ANN based scheme to predict number of zombies involved in a DDoS attack
-
Gupta, B.B., Joshi, R.C. and Misra, M. (2012), “ANN based scheme to predict number of zombies involved in a DDoS attack”, International Journal of Network Security, Vol. 14 No. 1, pp. 36-45.
-
(2012)
International Journal of Network Security
, vol.14
, Issue.1
, pp. 36-45
-
-
Gupta, B.B.1
Joshi, R.C.2
Misra, M.3
-
60
-
-
84927746059
-
The pattern of Urban land use changes, a case study of Indian Cities
-
Gupta, R. (2014), “The pattern of Urban land use changes, a case study of Indian Cities”, Environment and Urbanization Asia, Vol. 5 No. 1, pp. 83-104.
-
(2014)
Environment and Urbanization Asia
, vol.5
, Issue.1
, pp. 83-104
-
-
Gupta, R.1
-
61
-
-
79952790874
-
PLS-SEM: indeed, a silver bullet
-
Hair, J.F., Ringle, C.M. and Sarstedt, M. (2011), “PLS-SEM: indeed, a silver bullet”, Journal of Marketing Theory and Practice, Vol. 19 No. 2, pp. 139-152.
-
(2011)
Journal of Marketing Theory and Practice
, vol.19
, Issue.2
, pp. 139-152
-
-
Hair, J.F.1
Ringle, C.M.2
Sarstedt, M.3
-
62
-
-
0003506109
-
-
3rd ed., Macmillan Publishing Company, New York, NY
-
Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C. (1992), Multivariate Data Analysis with Readings, 3rd ed., Macmillan Publishing Company, New York, NY.
-
(1992)
Multivariate Data Analysis with Readings
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
63
-
-
0041877530
-
Perceived usefulness, ease of use and electronic supermarket use
-
Henderson, R. and Divett, M. (2003), “Perceived usefulness, ease of use and electronic supermarket use”, International Journal of Human-Computer Studies, Vol. 59 No. 3, pp. 383-395.
-
(2003)
International Journal of Human-Computer Studies
, vol.59
, Issue.3
, pp. 383-395
-
-
Henderson, R.1
Divett, M.2
-
64
-
-
8844253975
-
Perceptions of local and state law enforcement concerning the role of computer crime investigative teams
-
Hinduja, S. (2004), “Perceptions of local and state law enforcement concerning the role of computer crime investigative teams”, Policing: An International Journal of Police Strategies & Management, Vol. 27 No. 3, pp. 341-357.
-
(2004)
Policing: An International Journal of Police Strategies & Management
, vol.27
, Issue.3
, pp. 341-357
-
-
Hinduja, S.1
-
65
-
-
22944472837
-
A review of scale development practices in the study of organizations
-
Hinkin, T.R. (1995), “A review of scale development practices in the study of organizations”, Journal of Management, Vol. 21 No. 5, pp. 967-988.
-
(1995)
Journal of Management
, vol.21
, Issue.5
, pp. 967-988
-
-
Hinkin, T.R.1
-
66
-
-
49249132246
-
Defining, assessing, and promoting clearing success: an information systems perspective
-
Holsapple, C.W. and Lee-Post, A. (2006), “Defining, assessing, and promoting clearing success: an information systems perspective”, Journal of Innovative Education, Vol. 4 No. 1, pp. 67-85.
-
(2006)
Journal of Innovative Education
, vol.4
, Issue.1
, pp. 67-85
-
-
Holsapple, C.W.1
Lee-Post, A.2
-
68
-
-
67650706330
-
Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives
-
Hu, L.-T. and Bentler, P.M. (1999), “Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives”, Structural Equation Modeling, Vol. 6 No. 1, pp. 1-55.
-
(1999)
Structural Equation Modeling
, vol.6
, Issue.1
, pp. 1-55
-
-
Hu, L.-T.1
Bentler, P.M.2
-
69
-
-
85073085223
-
Effects of facebook like and conflicting aggregate rating and customer comment on purchase intentions
-
Los Angeles, CA
-
Hung, Y.H. and Lai, H.Y. (2015), “Effects of facebook like and conflicting aggregate rating and customer comment on purchase intentions”, International Conference on Universal Access in Human-Computer Interaction, 193–200, Springer International. Information Dimensions, Communications of the Association for Information Systems, Los Angeles, CA, pp. 1-23.
-
(2015)
International Conference on Universal Access in Human-Computer Interaction, 193–200, Springer International. Information Dimensions, Communications of the Association for Information Systems
, pp. 1-23
-
-
Hung, Y.H.1
Lai, H.Y.2
-
70
-
-
0023960940
-
Detecting plagiarism in student PASCAL programs
-
Jankowitz, H.T. (1988), “Detecting plagiarism in student PASCAL programs”, Computer Journal, Vol. 31 No. 1, pp. 1-8.
-
(1988)
Computer Journal
, vol.31
, Issue.1
, pp. 1-8
-
-
Jankowitz, H.T.1
-
71
-
-
84882967995
-
Cyber crime in Singapore: an analysis of regulation based on Lessig’s four modalities of constraint
-
Jiow, H.J. (2013), “Cyber crime in Singapore: an analysis of regulation based on Lessig’s four modalities of constraint”, International Journal of Cyber Criminology, Vol. 7 No. 1, pp. 18-27.
-
(2013)
International Journal of Cyber Criminology
, vol.7
, Issue.1
, pp. 18-27
-
-
Jiow, H.J.1
-
72
-
-
85073086496
-
Full guide on cyber crimes in India
-
India Forensic Consultancy Services: (accessed, January 22, 2018
-
Joshi, S.M. (2016), “Full guide on cyber crimes in India”, Journal of Frauds, India Forensic Consultancy Services, available at: http://indiaforensic.com/ (accessed January 22, 2018).
-
(2016)
Journal of Frauds
-
-
Joshi, S.M.1
-
73
-
-
71149088987
-
Users of the world, unite! The challenges and opportunities of social media
-
Kaplan, A.M. and Haenlein, M. (2010), “Users of the world, unite! The challenges and opportunities of social media”, Business Horizons, Vol. 53 No. 1, pp. 59-68.
-
(2010)
Business Horizons
, vol.53
, Issue.1
, pp. 59-68
-
-
Kaplan, A.M.1
Haenlein, M.2
-
74
-
-
85033436653
-
Advances in social media research: past, present and future
-
Kapoor, K.K., Tamilmani, K., Rana, N.P., Patil, P., Dwivedi, Y.K. and Nerur, S. (2017), “Advances in social media research: past, present and future”, Information Systems Frontiers, Vol. 20 No. 3, pp. 531-558.
-
(2017)
Information Systems Frontiers
, vol.20
, Issue.3
, pp. 531-558
-
-
Kapoor, K.K.1
Tamilmani, K.2
Rana, N.P.3
Patil, P.4
Dwivedi, Y.K.5
Nerur, S.6
-
75
-
-
84993043338
-
Preserve, protect and defend
-
Kelly, B.J. (1999), “Preserve, protect and defend”, Journal of Business Strategy, Vol. 20 No. 5, pp. 22-26.
-
(1999)
Journal of Business Strategy
, vol.20
, Issue.5
, pp. 22-26
-
-
Kelly, B.J.1
-
76
-
-
84928961676
-
-
World Health Organization Regional Office for Europe, Copenhagen: :, (accessed, December 16, 2017
-
Kickbusch, I. and Gleicher, D. (2014), Smart Governance for Health and Well-Being: The Evidence, World Health Organization Regional Office for Europe, Copenhagen, pp. 106-127, available at: www.euro.who.int/data/assets/pdf_file/0005/257513/Smart-governance-for-health-and-well-being-the-evidence.pdf (accessed December 16, 2017).
-
(2014)
Smart Governance for Health and Well-Being: The Evidence
, pp. 106-127
-
-
Kickbusch, I.1
Gleicher, D.2
-
77
-
-
79953149276
-
Hedonic tendencies and the online consumer: an investigation of the online shopping process
-
Kim, S. and Eastin, M.S. (2011), “Hedonic tendencies and the online consumer: an investigation of the online shopping process”, Journal of Internet Commerce, Vol. 10 No. 1, pp. 68-90.
-
(2011)
Journal of Internet Commerce
, vol.10
, Issue.1
, pp. 68-90
-
-
Kim, S.1
Eastin, M.S.2
-
78
-
-
84871365586
-
Effects of various characteristics of social commerce (s-Commerce) on consumers’ trust and trust performance
-
Kim, S. and Park, H. (2013), “Effects of various characteristics of social commerce (s-Commerce) on consumers’ trust and trust performance”, International Journal of Information Management, Vol. 33 No. 2, pp. 318-332.
-
(2013)
International Journal of Information Management
, vol.33
, Issue.2
, pp. 318-332
-
-
Kim, S.1
Park, H.2
-
79
-
-
27644594594
-
The role of trust in the modern administrative state: an integrated model
-
Kim, S.E. (2005), “The role of trust in the modern administrative state: an integrated model”, Administration and Society, Vol. 37 No. 5, pp. 611-635.
-
(2005)
Administration and Society
, vol.37
, Issue.5
, pp. 611-635
-
-
Kim, S.E.1
-
80
-
-
36849055511
-
Impact of social influence in e-Commerce decision making
-
Minneapolis, MN
-
Kim, Y. and Srivastava, J. (2007), “Impact of social influence in e-Commerce decision making”, Proceedings of the Ninth International Conference on Electronic Commerce, Minneapolis, MN, pp. 293-302.
-
(2007)
Proceedings of the Ninth International Conference on Electronic Commerce
, pp. 293-302
-
-
Kim, Y.1
Srivastava, J.2
-
81
-
-
84905741460
-
What we know and don’t know about online word-of-mouth: a review and synthesis of the literature
-
King, R.A., Racherla, P. and Bush, V.D. (2014), “What we know and don’t know about online word-of-mouth: a review and synthesis of the literature”, Journal of Interactive Marketing, Vol. 28 No. 3, pp. 167-183.
-
(2014)
Journal of Interactive Marketing
, vol.28
, Issue.3
, pp. 167-183
-
-
King, R.A.1
Racherla, P.2
Bush, V.D.3
-
82
-
-
84864514397
-
Lateral collinearity and misleading results in variance-based SEM: an illustration and recommendations
-
Kock, N. and Lynn, G. (2012), “Lateral collinearity and misleading results in variance-based SEM: an illustration and recommendations”, Journal of the Association for Information Systems, Vol. 13 No. 7, pp. 546-580.
-
(2012)
Journal of the Association for Information Systems
, vol.13
, Issue.7
, pp. 546-580
-
-
Kock, N.1
Lynn, G.2
-
83
-
-
2642578546
-
Technologies, security and privacy in the post-9/11 European information society
-
Levi, M. and Wall, D. (2004), “Technologies, security and privacy in the post-9/11 European information society”, Journal of Law and Society, Vol. 31 No. 2, pp. 194-230.
-
(2004)
Journal of Law and Society
, vol.31
, Issue.2
, pp. 194-230
-
-
Levi, M.1
Wall, D.2
-
84
-
-
84963063075
-
Trust as a social reality
-
Lewis, J.D. and Weigert, A. (1985), “Trust as a social reality”, Social Forces, Vol. 63 No. 4, pp. 967-985.
-
(1985)
Social Forces
, vol.63
, Issue.4
, pp. 967-985
-
-
Lewis, J.D.1
Weigert, A.2
-
85
-
-
0027544247
-
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code
-
Longstaff, T. and Schultz, E. (1993), “Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code”, Computers & Security, Vol. 12 No. 1, pp. 61-77.
-
(1993)
Computers & Security
, vol.12
, Issue.1
, pp. 61-77
-
-
Longstaff, T.1
Schultz, E.2
-
86
-
-
84949591217
-
Social presence, trust, and social commerce purchase intention: an empirical research
-
Lu, B., Fan, W. and Zhou, M. (2016), “Social presence, trust, and social commerce purchase intention: an empirical research”, Computers in Human Behavior, Vol. 56, pp. 225-237.
-
(2016)
Computers in Human Behavior
, vol.56
, pp. 225-237
-
-
Lu, B.1
Fan, W.2
Zhou, M.3
-
88
-
-
85044605179
-
Investigating Emirati citizens’ adoption of e-government services in Abu Dhabi using modified UTAUT model
-
Mansoori, K.A., Sarabdeen, J. and Tchantchane, A.L. (2018), “Investigating Emirati citizens’ adoption of e-government services in Abu Dhabi using modified UTAUT model”, Information Technology & People, Vol. 31 No. 2, pp. 455-481.
-
(2018)
Information Technology & People
, vol.31
, Issue.2
, pp. 455-481
-
-
Mansoori, K.A.1
Sarabdeen, J.2
Tchantchane, A.L.3
-
89
-
-
85026985171
-
A study of awareness about cyberlaws in the Indian society
-
Mehta, S. and Singh, V. (2013), “A study of awareness about cyberlaws in the Indian society”, International Journal of Computing and Business Research, Vol. 4 No. 1, pp. 1-8.
-
(2013)
International Journal of Computing and Business Research
, vol.4
, Issue.1
, pp. 1-8
-
-
Mehta, S.1
Singh, V.2
-
90
-
-
85058837276
-
-
Paypal, CA: :, (accessed, March 17, 2018
-
Michael, B., Steingruebl, A. and Smith, B. (2011), Combating Cybercrime Principles, Policies and Program, Paypal, CA, available at: www.paypal-media.com/assets/pdf/fact_sheet/PayPal_CombatingCybercrime_WP_0411_v4.pdf (accessed March 17, 2018).
-
(2011)
Combating Cybercrime Principles, Policies and Program
-
-
Michael, B.1
Steingruebl, A.2
Smith, B.3
-
91
-
-
84984974772
-
Consumer intentions on social media: a fsQC analysis of motivations
-
Swansea
-
Mikalef, P., Pappas, I.O. and Giannakos, M. (2016), “Consumer intentions on social media: a fsQC analysis of motivations”, Conference on e-Business, e-Services and e-Society, Swansea, pp. 371-386.
-
(2016)
Conference on e-Business, e-Services and e-Society
, pp. 371-386
-
-
Mikalef, P.1
Pappas, I.O.2
Giannakos, M.3
-
92
-
-
2342548557
-
-
Wiley, New York, NY
-
Mitnick, K.D. and Simon, W.L. (2011), The Art of Deception: Controlling the Human Element of Security, Wiley, New York, NY.
-
(2011)
The Art of Deception: Controlling the Human Element of Security
-
-
Mitnick, K.D.1
Simon, W.L.2
-
95
-
-
79957826460
-
Developing policies for cybercrime
-
Moitra, S. (2005), “Developing policies for cybercrime”, European Journal of Crime, Criminal Law and Criminal Justice, Vol. 13 No. 3, pp. 435-464.
-
(2005)
European Journal of Crime, Criminal Law and Criminal Justice
, vol.13
, Issue.3
, pp. 435-464
-
-
Moitra, S.1
-
96
-
-
84890935435
-
State of cyber security and the factors governing its protection in Malaysia
-
Muniandy, L. and Muniandy, B. (2012), “State of cyber security and the factors governing its protection in Malaysia”, International Journal of Applied Science and Technology, Vol. 2 No. 4, pp. 106-113.
-
(2012)
International Journal of Applied Science and Technology
, vol.2
, Issue.4
, pp. 106-113
-
-
Muniandy, L.1
Muniandy, B.2
-
97
-
-
85058852350
-
Cyber crime and security – a study on awareness among young netizens of anand
-
Narahari, A.C. and Shah, V. (2016), “Cyber crime and security – a study on awareness among young netizens of anand”, International Journal of Advance Research and Innovative Ideas in Education, Vol. 2 No. 6, pp. 1164-1172.
-
(2016)
International Journal of Advance Research and Innovative Ideas in Education
, vol.2
, Issue.6
, pp. 1164-1172
-
-
Narahari, A.C.1
Shah, V.2
-
98
-
-
85073085338
-
-
(accessed, March 12, 2018
-
National Cyber Security Policy (2013), “Government of India ministry of electronics & information technology”, available at: http://164.100.94.102/writereaddata/files/downloads/National_cyber_security_policy-2013%281%29.pdf (accessed March 12, 2018).
-
(2013)
Government of India ministry of electronics & information technology
-
-
-
99
-
-
85073091265
-
Cybercrime regulation: the Nigerian situation
-
Adomi, E.E. (Ed.), IGI Global Information Science
-
Obuh, A.O. and Babatope, I.S. (2011), “Cybercrime regulation: the Nigerian situation”, in Adomi, E.E. (Ed.), A Frame Works for ICT Policy: Government, Social and Legal Issues, IGI Global Information Science, pp. 98-112.
-
(2011)
A Frame Works for ICT Policy: Government, Social and Legal Issues
, pp. 98-112
-
-
Obuh, A.O.1
Babatope, I.S.2
-
100
-
-
85073081782
-
How to report cybercrimes in Indian territory
-
Om pal, S., Pandey, T. and Alam, B. (2017), “How to report cybercrimes in Indian territory”, International Journal of Science, Technology and Management, Vol. 6 No. 4, pp. 166-180.
-
(2017)
International Journal of Science, Technology and Management
, vol.6
, Issue.4
, pp. 166-180
-
-
Om pal, S.1
Pandey, T.2
Alam, B.3
-
101
-
-
51449093120
-
Marketing using web 2.0
-
Sprague, R. (Ed.), p., IEEE Computer Society Press, Washington, DC: Hawaii, HI, January
-
Parise, S. and Guinan, P.J. (2008), “Marketing using web 2.0”, in Sprague, R. (Ed.), Proceedings of the 41st Hawaii International Conference on System Sciences, IEEE Computer Society Press, Washington, DC, p. 281, Hawaii, HI, January.
-
(2008)
Proceedings of the 41st Hawaii International Conference on System Sciences
, pp. 281
-
-
Parise, S.1
Guinan, P.J.2
-
102
-
-
77649300597
-
An analysis of the technology acceptance model in understanding university students’ behavioral intention to use e-Learning
-
Park, S. (2009), “An analysis of the technology acceptance model in understanding university students’ behavioral intention to use e-Learning”, Educational Technology & Society, Vol. 12 No. 3, pp. 150-162.
-
(2009)
Educational Technology & Society
, vol.12
, Issue.3
, pp. 150-162
-
-
Park, S.1
-
103
-
-
84960387013
-
Critical study and analysis of cyber law awareness among Netizens
-
(accessed, March 12, 2018
-
Parmar, A. and Patel, K. (2016), “Critical study and analysis of cyber law awareness among Netizens”, Conference: International Conference on ICT for Sustainable Development, Vol. 409, Springer, available at: http://link.springer.com/chapter/10.1007%2F978-981-10-0135-2_32 (accessed March 12, 2018).
-
(2016)
Conference: International Conference on ICT for Sustainable Development, Vol. 409, Springer
-
-
Parmar, A.1
Patel, K.2
-
104
-
-
84901605739
-
-
The Indian Law Institute, New Delhi: :, (accessed, January 4, 2018
-
Parthasarathi, P. (2003), Cyber-Crime, The Indian Law Institute, New Delhi, available at: http://naavi.org/pati/ (accessed January 4, 2018).
-
(2003)
Cyber-Crime
-
-
Parthasarathi, P.1
-
105
-
-
33749347189
-
Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior
-
Pavlou, P.A. and Fygenson, M. (2006), “Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior”, MIS Quarterly, Vol. 30 No. 1, pp. 115-143.
-
(2006)
MIS Quarterly
, vol.30
, Issue.1
, pp. 115-143
-
-
Pavlou, P.A.1
Fygenson, M.2
-
106
-
-
0034818913
-
Trends in cybercrime – an overview of current financial crimes on the internet
-
Philippsohn, S. (2001), “Trends in cybercrime – an overview of current financial crimes on the internet”, Computers & Security, Vol. 20 No. 1, pp. 53-69.
-
(2001)
Computers & Security
, vol.20
, Issue.1
, pp. 53-69
-
-
Philippsohn, S.1
-
107
-
-
0042484572
-
CSI/FBI computer crime and security survey
-
Power, R. (2002), “CSI/FBI computer crime and security survey”, Computer Security Issues & Trends, Vol. 8 No. 1, pp. 1-22.
-
(2002)
Computer Security Issues & Trends
, vol.8
, Issue.1
, pp. 1-22
-
-
Power, R.1
-
109
-
-
85073083058
-
-
(accessed, December 10, 2017
-
Raghav, S.S. (2012), “Cyber security in India’s counter terrorism strategy”, available at: http://ids.nic.in/art_by_offids/Cyber%20security%20in%20india%20by%20Col%20SS%20Raghav.pdf (accessed December 10, 2017).
-
(2012)
Cyber security in India’s counter terrorism strategy
-
-
Raghav, S.S.1
-
110
-
-
84962469601
-
Adoption of online public grievance redressal system in India: toward developing a unified view
-
Rana, N.P., Dwivedi, Y.K., Williams, M.D. and Weerakkody, V. (2016), “Adoption of online public grievance redressal system in India: toward developing a unified view”, Computers in Human Behavior, Vol. 59, pp. 265-282.
-
(2016)
Computers in Human Behavior
, vol.59
, pp. 265-282
-
-
Rana, N.P.1
Dwivedi, Y.K.2
Williams, M.D.3
Weerakkody, V.4
-
111
-
-
3442888100
-
Transnational criminal organizations, cybercrime, and money laundering: a handbook for law enforcement officers
-
Richards, J.R. (Ed.), CRC Press, Boca Raton, FL
-
Richards, J.R. (1999), “Transnational criminal organizations, cybercrime, and money laundering: a handbook for law enforcement officers”, in Richards, J.R. (Ed.), Auditors, and Financial Investigators, CRC Press, Boca Raton, FL, pp. 1-297.
-
(1999)
Auditors, and Financial Investigators
, pp. 1-297
-
-
Richards, J.R.1
-
112
-
-
84894326956
-
Cyber-crimes and their impacts: a review
-
Saini, H., Rao, Y.S. and Panda, T.C. (2012), “Cyber-crimes and their impacts: a review”, International Journal of Engineering Research and Applications, Vol. 2 No. 2, pp. 202-209.
-
(2012)
International Journal of Engineering Research and Applications
, vol.2
, Issue.2
, pp. 202-209
-
-
Saini, H.1
Rao, Y.S.2
Panda, T.C.3
-
113
-
-
34248138319
-
Re-examining perceived ease of use and usefulness: a confirmatory factor analysis
-
Segars, A.H. and Grover, V. (1993), “Re-examining perceived ease of use and usefulness: a confirmatory factor analysis”, MIS Quarterly, Vol. 17 No. 4, pp. 517-525.
-
(1993)
MIS Quarterly
, vol.17
, Issue.4
, pp. 517-525
-
-
Segars, A.H.1
Grover, V.2
-
114
-
-
85073081957
-
-
(accessed, February 14, 2018
-
Shaheen, D. (2012), “Shaheen Dhada and Renu Shrinivas case of Maharastra”, available at: http://archive.indianexpress.com/news/two-girls-arrested-for-facebook-post-questioning-bal-thackery-shutdown-ofmumbai-get-bail/1033177 (accessed February 14, 2018).
-
(2012)
Shaheen Dhada and Renu Shrinivas case of Maharastra
-
-
Shaheen, D.1
-
115
-
-
78649830464
-
E-government adoption model (GAM): differing service maturity levels
-
Shareef, M.A., Kumar, U., Kumar, V. and Dwivedi, Y.K. (2011), “E-government adoption model (GAM): differing service maturity levels”, Government Information Quarterly, Vol. 28 No. 1, pp. 17-35.
-
(2011)
Government Information Quarterly
, vol.28
, Issue.1
, pp. 17-35
-
-
Shareef, M.A.1
Kumar, U.2
Kumar, V.3
Dwivedi, Y.K.4
-
116
-
-
84873376058
-
User experience in social commerce: in friends we trust
-
Shin, D.H. (2013), “User experience in social commerce: in friends we trust”, Behavior & Information Technology, Vol. 32 No. 1, pp. 52-67.
-
(2013)
Behavior & Information Technology
, vol.32
, Issue.1
, pp. 52-67
-
-
Shin, D.H.1
-
117
-
-
85073085601
-
-
Supreme Court of India
-
Shreya Singhal v. Union of India, WP (Criminal) No. 167 of 2012. Supreme Court of India.
-
-
-
-
119
-
-
85058844617
-
Cybercrime – a threat to persons, property, government and societies
-
Singh, H. (2013), “Cybercrime – a threat to persons, property, government and societies”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3 No. 5, pp. 997-1002.
-
(2013)
International Journal of Advanced Research in Computer Science and Software Engineering
, vol.3
, Issue.5
, pp. 997-1002
-
-
Singh, H.1
-
120
-
-
84865484584
-
The influence of user involvement and personal innovativeness on user behavior
-
Sorebo, A.M., Sorebo, O. and Sein, M.K. (2007), “The influence of user involvement and personal innovativeness on user behavior”, International Journal of Industrial and Manufacturing Engineering, Vol. 1 No. 8, pp. 338-343.
-
(2007)
International Journal of Industrial and Manufacturing Engineering
, vol.1
, Issue.8
, pp. 338-343
-
-
Sorebo, A.M.1
Sorebo, O.2
Sein, M.K.3
-
121
-
-
0041065277
-
The internet worm program: an analysis
-
Spafford, E. (1989), “The internet worm program: an analysis”, Computer Communication Review, Vol. 19 No. 1, pp. 17-49.
-
(1989)
Computer Communication Review
, vol.19
, Issue.1
, pp. 17-49
-
-
Spafford, E.1
-
122
-
-
85073089844
-
Cyber-terrorism
-
(accessed, January 23, 2018
-
Sproles, J. and Byars, W. (1998), “Cyber-terrorism”, Computer Ethics at ETSU, available at: http://indiaforensic.com/compcrime.htm (accessed January 23, 2018).
-
(1998)
Computer Ethics at ETSU
-
-
Sproles, J.1
Byars, W.2
-
123
-
-
85015908724
-
-
National University of Study and ResearchLaw, Ranchi University, Ranchi, Jharkhand, p. 7
-
Supriya, K. (2012), “Cyber crime”, National University of Study and Research in Law, Ranchi University, Ranchi, Jharkhand, p. 7.
-
(2012)
Cyber crime
-
-
Supriya, K.1
-
124
-
-
84896523102
-
Energy saving through the Sun: analysis of visual comfort and energy consumption in office space
-
Tagliabue, L.C., Buzzetti, M. and Arosio, B. (2012), “Energy saving through the Sun: analysis of visual comfort and energy consumption in office space”, Energy Procedia, Vol. 30, pp. 693-703.
-
(2012)
Energy Procedia
, vol.30
, pp. 693-703
-
-
Tagliabue, L.C.1
Buzzetti, M.2
Arosio, B.3
-
125
-
-
0004107609
-
Introduction
-
(Eds) (, p., Taylor & Francis Group, New York, NY
-
Thomas, D. and Loader, B.D. (Eds) (2000), “Introduction”, Cybercrime: Law Enforcement, Security and Surveillance in the Information Age, Taylor & Francis Group, New York, NY, p. 2000.
-
(2000)
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
, pp. 2000
-
-
Thomas, D.1
Loader, B.D.2
-
126
-
-
33750923703
-
Cultivating an organizational information security culture
-
Thomson, K.L., Von Solms, R. and Lauw, L. (2006), “Cultivating an organizational information security culture”, Computer Fraud and Security, Vol. 6 No. 10, pp. 7-11.
-
(2006)
Computer Fraud and Security
, vol.6
, Issue.10
, pp. 7-11
-
-
Thomson, K.L.1
Von Solms, R.2
Lauw, L.3
-
127
-
-
0035780469
-
Embedding security practices in contemporary information systems development approaches
-
Tryfonas, T., Kiountouzis, E. and Poulymenakou, A. (2001), “Embedding security practices in contemporary information systems development approaches”, Information Management and Computer Security, Vol. 9 No. 4, pp. 183-197.
-
(2001)
Information Management and Computer Security
, vol.9
, Issue.4
, pp. 183-197
-
-
Tryfonas, T.1
Kiountouzis, E.2
Poulymenakou, A.3
-
128
-
-
77949489154
-
Does the technology acceptance model predict actual use? A systematic literature review
-
Turner, M., Kitchenham, B., Brereton, P., Charters, S. and Budgen, D. (2010), “Does the technology acceptance model predict actual use? A systematic literature review”, Information and Software Technology, Vol. 52 No. 5, pp. 463-479.
-
(2010)
Information and Software Technology
, vol.52
, Issue.5
, pp. 463-479
-
-
Turner, M.1
Kitchenham, B.2
Brereton, P.3
Charters, S.4
Budgen, D.5
-
129
-
-
79959988501
-
Structural equation modeling in information system research using partial least squares
-
Urbach, N. and Ahlemann, F. (2010), “Structural equation modeling in information system research using partial least squares”, Journal of Information Technology Theory and Application, Vol. 11 No. 2, pp. 5-40.
-
(2010)
Journal of Information Technology Theory and Application
, vol.11
, Issue.2
, pp. 5-40
-
-
Urbach, N.1
Ahlemann, F.2
-
130
-
-
84944245590
-
Key challenges for the smart city: turning ambition into reality
-
Kanai, HI
-
Van den Bergh, J. and Viaene, S. (2015), “Key challenges for the smart city: turning ambition into reality”, IEEE 48th Hawaii International Conference on System Science (HICSS), Kanai, HI, pp. 2385-2394.
-
(2015)
IEEE 48th Hawaii International Conference on System Science (HICSS)
, pp. 2385-2394
-
-
Van den Bergh, J.1
Viaene, S.2
-
131
-
-
1542382496
-
User acceptance of information technology: toward a unified view
-
Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003), “User acceptance of information technology: toward a unified view”, MIS Quarterly, Vol. 27 No. 3, pp. 425-478.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
132
-
-
84979561901
-
Open data and its usability: an empirical view from the citizen’s perspective
-
Weerakkody, V., Irani, Z., Kapoor, K., Sivarajah, U. and Dwivedi, Y.K. (2017), “Open data and its usability: an empirical view from the citizen’s perspective”, Information Systems Frontiers, Vol. 19 No. 2, pp. 285-300.
-
(2017)
Information Systems Frontiers
, vol.19
, Issue.2
, pp. 285-300
-
-
Weerakkody, V.1
Irani, Z.2
Kapoor, K.3
Sivarajah, U.4
Dwivedi, Y.K.5
-
133
-
-
62949203110
-
Contemporary trends and issues in IT adoption and diffusion research
-
Williams, M.D., Dwivedi, Y.K., Lal, B. and Schwarz, A. (2009), “Contemporary trends and issues in IT adoption and diffusion research”, Journal of Information Technology, Vol. 24 No. 1, pp. 1-10.
-
(2009)
Journal of Information Technology
, vol.24
, Issue.1
, pp. 1-10
-
-
Williams, M.D.1
Dwivedi, Y.K.2
Lal, B.3
Schwarz, A.4
-
134
-
-
85053771385
-
Purpose and function creep by design: transforming the face of surveillance through the IoT
-
(accessed, January 11, 2018
-
Wisman, T.H.A. (2013), “Purpose and function creep by design: transforming the face of surveillance through the IoT”, European Journal of Technology, Vol. 4 No. 2, available at: http://ejlt.org/article/view/192/379 (accessed January 11, 2018).
-
(2013)
European Journal of Technology
, vol.4
, Issue.2
-
-
Wisman, T.H.A.1
-
135
-
-
0035609163
-
Shopping online for freedom, control, and fun
-
Wolfinbarger, M. and Gilly, M.C. (2001), “Shopping online for freedom, control, and fun”, California Management Review, Vol. 43 No. 2, pp. 34-55.
-
(2001)
California Management Review
, vol.43
, Issue.2
, pp. 34-55
-
-
Wolfinbarger, M.1
Gilly, M.C.2
-
136
-
-
84888018405
-
Social commerce: a contingency framework for assessing marketing potential
-
Yadav, M.S., De Valck, K., Hennig-Thurau, T., Hoffman, D.L. and Spann, M. (2013), “Social commerce: a contingency framework for assessing marketing potential”, Journal of Interactive Marketing, Vol. 27 No. 4, pp. 311-323.
-
(2013)
Journal of Interactive Marketing
, vol.27
, Issue.4
, pp. 311-323
-
-
Yadav, M.S.1
De Valck, K.2
Hennig-Thurau, T.3
Hoffman, D.L.4
Spann, M.5
-
137
-
-
80054738698
-
Acceptance of mobile learning: a re-specification and validation of information system success
-
Yi, C., Liao, P., Huang, C. and Hwang, I. (2009), “Acceptance of mobile learning: a re-specification and validation of information system success”, International Journal of Educational and Pedagogical Sciences, Vol. 3 No. 5, pp. 475-479.
-
(2009)
International Journal of Educational and Pedagogical Sciences
, vol.3
, Issue.5
, pp. 475-479
-
-
Yi, C.1
Liao, P.2
Huang, C.3
Hwang, I.4
-
138
-
-
84981762950
-
Consumer behavior in social commerce: a literature review
-
Zhang, K.Z. and Benyoucef, M. (2016), “Consumer behavior in social commerce: a literature review”, Decision Support Systems, Vol. 86, pp. 95-108.
-
(2016)
Decision Support Systems
, vol.86
, pp. 95-108
-
-
Zhang, K.Z.1
Benyoucef, M.2
-
139
-
-
84869030536
-
Key issues and challenges in e-government development: an integrative case study of the number one e City in the Arab world
-
Zhao, F., Scavarda, A.J. and Waxin, M.F. (2012), “Key issues and challenges in e-government development: an integrative case study of the number one e City in the Arab world”, Information Technology & People, Vol. 25 No. 4, pp. 395-422.
-
(2012)
Information Technology & People
, vol.25
, Issue.4
, pp. 395-422
-
-
Zhao, F.1
Scavarda, A.J.2
Waxin, M.F.3
-
140
-
-
84889090757
-
Capturing the essence of word-of-mouth for social commerce: assessing the quality of online e-Commerce reviews by a semi-supervised approach
-
Zheng, X., Zhu, S. and Lin, Z. (2013), “Capturing the essence of word-of-mouth for social commerce: assessing the quality of online e-Commerce reviews by a semi-supervised approach”, Decision Support Systems, Vol. 56, pp. 211-222.
-
(2013)
Decision Support Systems
, vol.56
, pp. 211-222
-
-
Zheng, X.1
Zhu, S.2
Lin, Z.3
-
141
-
-
84945571208
-
Acceptance and use predictors of open data technologies: drawing upon the unified theory of acceptance and use of technology
-
Zuiderwijk, A., Janssen, M. and Dwivedi, Y.K. (2015), “Acceptance and use predictors of open data technologies: drawing upon the unified theory of acceptance and use of technology”, Government Information Quarterly, Vol. 32 No. 4, pp. 429-440.
-
(2015)
Government Information Quarterly
, vol.32
, Issue.4
, pp. 429-440
-
-
Zuiderwijk, A.1
Janssen, M.2
Dwivedi, Y.K.3
-
142
-
-
0037259641
-
Trouble in paradise: crime and collapsed states in the age of globalization
-
Gros, J. (2003), “Trouble in paradise: crime and collapsed states in the age of globalization”, British Journal of Criminology, Vol. 43 No. 1, pp. 63-80.
-
(2003)
British Journal of Criminology
, vol.43
, Issue.1
, pp. 63-80
-
-
Gros, J.1
-
143
-
-
85073089845
-
-
1st ed., Wiley, New Delhi
-
Sunit, B. and Nina, G. (2011), Cyber Security: Understanding Cybercrimes, Computer Forensics and Legal Perspectives, 1st ed., Wiley, New Delhi.
-
(2011)
Cyber Security: Understanding Cybercrimes, Computer Forensics and Legal Perspectives
-
-
Sunit, B.1
Nina, G.2
-
144
-
-
84904155138
-
An integrated success model for evaluating information system in public sectors
-
Zaied, A.N.H. (2012), “An integrated success model for evaluating information system in public sectors”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 3 No. 6, pp. 814-825.
-
(2012)
Journal of Emerging Trends in Computing and Information Sciences
, vol.3
, Issue.6
, pp. 814-825
-
-
Zaied, A.N.H.1
|