Multivariate data analysis (4th ed.): with readings
Multivariate data analysis (4th ed.): with readings
Building Effective Online Marketplaces with Institution-Based Trust
Information Systems Research
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Beyond concern: a privacy-trust-behavioral intention model of electronic commerce
Information and Management
RFID privacy issues and technical challenges
Communications of the ACM - Special issue: RFID
RFID and the perception of control: the consumer's view
Communications of the ACM - Special issue: RFID
Convenience and TAM in a ubiquitous computing environment: The case of wireless LAN
Electronic Commerce Research and Applications
User acceptance of mobile Internet: Implication for convergence technologies
Interacting with Computers
RFID, privacy and the perception of risk: A strategic framework
The Journal of Strategic Information Systems
What people do with digital multimedia broadcasting? Path analysis of structural equation modelling
International Journal of Mobile Communications
A model of consumer acceptance of mobile payment
International Journal of Mobile Communications
RFID in retail: a framework for examining consumers' ethical perceptions
International Journal of Mobile Communications
International Journal of Mobile Communications
Using User Preferences to Enhance Privacy in Pervasive Systems
ICONS '08 Proceedings of the Third International Conference on Systems
Gender and loyalty in the context of mobile services
International Journal of Mobile Communications
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
International Journal of Mobile Communications
Activity-based scenarios for and approaches to ubiquitous e-Learning
Personal and Ubiquitous Computing
Information and Management
The adoption behaviour for mobile video call services
International Journal of Mobile Communications
An update on privacy in ubiquitous computing
Personal and Ubiquitous Computing
Investigating mobile wireless technology adoption: An extension of the technology acceptance model
Information Systems Frontiers
Ubiquitous Computing: Smart Devices, Environments and Interactions
Ubiquitous Computing: Smart Devices, Environments and Interactions
Do i do what i say?: observed versus stated privacy preferences
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction
An effective method for location privacy in ubiquitous computing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Role-Based access control model for ubiquitous computing environment
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Enhancing user experience through pervasive information systems: The case of pervasive retailing
International Journal of Information Management: The Journal for Information Professionals
A policy analysis of Korean smart grid project
International Journal of Mobile Communications
Harnessing handheld computing: managing IS support to the digital ranger with defensive design
DESRIST'11 Proceedings of the 6th international conference on Service-oriented perspectives in design science research
Identifying drivers for adoption intention in RFID service
International Journal of Mobile Communications
Examining continuous usage of location-based services from the perspective of perceived justice
Information Systems Frontiers
Explaining customers' willingness to use mobile network-based pay-as-you-drive insurances
International Journal of Mobile Communications
Taxonomy of ubiquitous computing service for city development
Personal and Ubiquitous Computing
Hi-index | 0.00 |
This study integrates cognitive and affective attitudes as the primary factors of influence to formulate a Ubiquitous Computing Acceptance Model (UCAM), which is intended to predict whether potential users will accept ubiquitous computing (u-computing). The goal of this study was to empirically assess the UCAM by identifying the factors that contribute to user attitudes and intentions in u-computing environments. This study is one of the first to empirically evaluate the relationships among trust, security, privacy, usefulness, ease of use and behavioural intention in the ubiquitous city context.