메뉴 건너뛰기




Volumn 32, Issue 5, 2019, Pages 1153-1183

Prevention of cybercrimes in smart cities of India: from a citizen’s perspective

Author keywords

Cyber security; Cyber infrastructure; Digital services; Smart city

Indexed keywords


EID: 85058838434     PISSN: 09593845     EISSN: None     Source Type: Journal    
DOI: 10.1108/ITP-05-2018-0251     Document Type: Article
Times cited : (54)

References (144)
  • 2
    • 44049085831 scopus 로고    scopus 로고
    • Information technology and its implications for internal auditing
    • Abu-Musa, A.A. (2008), “Information technology and its implications for internal auditing”, Managerial Auditing Journal, Vol. 23 No. 5, pp. 436-466.
    • (2008) Managerial Auditing Journal , vol.23 , Issue.5 , pp. 436-466
    • Abu-Musa, A.A.1
  • 3
    • 32544449814 scopus 로고    scopus 로고
    • Controlling cyberspace: applying the computer fraud and abuse act to the internet
    • Adams, J.M. (1996), “Controlling cyberspace: applying the computer fraud and abuse act to the internet”, Santa Clara Computer and High-Technology Law Journal, Vol. 12 No. 2, pp. 403-434.
    • (1996) Santa Clara Computer and High-Technology Law Journal , vol.12 , Issue.2 , pp. 403-434
    • Adams, J.M.1
  • 5
    • 57549087433 scopus 로고    scopus 로고
    • Using a modified technology acceptance model in hospitals
    • Aggelidis, V. and Chatzoglou, P. (2009), “Using a modified technology acceptance model in hospitals”, International Journal of Medical Informatics, Vol. 7 No. 8, pp. 115-126.
    • (2009) International Journal of Medical Informatics , vol.7 , Issue.8 , pp. 115-126
    • Aggelidis, V.1    Chatzoglou, P.2
  • 6
    • 85020013723 scopus 로고    scopus 로고
    • Social media in marketing: a review and analysis of the existing literature
    • Alalwan, A.A., Rana, N.P., Dwivedi, Y.K. and Algharabat, R.S. (2017), “Social media in marketing: a review and analysis of the existing literature”, Telematics and Informatics, Vol. 34 No. 7, pp. 1177-1190.
    • (2017) Telematics and Informatics , vol.34 , Issue.7 , pp. 1177-1190
    • Alalwan, A.A.1    Rana, N.P.2    Dwivedi, Y.K.3    Algharabat, R.S.4
  • 8
    • 84861823868 scopus 로고    scopus 로고
    • Predictors for e-government adoption in Jordan: deployment of an empirical evaluation based on a citizen‐centric approach
    • Alomari, M., Woods, P. and Sandhu, K. (2012), “Predictors for e-government adoption in Jordan: deployment of an empirical evaluation based on a citizen‐centric approach”, Information Technology & People, Vol. 25 No. 2, pp. 207-234.
    • (2012) Information Technology & People , vol.25 , Issue.2 , pp. 207-234
    • Alomari, M.1    Woods, P.2    Sandhu, K.3
  • 11
    • 84927509517 scopus 로고    scopus 로고
    • A holistic cyber security implementation framework
    • Atoum, I., Otoom, A. and Ali, A.A. (2014), “A holistic cyber security implementation framework”, Information Technology & People, Vol. 22 No. 3, pp. 251-264.
    • (2014) Information Technology & People , vol.22 , Issue.3 , pp. 251-264
    • Atoum, I.1    Otoom, A.2    Ali, A.A.3
  • 12
    • 85073082290 scopus 로고    scopus 로고
    • Awareness regarding cyber victimization among students of University of Sindh, Jamsharo
    • Avais, M.A., Wassan, A.A., Narejo, H. and Khan, J.A. (2014), “Awareness regarding cyber victimization among students of University of Sindh, Jamsharo”, International Journal of Asian Social Science, Vol. 4 No. 5, pp. 632-641.
    • (2014) International Journal of Asian Social Science , vol.4 , Issue.5 , pp. 632-641
    • Avais, M.A.1    Wassan, A.A.2    Narejo, H.3    Khan, J.A.4
  • 13
    • 4544379638 scopus 로고    scopus 로고
    • Development of e-government: a STOPE view
    • Bakry, S.H. (2004), “Development of e-government: a STOPE view”, International Journal of Network Management, Vol. 14 No. 5, pp. 339-350.
    • (2004) International Journal of Network Management , vol.14 , Issue.5 , pp. 339-350
    • Bakry, S.H.1
  • 14
    • 0031539651 scopus 로고    scopus 로고
    • The effects of organizational differences and trust on the effectiveness of selling partner relationships
    • Barclay, D.W. and Smith, J.B. (1997), “The effects of organizational differences and trust on the effectiveness of selling partner relationships”, Journal of Marketing, Vol. 61 No. 1, pp. 3-21.
    • (1997) Journal of Marketing , vol.61 , Issue.1 , pp. 3-21
    • Barclay, D.W.1    Smith, J.B.2
  • 15
    • 84927674457 scopus 로고    scopus 로고
    • Cyber security: understanding cyber crimes, computer forensics and legal perspectives
    • Wiley Publication
    • Belapure, S. and Godble, N. (2011), “Cyber security: understanding cyber crimes, computer forensics and legal perspectives”, Cyber Security, Wiley Publication.
    • (2011) Cyber Security
    • Belapure, S.1    Godble, N.2
  • 16
    • 80052086324 scopus 로고    scopus 로고
    • Applying maximum likelihood and pls on different sample sizes: studies on seroquel model and employee behavior model
    • Esposito Vinzi, V., Chin, W.W., Henseler, J. and Wang, H., and,(Eds), Springer, Heidelberg
    • Borroso, C., Carrion, G.C. and Roldan, J.L. (2010), “Applying maximum likelihood and pls on different sample sizes: studies on seroquel model and employee behavior model”, in Esposito Vinzi, V., Chin, W.W., Henseler, J. and Wang, H. (Eds), Handbook of Partial Least Squares: Concepts, Methods and Applications, Springer, Heidelberg, pp. 427-447.
    • (2010) Handbook of Partial Least Squares: Concepts, Methods and Applications , pp. 427-447
    • Borroso, C.1    Carrion, G.C.2    Roldan, J.L.3
  • 17
    • 85073086441 scopus 로고    scopus 로고
    • (accessed, January 26, 2018
    • Bowen, M. (2009), “Computer crime”, available at: www.guru.net/ (accessed January 26, 2018).
    • (2009) Computer crime
    • Bowen, M.1
  • 19
    • 84961648876 scopus 로고    scopus 로고
    • Buying or browsing? An exploration of shopping orientations and online purchase intention
    • Brown, M., Pope, N. and Voges, K. (2003), “Buying or browsing? An exploration of shopping orientations and online purchase intention”, European Journal of Marketing, Vol. 37 Nos 11/12, pp. 1666-1684.
    • (2003) European Journal of Marketing , vol.37 , Issue.11-12 , pp. 1666-1684
    • Brown, M.1    Pope, N.2    Voges, K.3
  • 20
    • 4344607488 scopus 로고    scopus 로고
    • Assessing law enforcement preparedness to address internet fraud
    • Burns, R., Whitworth, K. and Thompson, C. (2004), “Assessing law enforcement preparedness to address internet fraud”, Journal of Criminal Justice, Vol. 32 No. 5, pp. 477-493.
    • (2004) Journal of Criminal Justice , vol.32 , Issue.5 , pp. 477-493
    • Burns, R.1    Whitworth, K.2    Thompson, C.3
  • 22
    • 84940783105 scopus 로고    scopus 로고
    • Three keys of the city: resources, agglomeration economies, and sorting
    • Carlino, G.A. (2011), “Three keys of the city: resources, agglomeration economies, and sorting”, Business Review Quarterly, Vol. 3 No. 3, pp. 1-13.
    • (2011) Business Review Quarterly , vol.3 , Issue.3 , pp. 1-13
    • Carlino, G.A.1
  • 23
    • 85018708331 scopus 로고    scopus 로고
    • CHIS: a big data infrastructure to manage digital cultural items
    • September
    • Castiglione, A., Colace, F., Moscato, V. and Palmieri, F. (2018), “CHIS: a big data infrastructure to manage digital cultural items”, Future Generation Computer Systems, Vol. 86, September, pp. 1134-1145.
    • (2018) Future Generation Computer Systems , vol.86 , pp. 1134-1145
    • Castiglione, A.1    Colace, F.2    Moscato, V.3    Palmieri, F.4
  • 24
    • 0033336136 scopus 로고    scopus 로고
    • Distributed data mining in credit card fraud detection
    • Chan, P.K., Fan, W., Prodromidis, A.L. and Stolfo, S.J. (1999), “Distributed data mining in credit card fraud detection”, IEEE Intelligent System, Vol. 14 No. 6, pp. 67-74.
    • (1999) IEEE Intelligent System , vol.14 , Issue.6 , pp. 67-74
    • Chan, P.K.1    Fan, W.2    Prodromidis, A.L.3    Stolfo, S.J.4
  • 26
    • 85036520392 scopus 로고    scopus 로고
    • Effects of successful adoption of information technology enabled services in proposed smart cities of India: from user experience perspective
    • Chatterjee, S. and Kar, A.K. (2017), “Effects of successful adoption of information technology enabled services in proposed smart cities of India: from user experience perspective”, Journal of Science and Technology Policy Management, Vol. 9 No. 2, pp. 189-209.
    • (2017) Journal of Science and Technology Policy Management , vol.9 , Issue.2 , pp. 189-209
    • Chatterjee, S.1    Kar, A.K.2
  • 27
    • 85042439909 scopus 로고    scopus 로고
    • Alignment of IT authority and citizens of proposed smart cities in India: system security and privacy perspective
    • Chatterjee, S., Kar, A.K. and Gupta, M.P. (2017a), “Alignment of IT authority and citizens of proposed smart cities in India: system security and privacy perspective”, Global Journal of Flexible Systems Management, Vol. 19 No. 1, pp. 95-107.
    • (2017) Global Journal of Flexible Systems Management , vol.19 , Issue.1 , pp. 95-107
    • Chatterjee, S.1    Kar, A.K.2    Gupta, M.P.3
  • 28
    • 85013335962 scopus 로고    scopus 로고
    • Critical success factors to establish 5G network in smart cities: inputs for security and privacy
    • Chatterjee, S., Kar, A.K. and Gupta, M.P. (2017b), “Critical success factors to establish 5G network in smart cities: inputs for security and privacy”, Journal of Global Information Management, Vol. 25 No. 2, pp. 15-37.
    • (2017) Journal of Global Information Management , vol.25 , Issue.2 , pp. 15-37
    • Chatterjee, S.1    Kar, A.K.2    Gupta, M.P.3
  • 29
    • 85048756348 scopus 로고    scopus 로고
    • Success of IoT in Smart Cities of India: an empirical analysis
    • Chatterjee, S., Kar, A.K. and Gupta, M.P. (2018), “Success of IoT in Smart Cities of India: an empirical analysis”, Government Information Quarterly, Vol. 35 No. 3, pp. 349-361, available at: https://doi.org/10.1016/j.giq.2018.05.002
    • (2018) Government Information Quarterly , vol.35 , Issue.3 , pp. 349-361
    • Chatterjee, S.1    Kar, A.K.2    Gupta, M.P.3
  • 32
    • 84862798172 scopus 로고    scopus 로고
    • What drives consumers to spread electronic word of mouth in online consumer-opinion platforms
    • Cheung, C.M. and Lee, M.K. (2012), “What drives consumers to spread electronic word of mouth in online consumer-opinion platforms”, Decision Support Systems, Vol. 53 No. 1, pp. 218-225.
    • (2012) Decision Support Systems , vol.53 , Issue.1 , pp. 218-225
    • Cheung, C.M.1    Lee, M.K.2
  • 34
    • 4243109031 scopus 로고
    • On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution
    • Chin, W.W. and Todd, P.A. (1995), “On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution”, MIS Quarterly, Vol. 19 No. 2, pp. 237-246.
    • (1995) MIS Quarterly , vol.19 , Issue.2 , pp. 237-246
    • Chin, W.W.1    Todd, P.A.2
  • 35
    • 85032461057 scopus 로고    scopus 로고
    • The relationship between motivation and information sharing about products and services on Facebook
    • Cho, I., Park, H. and Kim, J.K. (2014), “The relationship between motivation and information sharing about products and services on Facebook”, Behaviour & Information Technology, Vol. 30 No. 1, pp. 1-11.
    • (2014) Behaviour & Information Technology , vol.30 , Issue.1 , pp. 1-11
    • Cho, I.1    Park, H.2    Kim, J.K.3
  • 36
    • 80051656644 scopus 로고    scopus 로고
    • Determinants of consumer engagement in electronic word-of-mouth (e WOM) in social networking sites
    • Chu, S.C. and Kim, Y. (2011), “Determinants of consumer engagement in electronic word-of-mouth (e WOM) in social networking sites”, International Journal of Advertising, Vol. 30 No. 1, pp. 47-75.
    • (2011) International Journal of Advertising , vol.30 , Issue.1 , pp. 47-75
    • Chu, S.C.1    Kim, Y.2
  • 37
    • 78650472272 scopus 로고    scopus 로고
    • An exploration of technology diffusion
    • (accessed, March 16, 2018
    • Comin, D.A. and Hobijn, B. (2010), “An exploration of technology diffusion”, American Economic Review, Vol. 100 No. 5, pp. 2031-2061, available at: www.dartmouth.edu/~dcomin/files/exploration_technology.pdf (accessed March 16, 2018).
    • (2010) American Economic Review , vol.100 , Issue.5 , pp. 2031-2061
    • Comin, D.A.1    Hobijn, B.2
  • 38
    • 63849287320 scopus 로고    scopus 로고
    • Veering toward digital disorder: computer-related crime and law enforcement preparedness
    • Correia, M. and Bowling, C. (1999), “Veering toward digital disorder: computer-related crime and law enforcement preparedness”, Police Quarterly, Vol. 2 No. 2, pp. 225-244.
    • (1999) Police Quarterly , vol.2 , Issue.2 , pp. 225-244
    • Correia, M.1    Bowling, C.2
  • 39
    • 84936823933 scopus 로고
    • User acceptance of computer technology: a comparison of two theoretical models
    • Davis, F., Bagozzi, R. and Warshaw, P. (1989), “User acceptance of computer technology: a comparison of two theoretical models”, Management Science, Vol. 35 No. 8, pp. 982-1003.
    • (1989) Management Science , vol.35 , Issue.8 , pp. 982-1003
    • Davis, F.1    Bagozzi, R.2    Warshaw, P.3
  • 40
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis, F.D. (1989), “Perceived usefulness, perceived ease of use, and user acceptance of information technology”, MIS Quarterly, Vol. 13 No. 3, pp. 319-340.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.D.1
  • 41
    • 84861820007 scopus 로고    scopus 로고
    • Examining perceptions of local law enforcement in the fight against crimes with a cyber component
    • Davis, J.T. (2012), “Examining perceptions of local law enforcement in the fight against crimes with a cyber component”, Policing: An International Journal of Police Strategies & Management, Vol. 35 No. 2, pp. 272-284.
    • (2012) Policing: An International Journal of Police Strategies & Management , vol.35 , Issue.2 , pp. 272-284
    • Davis, J.T.1
  • 42
    • 0036738975 scopus 로고    scopus 로고
    • Antecedents of B2C channel satisfaction and preference: validating e-commerce metrics
    • Devaraj, S., Fan, M. and Kohli, R. (2002), “Antecedents of B2C channel satisfaction and preference: validating e-commerce metrics”, Information Systems Research, Vol. 13 No. 3, pp. 316-333.
    • (2002) Information Systems Research , vol.13 , Issue.3 , pp. 316-333
    • Devaraj, S.1    Fan, M.2    Kohli, R.3
  • 43
    • 0042367634 scopus 로고    scopus 로고
    • Mining e-mail content for author identification forensics
    • De Vel, O., Anderson, A., Corney, M. and Mohay, G. (2001), “Mining e-mail content for author identification forensics”, SIGMOD Record, Vol. 30 No. 4, pp. 55-64.
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 55-64
    • De Vel, O.1    Anderson, A.2    Corney, M.3    Mohay, G.4
  • 44
    • 85020296213 scopus 로고    scopus 로고
    • Re-examining the unified theory of acceptance and use of technology (UTAUT): towards a revised theoretical model
    • Dwivedi, Y.K., Rana, N.P., Jeyaraj, A., Clement, M. and Williams, M.D. (2017), “Re-examining the unified theory of acceptance and use of technology (UTAUT): towards a revised theoretical model”, Information Systems Frontiers, pp. 1-16, available at: https://doi.org/10.1007/s10796-017-9774-y
    • (2017) Information Systems Frontiers , pp. 1-16
    • Dwivedi, Y.K.1    Rana, N.P.2    Jeyaraj, A.3    Clement, M.4    Williams, M.D.5
  • 46
    • 78751493611 scopus 로고    scopus 로고
    • Branding in the digital age: you’re spending your money in all the wrong places
    • Edelman, D.C. (2010), “Branding in the digital age: you’re spending your money in all the wrong places”, Harvard Business Review, Vol. 88, pp. 63-69.
    • (2010) Harvard Business Review , vol.88 , pp. 63-69
    • Edelman, D.C.1
  • 47
    • 37249053884 scopus 로고    scopus 로고
    • Social network sites: definition, history, and scholarship
    • Ellison, N.B. (2007), “Social network sites: definition, history, and scholarship”, Journal of Computer-Mediated Communication, Vol. 13 No. 1, pp. 210-230.
    • (2007) Journal of Computer-Mediated Communication , vol.13 , Issue.1 , pp. 210-230
    • Ellison, N.B.1
  • 50
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell, C. and Larcker, D.F. (1981), “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research, Vol. 18 No. 1, pp. 39-50.
    • (1981) Journal of Marketing Research , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 51
  • 52
  • 53
    • 85026856898 scopus 로고    scopus 로고
    • A general morphological analysis: delineating a cyber-security culture
    • Gcaza, N., Solms, R., Grobler, M.M. and Vuuren, J.J. (2017), “A general morphological analysis: delineating a cyber-security culture”, Information Technology & People, Vol. 25 No. 3, pp. 259-278.
    • (2017) Information Technology & People , vol.25 , Issue.3 , pp. 259-278
    • Gcaza, N.1    Solms, R.2    Grobler, M.M.3    Vuuren, J.J.4
  • 54
    • 0034413987 scopus 로고    scopus 로고
    • E-commerce: the role of familiarity and trust
    • Gefen, D. (2000), “E-commerce: the role of familiarity and trust”, The International Journal of Management Science, Vol. 28 No. 6, pp. 725-737.
    • (2000) The International Journal of Management Science , vol.28 , Issue.6 , pp. 725-737
    • Gefen, D.1
  • 55
    • 79960820734 scopus 로고    scopus 로고
    • Law enforcement’s ability to deal with digital crime and the implications for business
    • Gogolin, G. and Jones, J. (2010), “Law enforcement’s ability to deal with digital crime and the implications for business”, Information Security Journal: A Global Perspective, Vol. 19 No. 3, pp. 109-117.
    • (2010) Information Security Journal: A Global Perspective , vol.19 , Issue.3 , pp. 109-117
    • Gogolin, G.1    Jones, J.2
  • 58
    • 84912544838 scopus 로고    scopus 로고
    • Understanding the energy consumption and occupancy of a multipurpose academic building
    • Gul, M.S. and Patidar, S. (2015), “Understanding the energy consumption and occupancy of a multipurpose academic building”, Energy and Building, Vol. 87, pp. 155-165.
    • (2015) Energy and Building , vol.87 , pp. 155-165
    • Gul, M.S.1    Patidar, S.2
  • 59
    • 85027466477 scopus 로고    scopus 로고
    • ANN based scheme to predict number of zombies involved in a DDoS attack
    • Gupta, B.B., Joshi, R.C. and Misra, M. (2012), “ANN based scheme to predict number of zombies involved in a DDoS attack”, International Journal of Network Security, Vol. 14 No. 1, pp. 36-45.
    • (2012) International Journal of Network Security , vol.14 , Issue.1 , pp. 36-45
    • Gupta, B.B.1    Joshi, R.C.2    Misra, M.3
  • 60
    • 84927746059 scopus 로고    scopus 로고
    • The pattern of Urban land use changes, a case study of Indian Cities
    • Gupta, R. (2014), “The pattern of Urban land use changes, a case study of Indian Cities”, Environment and Urbanization Asia, Vol. 5 No. 1, pp. 83-104.
    • (2014) Environment and Urbanization Asia , vol.5 , Issue.1 , pp. 83-104
    • Gupta, R.1
  • 63
    • 0041877530 scopus 로고    scopus 로고
    • Perceived usefulness, ease of use and electronic supermarket use
    • Henderson, R. and Divett, M. (2003), “Perceived usefulness, ease of use and electronic supermarket use”, International Journal of Human-Computer Studies, Vol. 59 No. 3, pp. 383-395.
    • (2003) International Journal of Human-Computer Studies , vol.59 , Issue.3 , pp. 383-395
    • Henderson, R.1    Divett, M.2
  • 64
    • 8844253975 scopus 로고    scopus 로고
    • Perceptions of local and state law enforcement concerning the role of computer crime investigative teams
    • Hinduja, S. (2004), “Perceptions of local and state law enforcement concerning the role of computer crime investigative teams”, Policing: An International Journal of Police Strategies & Management, Vol. 27 No. 3, pp. 341-357.
    • (2004) Policing: An International Journal of Police Strategies & Management , vol.27 , Issue.3 , pp. 341-357
    • Hinduja, S.1
  • 65
    • 22944472837 scopus 로고
    • A review of scale development practices in the study of organizations
    • Hinkin, T.R. (1995), “A review of scale development practices in the study of organizations”, Journal of Management, Vol. 21 No. 5, pp. 967-988.
    • (1995) Journal of Management , vol.21 , Issue.5 , pp. 967-988
    • Hinkin, T.R.1
  • 66
    • 49249132246 scopus 로고    scopus 로고
    • Defining, assessing, and promoting clearing success: an information systems perspective
    • Holsapple, C.W. and Lee-Post, A. (2006), “Defining, assessing, and promoting clearing success: an information systems perspective”, Journal of Innovative Education, Vol. 4 No. 1, pp. 67-85.
    • (2006) Journal of Innovative Education , vol.4 , Issue.1 , pp. 67-85
    • Holsapple, C.W.1    Lee-Post, A.2
  • 68
    • 67650706330 scopus 로고    scopus 로고
    • Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives
    • Hu, L.-T. and Bentler, P.M. (1999), “Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives”, Structural Equation Modeling, Vol. 6 No. 1, pp. 1-55.
    • (1999) Structural Equation Modeling , vol.6 , Issue.1 , pp. 1-55
    • Hu, L.-T.1    Bentler, P.M.2
  • 70
    • 0023960940 scopus 로고
    • Detecting plagiarism in student PASCAL programs
    • Jankowitz, H.T. (1988), “Detecting plagiarism in student PASCAL programs”, Computer Journal, Vol. 31 No. 1, pp. 1-8.
    • (1988) Computer Journal , vol.31 , Issue.1 , pp. 1-8
    • Jankowitz, H.T.1
  • 71
    • 84882967995 scopus 로고    scopus 로고
    • Cyber crime in Singapore: an analysis of regulation based on Lessig’s four modalities of constraint
    • Jiow, H.J. (2013), “Cyber crime in Singapore: an analysis of regulation based on Lessig’s four modalities of constraint”, International Journal of Cyber Criminology, Vol. 7 No. 1, pp. 18-27.
    • (2013) International Journal of Cyber Criminology , vol.7 , Issue.1 , pp. 18-27
    • Jiow, H.J.1
  • 72
    • 85073086496 scopus 로고    scopus 로고
    • Full guide on cyber crimes in India
    • India Forensic Consultancy Services: (accessed, January 22, 2018
    • Joshi, S.M. (2016), “Full guide on cyber crimes in India”, Journal of Frauds, India Forensic Consultancy Services, available at: http://indiaforensic.com/ (accessed January 22, 2018).
    • (2016) Journal of Frauds
    • Joshi, S.M.1
  • 73
    • 71149088987 scopus 로고    scopus 로고
    • Users of the world, unite! The challenges and opportunities of social media
    • Kaplan, A.M. and Haenlein, M. (2010), “Users of the world, unite! The challenges and opportunities of social media”, Business Horizons, Vol. 53 No. 1, pp. 59-68.
    • (2010) Business Horizons , vol.53 , Issue.1 , pp. 59-68
    • Kaplan, A.M.1    Haenlein, M.2
  • 75
    • 84993043338 scopus 로고    scopus 로고
    • Preserve, protect and defend
    • Kelly, B.J. (1999), “Preserve, protect and defend”, Journal of Business Strategy, Vol. 20 No. 5, pp. 22-26.
    • (1999) Journal of Business Strategy , vol.20 , Issue.5 , pp. 22-26
    • Kelly, B.J.1
  • 76
    • 84928961676 scopus 로고    scopus 로고
    • World Health Organization Regional Office for Europe, Copenhagen: :, (accessed, December 16, 2017
    • Kickbusch, I. and Gleicher, D. (2014), Smart Governance for Health and Well-Being: The Evidence, World Health Organization Regional Office for Europe, Copenhagen, pp. 106-127, available at: www.euro.who.int/data/assets/pdf_file/0005/257513/Smart-governance-for-health-and-well-being-the-evidence.pdf (accessed December 16, 2017).
    • (2014) Smart Governance for Health and Well-Being: The Evidence , pp. 106-127
    • Kickbusch, I.1    Gleicher, D.2
  • 77
    • 79953149276 scopus 로고    scopus 로고
    • Hedonic tendencies and the online consumer: an investigation of the online shopping process
    • Kim, S. and Eastin, M.S. (2011), “Hedonic tendencies and the online consumer: an investigation of the online shopping process”, Journal of Internet Commerce, Vol. 10 No. 1, pp. 68-90.
    • (2011) Journal of Internet Commerce , vol.10 , Issue.1 , pp. 68-90
    • Kim, S.1    Eastin, M.S.2
  • 78
    • 84871365586 scopus 로고    scopus 로고
    • Effects of various characteristics of social commerce (s-Commerce) on consumers’ trust and trust performance
    • Kim, S. and Park, H. (2013), “Effects of various characteristics of social commerce (s-Commerce) on consumers’ trust and trust performance”, International Journal of Information Management, Vol. 33 No. 2, pp. 318-332.
    • (2013) International Journal of Information Management , vol.33 , Issue.2 , pp. 318-332
    • Kim, S.1    Park, H.2
  • 79
    • 27644594594 scopus 로고    scopus 로고
    • The role of trust in the modern administrative state: an integrated model
    • Kim, S.E. (2005), “The role of trust in the modern administrative state: an integrated model”, Administration and Society, Vol. 37 No. 5, pp. 611-635.
    • (2005) Administration and Society , vol.37 , Issue.5 , pp. 611-635
    • Kim, S.E.1
  • 81
    • 84905741460 scopus 로고    scopus 로고
    • What we know and don’t know about online word-of-mouth: a review and synthesis of the literature
    • King, R.A., Racherla, P. and Bush, V.D. (2014), “What we know and don’t know about online word-of-mouth: a review and synthesis of the literature”, Journal of Interactive Marketing, Vol. 28 No. 3, pp. 167-183.
    • (2014) Journal of Interactive Marketing , vol.28 , Issue.3 , pp. 167-183
    • King, R.A.1    Racherla, P.2    Bush, V.D.3
  • 82
    • 84864514397 scopus 로고    scopus 로고
    • Lateral collinearity and misleading results in variance-based SEM: an illustration and recommendations
    • Kock, N. and Lynn, G. (2012), “Lateral collinearity and misleading results in variance-based SEM: an illustration and recommendations”, Journal of the Association for Information Systems, Vol. 13 No. 7, pp. 546-580.
    • (2012) Journal of the Association for Information Systems , vol.13 , Issue.7 , pp. 546-580
    • Kock, N.1    Lynn, G.2
  • 83
    • 2642578546 scopus 로고    scopus 로고
    • Technologies, security and privacy in the post-9/11 European information society
    • Levi, M. and Wall, D. (2004), “Technologies, security and privacy in the post-9/11 European information society”, Journal of Law and Society, Vol. 31 No. 2, pp. 194-230.
    • (2004) Journal of Law and Society , vol.31 , Issue.2 , pp. 194-230
    • Levi, M.1    Wall, D.2
  • 84
    • 84963063075 scopus 로고
    • Trust as a social reality
    • Lewis, J.D. and Weigert, A. (1985), “Trust as a social reality”, Social Forces, Vol. 63 No. 4, pp. 967-985.
    • (1985) Social Forces , vol.63 , Issue.4 , pp. 967-985
    • Lewis, J.D.1    Weigert, A.2
  • 85
    • 0027544247 scopus 로고
    • Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code
    • Longstaff, T. and Schultz, E. (1993), “Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code”, Computers & Security, Vol. 12 No. 1, pp. 61-77.
    • (1993) Computers & Security , vol.12 , Issue.1 , pp. 61-77
    • Longstaff, T.1    Schultz, E.2
  • 86
    • 84949591217 scopus 로고    scopus 로고
    • Social presence, trust, and social commerce purchase intention: an empirical research
    • Lu, B., Fan, W. and Zhou, M. (2016), “Social presence, trust, and social commerce purchase intention: an empirical research”, Computers in Human Behavior, Vol. 56, pp. 225-237.
    • (2016) Computers in Human Behavior , vol.56 , pp. 225-237
    • Lu, B.1    Fan, W.2    Zhou, M.3
  • 88
    • 85044605179 scopus 로고    scopus 로고
    • Investigating Emirati citizens’ adoption of e-government services in Abu Dhabi using modified UTAUT model
    • Mansoori, K.A., Sarabdeen, J. and Tchantchane, A.L. (2018), “Investigating Emirati citizens’ adoption of e-government services in Abu Dhabi using modified UTAUT model”, Information Technology & People, Vol. 31 No. 2, pp. 455-481.
    • (2018) Information Technology & People , vol.31 , Issue.2 , pp. 455-481
    • Mansoori, K.A.1    Sarabdeen, J.2    Tchantchane, A.L.3
  • 96
    • 84890935435 scopus 로고    scopus 로고
    • State of cyber security and the factors governing its protection in Malaysia
    • Muniandy, L. and Muniandy, B. (2012), “State of cyber security and the factors governing its protection in Malaysia”, International Journal of Applied Science and Technology, Vol. 2 No. 4, pp. 106-113.
    • (2012) International Journal of Applied Science and Technology , vol.2 , Issue.4 , pp. 106-113
    • Muniandy, L.1    Muniandy, B.2
  • 98
    • 85073085338 scopus 로고    scopus 로고
    • (accessed, March 12, 2018
    • National Cyber Security Policy (2013), “Government of India ministry of electronics & information technology”, available at: http://164.100.94.102/writereaddata/files/downloads/National_cyber_security_policy-2013%281%29.pdf (accessed March 12, 2018).
    • (2013) Government of India ministry of electronics & information technology
  • 102
    • 77649300597 scopus 로고    scopus 로고
    • An analysis of the technology acceptance model in understanding university students’ behavioral intention to use e-Learning
    • Park, S. (2009), “An analysis of the technology acceptance model in understanding university students’ behavioral intention to use e-Learning”, Educational Technology & Society, Vol. 12 No. 3, pp. 150-162.
    • (2009) Educational Technology & Society , vol.12 , Issue.3 , pp. 150-162
    • Park, S.1
  • 104
    • 84901605739 scopus 로고    scopus 로고
    • The Indian Law Institute, New Delhi: :, (accessed, January 4, 2018
    • Parthasarathi, P. (2003), Cyber-Crime, The Indian Law Institute, New Delhi, available at: http://naavi.org/pati/ (accessed January 4, 2018).
    • (2003) Cyber-Crime
    • Parthasarathi, P.1
  • 105
    • 33749347189 scopus 로고    scopus 로고
    • Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior
    • Pavlou, P.A. and Fygenson, M. (2006), “Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior”, MIS Quarterly, Vol. 30 No. 1, pp. 115-143.
    • (2006) MIS Quarterly , vol.30 , Issue.1 , pp. 115-143
    • Pavlou, P.A.1    Fygenson, M.2
  • 106
    • 0034818913 scopus 로고    scopus 로고
    • Trends in cybercrime – an overview of current financial crimes on the internet
    • Philippsohn, S. (2001), “Trends in cybercrime – an overview of current financial crimes on the internet”, Computers & Security, Vol. 20 No. 1, pp. 53-69.
    • (2001) Computers & Security , vol.20 , Issue.1 , pp. 53-69
    • Philippsohn, S.1
  • 107
    • 0042484572 scopus 로고    scopus 로고
    • CSI/FBI computer crime and security survey
    • Power, R. (2002), “CSI/FBI computer crime and security survey”, Computer Security Issues & Trends, Vol. 8 No. 1, pp. 1-22.
    • (2002) Computer Security Issues & Trends , vol.8 , Issue.1 , pp. 1-22
    • Power, R.1
  • 109
  • 110
    • 84962469601 scopus 로고    scopus 로고
    • Adoption of online public grievance redressal system in India: toward developing a unified view
    • Rana, N.P., Dwivedi, Y.K., Williams, M.D. and Weerakkody, V. (2016), “Adoption of online public grievance redressal system in India: toward developing a unified view”, Computers in Human Behavior, Vol. 59, pp. 265-282.
    • (2016) Computers in Human Behavior , vol.59 , pp. 265-282
    • Rana, N.P.1    Dwivedi, Y.K.2    Williams, M.D.3    Weerakkody, V.4
  • 111
    • 3442888100 scopus 로고    scopus 로고
    • Transnational criminal organizations, cybercrime, and money laundering: a handbook for law enforcement officers
    • Richards, J.R. (Ed.), CRC Press, Boca Raton, FL
    • Richards, J.R. (1999), “Transnational criminal organizations, cybercrime, and money laundering: a handbook for law enforcement officers”, in Richards, J.R. (Ed.), Auditors, and Financial Investigators, CRC Press, Boca Raton, FL, pp. 1-297.
    • (1999) Auditors, and Financial Investigators , pp. 1-297
    • Richards, J.R.1
  • 113
    • 34248138319 scopus 로고
    • Re-examining perceived ease of use and usefulness: a confirmatory factor analysis
    • Segars, A.H. and Grover, V. (1993), “Re-examining perceived ease of use and usefulness: a confirmatory factor analysis”, MIS Quarterly, Vol. 17 No. 4, pp. 517-525.
    • (1993) MIS Quarterly , vol.17 , Issue.4 , pp. 517-525
    • Segars, A.H.1    Grover, V.2
  • 114
    • 85073081957 scopus 로고    scopus 로고
    • (accessed, February 14, 2018
    • Shaheen, D. (2012), “Shaheen Dhada and Renu Shrinivas case of Maharastra”, available at: http://archive.indianexpress.com/news/two-girls-arrested-for-facebook-post-questioning-bal-thackery-shutdown-ofmumbai-get-bail/1033177 (accessed February 14, 2018).
    • (2012) Shaheen Dhada and Renu Shrinivas case of Maharastra
    • Shaheen, D.1
  • 115
    • 78649830464 scopus 로고    scopus 로고
    • E-government adoption model (GAM): differing service maturity levels
    • Shareef, M.A., Kumar, U., Kumar, V. and Dwivedi, Y.K. (2011), “E-government adoption model (GAM): differing service maturity levels”, Government Information Quarterly, Vol. 28 No. 1, pp. 17-35.
    • (2011) Government Information Quarterly , vol.28 , Issue.1 , pp. 17-35
    • Shareef, M.A.1    Kumar, U.2    Kumar, V.3    Dwivedi, Y.K.4
  • 116
    • 84873376058 scopus 로고    scopus 로고
    • User experience in social commerce: in friends we trust
    • Shin, D.H. (2013), “User experience in social commerce: in friends we trust”, Behavior & Information Technology, Vol. 32 No. 1, pp. 52-67.
    • (2013) Behavior & Information Technology , vol.32 , Issue.1 , pp. 52-67
    • Shin, D.H.1
  • 117
    • 85073085601 scopus 로고    scopus 로고
    • Supreme Court of India
    • Shreya Singhal v. Union of India, WP (Criminal) No. 167 of 2012. Supreme Court of India.
  • 121
    • 0041065277 scopus 로고
    • The internet worm program: an analysis
    • Spafford, E. (1989), “The internet worm program: an analysis”, Computer Communication Review, Vol. 19 No. 1, pp. 17-49.
    • (1989) Computer Communication Review , vol.19 , Issue.1 , pp. 17-49
    • Spafford, E.1
  • 122
    • 85073089844 scopus 로고    scopus 로고
    • Cyber-terrorism
    • (accessed, January 23, 2018
    • Sproles, J. and Byars, W. (1998), “Cyber-terrorism”, Computer Ethics at ETSU, available at: http://indiaforensic.com/compcrime.htm (accessed January 23, 2018).
    • (1998) Computer Ethics at ETSU
    • Sproles, J.1    Byars, W.2
  • 123
    • 85015908724 scopus 로고    scopus 로고
    • National University of Study and ResearchLaw, Ranchi University, Ranchi, Jharkhand, p. 7
    • Supriya, K. (2012), “Cyber crime”, National University of Study and Research in Law, Ranchi University, Ranchi, Jharkhand, p. 7.
    • (2012) Cyber crime
    • Supriya, K.1
  • 124
    • 84896523102 scopus 로고    scopus 로고
    • Energy saving through the Sun: analysis of visual comfort and energy consumption in office space
    • Tagliabue, L.C., Buzzetti, M. and Arosio, B. (2012), “Energy saving through the Sun: analysis of visual comfort and energy consumption in office space”, Energy Procedia, Vol. 30, pp. 693-703.
    • (2012) Energy Procedia , vol.30 , pp. 693-703
    • Tagliabue, L.C.1    Buzzetti, M.2    Arosio, B.3
  • 126
    • 33750923703 scopus 로고    scopus 로고
    • Cultivating an organizational information security culture
    • Thomson, K.L., Von Solms, R. and Lauw, L. (2006), “Cultivating an organizational information security culture”, Computer Fraud and Security, Vol. 6 No. 10, pp. 7-11.
    • (2006) Computer Fraud and Security , vol.6 , Issue.10 , pp. 7-11
    • Thomson, K.L.1    Von Solms, R.2    Lauw, L.3
  • 127
    • 0035780469 scopus 로고    scopus 로고
    • Embedding security practices in contemporary information systems development approaches
    • Tryfonas, T., Kiountouzis, E. and Poulymenakou, A. (2001), “Embedding security practices in contemporary information systems development approaches”, Information Management and Computer Security, Vol. 9 No. 4, pp. 183-197.
    • (2001) Information Management and Computer Security , vol.9 , Issue.4 , pp. 183-197
    • Tryfonas, T.1    Kiountouzis, E.2    Poulymenakou, A.3
  • 128
    • 77949489154 scopus 로고    scopus 로고
    • Does the technology acceptance model predict actual use? A systematic literature review
    • Turner, M., Kitchenham, B., Brereton, P., Charters, S. and Budgen, D. (2010), “Does the technology acceptance model predict actual use? A systematic literature review”, Information and Software Technology, Vol. 52 No. 5, pp. 463-479.
    • (2010) Information and Software Technology , vol.52 , Issue.5 , pp. 463-479
    • Turner, M.1    Kitchenham, B.2    Brereton, P.3    Charters, S.4    Budgen, D.5
  • 129
    • 79959988501 scopus 로고    scopus 로고
    • Structural equation modeling in information system research using partial least squares
    • Urbach, N. and Ahlemann, F. (2010), “Structural equation modeling in information system research using partial least squares”, Journal of Information Technology Theory and Application, Vol. 11 No. 2, pp. 5-40.
    • (2010) Journal of Information Technology Theory and Application , vol.11 , Issue.2 , pp. 5-40
    • Urbach, N.1    Ahlemann, F.2
  • 131
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: toward a unified view
    • Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003), “User acceptance of information technology: toward a unified view”, MIS Quarterly, Vol. 27 No. 3, pp. 425-478.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 132
    • 84979561901 scopus 로고    scopus 로고
    • Open data and its usability: an empirical view from the citizen’s perspective
    • Weerakkody, V., Irani, Z., Kapoor, K., Sivarajah, U. and Dwivedi, Y.K. (2017), “Open data and its usability: an empirical view from the citizen’s perspective”, Information Systems Frontiers, Vol. 19 No. 2, pp. 285-300.
    • (2017) Information Systems Frontiers , vol.19 , Issue.2 , pp. 285-300
    • Weerakkody, V.1    Irani, Z.2    Kapoor, K.3    Sivarajah, U.4    Dwivedi, Y.K.5
  • 133
    • 62949203110 scopus 로고    scopus 로고
    • Contemporary trends and issues in IT adoption and diffusion research
    • Williams, M.D., Dwivedi, Y.K., Lal, B. and Schwarz, A. (2009), “Contemporary trends and issues in IT adoption and diffusion research”, Journal of Information Technology, Vol. 24 No. 1, pp. 1-10.
    • (2009) Journal of Information Technology , vol.24 , Issue.1 , pp. 1-10
    • Williams, M.D.1    Dwivedi, Y.K.2    Lal, B.3    Schwarz, A.4
  • 134
    • 85053771385 scopus 로고    scopus 로고
    • Purpose and function creep by design: transforming the face of surveillance through the IoT
    • (accessed, January 11, 2018
    • Wisman, T.H.A. (2013), “Purpose and function creep by design: transforming the face of surveillance through the IoT”, European Journal of Technology, Vol. 4 No. 2, available at: http://ejlt.org/article/view/192/379 (accessed January 11, 2018).
    • (2013) European Journal of Technology , vol.4 , Issue.2
    • Wisman, T.H.A.1
  • 135
    • 0035609163 scopus 로고    scopus 로고
    • Shopping online for freedom, control, and fun
    • Wolfinbarger, M. and Gilly, M.C. (2001), “Shopping online for freedom, control, and fun”, California Management Review, Vol. 43 No. 2, pp. 34-55.
    • (2001) California Management Review , vol.43 , Issue.2 , pp. 34-55
    • Wolfinbarger, M.1    Gilly, M.C.2
  • 137
    • 80054738698 scopus 로고    scopus 로고
    • Acceptance of mobile learning: a re-specification and validation of information system success
    • Yi, C., Liao, P., Huang, C. and Hwang, I. (2009), “Acceptance of mobile learning: a re-specification and validation of information system success”, International Journal of Educational and Pedagogical Sciences, Vol. 3 No. 5, pp. 475-479.
    • (2009) International Journal of Educational and Pedagogical Sciences , vol.3 , Issue.5 , pp. 475-479
    • Yi, C.1    Liao, P.2    Huang, C.3    Hwang, I.4
  • 138
    • 84981762950 scopus 로고    scopus 로고
    • Consumer behavior in social commerce: a literature review
    • Zhang, K.Z. and Benyoucef, M. (2016), “Consumer behavior in social commerce: a literature review”, Decision Support Systems, Vol. 86, pp. 95-108.
    • (2016) Decision Support Systems , vol.86 , pp. 95-108
    • Zhang, K.Z.1    Benyoucef, M.2
  • 139
    • 84869030536 scopus 로고    scopus 로고
    • Key issues and challenges in e-government development: an integrative case study of the number one e City in the Arab world
    • Zhao, F., Scavarda, A.J. and Waxin, M.F. (2012), “Key issues and challenges in e-government development: an integrative case study of the number one e City in the Arab world”, Information Technology & People, Vol. 25 No. 4, pp. 395-422.
    • (2012) Information Technology & People , vol.25 , Issue.4 , pp. 395-422
    • Zhao, F.1    Scavarda, A.J.2    Waxin, M.F.3
  • 140
    • 84889090757 scopus 로고    scopus 로고
    • Capturing the essence of word-of-mouth for social commerce: assessing the quality of online e-Commerce reviews by a semi-supervised approach
    • Zheng, X., Zhu, S. and Lin, Z. (2013), “Capturing the essence of word-of-mouth for social commerce: assessing the quality of online e-Commerce reviews by a semi-supervised approach”, Decision Support Systems, Vol. 56, pp. 211-222.
    • (2013) Decision Support Systems , vol.56 , pp. 211-222
    • Zheng, X.1    Zhu, S.2    Lin, Z.3
  • 141
    • 84945571208 scopus 로고    scopus 로고
    • Acceptance and use predictors of open data technologies: drawing upon the unified theory of acceptance and use of technology
    • Zuiderwijk, A., Janssen, M. and Dwivedi, Y.K. (2015), “Acceptance and use predictors of open data technologies: drawing upon the unified theory of acceptance and use of technology”, Government Information Quarterly, Vol. 32 No. 4, pp. 429-440.
    • (2015) Government Information Quarterly , vol.32 , Issue.4 , pp. 429-440
    • Zuiderwijk, A.1    Janssen, M.2    Dwivedi, Y.K.3
  • 142
    • 0037259641 scopus 로고    scopus 로고
    • Trouble in paradise: crime and collapsed states in the age of globalization
    • Gros, J. (2003), “Trouble in paradise: crime and collapsed states in the age of globalization”, British Journal of Criminology, Vol. 43 No. 1, pp. 63-80.
    • (2003) British Journal of Criminology , vol.43 , Issue.1 , pp. 63-80
    • Gros, J.1
  • 144
    • 84904155138 scopus 로고    scopus 로고
    • An integrated success model for evaluating information system in public sectors
    • Zaied, A.N.H. (2012), “An integrated success model for evaluating information system in public sectors”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 3 No. 6, pp. 814-825.
    • (2012) Journal of Emerging Trends in Computing and Information Sciences , vol.3 , Issue.6 , pp. 814-825
    • Zaied, A.N.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.