최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털융복합연구 = Journal of digital convergence, v.19 no.5, 2021년, pp.81 - 92
The purpose of this study is to present an approach to the "Digital Health Passport" (DHP), which will be the most important in the change of the travel industry among the sudden environmental changes brought about by COVID-19. To this end, this study reviewed a variety of empirical literature on DH...
C. M. Angelopoulos, A. Damianou & V. Katos. (2020). DHP Framework: Digital Health Passport Using Blockchain. arXiv, 2020.10.1111/j.1365-2966.2005.08922.x
World Economic Forum. (2020). Here's What Travelling Could Be Like after COVID-19, 06 May 2020. https://www.weforum.org/agenda/2020/05/this-is-what-travelling-will-be-like-after-covid-19/
R. Diego. (2020). Mass-Tracking COVI-PASS Immunity Passports Slated to Roll Out in 15 Countries. MintPress News, 26 June 2020. https://www.mintpressnews.com/mass-tracking-covipass-immunity-passports-slated-roll-15-countries/269006/
M. A. Hossain & M. Quaddus. (2013). Does Mandatory Pressure Increase RFID Adoption? A Case Study of Western Australian Livestock Industry. IFIP International Federation for Information Processing, 184-202. 10.1007/978-3-642-38862-0_12
P. H. O'Neill, T. Ryan-Mosley & B. Johnson. (2020). A Flood of Coronavirus Apps Are Tracking Us. Now It's Time to Keep Track of Them. MIT Technology Review, 7 May 2020. https://www.technologyreview.com/2020/05/07/1000961/launching-mittr-covid-tracing-tracker/
H. Xu, H. H. Teo, B. C. Y. Tan & R. Agarwal. (2009). The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services. Journal of Management Information Systems, 26(3), 135-173. 10.2753/MIS0742-1222260305
Lowry & C. Greer. (2013). Information Disclosure on Mobile Devices: Re-examining Privacy Calculus with Actual User Behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173. 10.1016/j.ijhcs.2013.08.016
M. S. Featherman, A. D. Miyazaki & D. E. Sprott. (2010). Reducing Online Privacy Risk to Facilitate e-Service Adoption: The Influence of Perceived Ease of Use and Corporate Credibility. Journal of Services Marketing, 24(3), 219-229. 10.1108/08876041011040622
S. Y. Yousafzai, J. G. Pallister & G. R. Foxall. (2003). A Proposed Model of e-Trust for Electronic Banking. Technovation, 23, 847-860. 10.1016/S0166-4972(03)00130-5
Y. Hwang. (2005). Investigating Enterprise Systems Adoption: Uncertainty Avoidance, Intrinsic Motivation, and the Technology Acceptance Model. European Journal of Information Systems, 14, 150-161. 10.1057/palgrave.ejis.3000532
W. Wang & P. A. Hsieh. (2006). Beyond Routine: Symbolic Adoption, Extended Use, and Emergent Use, and Emergent Use of Complex Information Systems in the Mandatory Orgnizational Context. ICIS 2006 Proceedings, Paper 48. https://aisel.aisnet.org/icis2006/48
X. Tan, L. Qin, Y. Kim & J. Hsu. (2012). Impact of Privacy Concern in Social Networking Web Sites. Internet Research, 22(2), 211-233. 10.1108/10662241211214575
D. Mather, P. Caputi & R. Jayasuriya. (2002). Is the Technology Acceptance Model a Valid Model of User Satisfaction of Information Technology in Environments Where Usage is Mandatory?. ACIS 2002 School of Information Sysetms, 1241-1250. https://aisel.aisnet.org/acis2002/49
F. D. Davis, (1993). User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts. International Journal of Man-Machine Studies, 38, 475-487. 10.1006/imms.1993.1022
M. Igbaria, N. Zinatelli, P. Cragg & A. L. M. Cavaye. (1997). Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model. MIS Quarterly, 21(3), 279-303. 10.2307/249498
F. K. Y. Chan, J. Y. L. Thong, V. Venkatesh, S. A. Brown, P. J. H. Hu & K. Y. Tam. (2010). Modeling Citizen Satisfaction with Mandatory Adoption of an E-Government Technology. Journal of the Association for Information Systems, 11(10), 519-549. 10.17705/1jais.00239
S. A. Brown, A. P. Massey, M. M. Montoya-Weiss & J. R. Burkman. (2002). Do I Really Have To? User Acceptance of Mandated Technology. European Journal of Information Systems, 11(4), 283-295. 10.1057/palgrave.ejis.3000438
D. Roback & R. L. Wakefield. (2013). Privacy Risk versus Socialness in the Decision to Use MObile Location-based Applications. DATA BASE for Advances in Information Systems, 44(2), 19-38. 10.1145/2488968.2488971
P. Rawstorne, R. Jayasuriya, P. Caputi. (2000). Issues in Predicting and Explaining Usage Behaviors with the Technology Acceptance Model and the Theory of Planned Behavior When Usage Is Mandatory, ICIS 2000 Proceedings, 37-46. https://aisel.aisnet.org/icis2000/5
V. Venkatesh & F. D. Davis. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2), 186-204. 10.1287/mnsc.46.2.186.11926
J. Hartwick & H. Barki. (1994). Explaining the Role of User Participation in Information System Use. Management Science, 40(4), 440-465. 10.1287/mnsc.40.4.440
C. Liao, C. C. Liu & K. Chen. (2011). Examining the Impact of Privacy, Trust and Risk Perceptions beyond Monetary Transactions: An Integrated Model. Electronic Commerce Research and Applications, 10, 702-715. 10.1016/j.elerap.2011.07.003
T. Zhou. (2012). Examining Location-based Services Usage from the Perspectives of Unified Theory of Acceptance and Use of Technology and Privacy Risk. Journal of Electronic Commerce Research, 13(2), 135-144. http://www.jecr.org/node/50
H. Xu & S. Gupta. (2009). The Effects of Privacy Concerns and Personal Innovativeness on Potential and Experienced Customers' Adoption of Location-based Services. Electronic Markets, 19, 137-149. 10.1007/s12525-009-0012-4
T. Dinev & P. Hart. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17(1), 61-80. 10.1287/isre.1060.0080
M. J. Culnan & P. Amstrong. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104-115. 10.1287/orsc.10.1.104
N. Hajli & X Lin. (2016). Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information. Journal of Business Ethics, 133, 111-123. 10.1007/s10551-014-2346-x
T. Dinev, H. Xu, J. H. Smith & P. Hart. (2013). Information Privacy and Correlates: An Empirical Attempt to Bridge and Distinguish Privacy-related Concepts. European Journal of Information Systems, 22, 295-316. 10.1057/ejis.2012.23
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.