[1]
|
T. S. H. Toe, S. C. Srivastava, C. Ranganathan and J. W. K. Loo, “A Framework for Stakeholder Oriented Mindfulness: Case of RFID Implementation at YCH Group, Singapore,” European Journal of Information Systems, Vol. 20, No. 2, 2011, pp. 201-220.
doi:10.1057/ejis.2010.58
|
[2]
|
S. Liu, “IT Professional in 2011,” IT Professional, Vol. 13, No. 1, 2011, pp. 4-5.
|
[3]
|
O. Günther and S. Spiekermann, “RFID and the Perception of Control: The Consumer’s View,” Communications of the ACM, Vol. 48, No. 9, 2005, pp. 73-76.
doi:10.1145/1081992.1082023
|
[4]
|
A. R. Peslak, “An Ethical Exploration of Privacy and Radio Frequency Identification,” Journal of Business Ethics, Vol. 59, No. 4, 2005, pp. 327-345.
doi:10.1007/s10551-005-2928-8
|
[5]
|
S. Sackmann, J. Struker and R. Accorsi, “Personalization in Privacy-Aware Highly Dynamic Systems,” Communications of the ACM, Vol. 49, No. 9, 2006, pp. 32-38.
doi:10.1145/1151030.1151052
|
[6]
|
M. Rothensee and S. Spiekermann, “Between Extreme Rejection and Cautious Acceptance: Consumers’ Reactions to RFID-Based IS in Retail,” Social Science Computer Review, Vol. 26, No. 1, 2008, pp. 75-86.
doi:10.1177/0894439307307687
|
[7]
|
F. Thiesse, “RFID, Privacy and the Perception of Risk: A Strategic Framework,” Journal of Strategic Information Systems, Vol. 16, No. 2, 2007, pp. 214-232.
doi:10.1016/j.jsis.2007.05.006
|
[8]
|
R. C. Mayer, J. H. Davis and F. D. Schoorman, “An Integrative Model of Organizational Trust,” Academy of Management Review, Vol. 20, No. 3, 1995, pp. 709-734.
|
[9]
|
Global Retail RFID Market 2011-2015 Report, “Research and Markets Adds Report: Global Retail RFID Market 2011-2015,” Wireless News, 15 May 2012.
|
[10]
|
H. Galanxhi-Janaqi and F. F.-H. Nah, “U-Commerce: Emerging Trends and Research Issues,” Industrial Management & Data Systems, Vol. 104, No. 9, 2004, pp. 744-755. doi:10.1108/02635570410567739
|
[11]
|
R. Angeles, “An Empirical Study of the Anticipated Consumer Response to RFID Product Item Tagging,” Indus trial Management & Data Systems, Vol. 107, No. 4, 2007, pp. 461-483. doi:10.1108/02635570710740643
|
[12]
|
M. Ohkubo, K. Suzuki and S. Kinoshita, “RFID Privacy Issues and Technical Challenges,” Communications of the ACM, Vol. 48, No. 9, 2005, pp. 66-71.
doi:10.1145/1081992.1082022
|
[13]
|
E. R. Foxman and P. Kilcoyne, “Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issue,” Journal of Public & Marketing, Vol. 12, No. 1, 1993, pp. 106-119.
|
[14]
|
C. Flavián and M. Guinalíu, “Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site,” Industrial Management & Data Systems, Vol. 106, No. 5, 2006, pp. 601-620.
doi:10.1108/02635570610666403
|
[15]
|
R. Bennett and S. Savani, “Retailers’ Preparedness for the Introduction of Third Wave (Ubiquitous) Computing Applications: A Survey of UK Companies,” International Journal of Retail & Distribution Management, Vol. 39, No. 5, 2011, pp. 306-325.
doi:10.1108/02635570610666403
|
[16]
|
M. S. Featherman, A. D. Miyazaki and D. E. Sprott, “Reducing Online Privacy Risk to Facilitate E-Service Adoption: The Influence of Perceived Ease of Use and Corporate Credibility,” The Journal of Services Marketing, Vol. 24, No. 3, 2010, pp. 219-229.
doi:10.1108/08876041011040622
|
[17]
|
M. Maury and D. Kleiner, “E-Commerce: Ethical Commerce,” Journal of Business Ethics, Vol. 36, No. 1-2, 2002, pp. 21-31. doi:10.1023/A:1014274301815
|
[18]
|
P. A. Pavlou, “Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model,” International Journal of Electronic Commerce, Vol. 7, No. 3, 2003, pp. 101-134.
|
[19]
|
S. Sen and C.B. Bhattacharya, “Does Doing Good Al ways Lead to Doing Better? Consumer Reactions to Corporate Social Responsibility,” Journal of Marketing Research, Vol. 38, No. 2, 2001, 225-243.
doi:10.1509/jmkr.38.2.225.18838
|
[20]
|
T. J. Brown and P. A. Dacin, “The Company and the Product: Corporate Associations and Consumer Product Responses,” Journal of Marketing, Vol. 61, No. 1, 1997, pp. 68-84. doi:10.2307/1252190
|
[21]
|
J. T. Resnick, “Corporate Reputation: Managing Corporate Reputation-Applying Rigorous Measures to a Key Asset,” The Journal of Business Strategy, Vol. 25, No. 6, 2004, pp. 30-38. doi:10.1108/02756660410569175
|
[22]
|
L. Mui, M. Mohtashemi and A. Halberstadt, “A Computational Model of Trust and Reputation,” Proceedings of the 35th Hawaii International Conference on System Sciences, Big Island, 7-10 January 2002, pp. 2431-2439.
doi:10.1109/HICSS.2002.994181
|
[23]
|
D. B. Turban and D. M. Cable, “Firm Reputation and Application Pool Characteristics,” Journal of Organizational Behavior, Vol. 24 No. 6, 2003, pp. 733-751.
doi:10.1002/job.215
|
[24]
|
E. Aivaloglou and S. Gritzalis, “Hybrid Trust and Reputation Management for Sensor Networks,” Wireless Net work, Vol. 16, No. 5, 2010, pp. 1493-1510.
doi:10.1007/s11276-009-0216-8
|
[25]
|
R. Cohen and R. Kerr, “TREET: The Trust and Reputation Experimentation and Evaluation Tested,” Electronic Commerce Research, Vol. 10, No. 3-4, 2010, pp. 271-290.
doi:10.1007/s10660-010-9056-y
|
[26]
|
F. G. Mármol and G. M. Pérez, “Trust and Reputation Models Comparison,” Internet Research, Vol. 21, No. 2, 2011, pp. 138-153. doi:10.1108/10662241111123739
|
[27]
|
Z. Noorian and M. Ulieru, “The State of the Art in Trust and Reputation Systems: A Framework for Comparison,” Journal of Theoretical and Applied Electronic Commerce Research, Vol. 5, No. 2, 2010, pp. 97-117.
doi:10.4067/S0718-18762010000200007
|
[28]
|
F. Fukuyama, “Social Capital and Global Economy,” Foreign Affairs, Vol. 74, No. 5, 1995, pp. 89-103.
doi:10.2307/20047302
|
[29]
|
D. L. Hoffman, T. Novak and M. A. Peralta, “Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web,” Information Society, Vol. 15, No. 2, 1999, pp. 129-139.
doi:10.1080/019722499128583
|
[30]
|
L. T. Hosmer, “Trust: The Connection Link between Organizational Theory and Philosophical Ethics,” The Academy of Management Review, Vol. 20, No. 2, 1995, pp. 337-362.
|
[31]
|
M. I. Eid, “Determinants of E-Commerce Customer Satisfaction, Trust, and Loyalty in Saudi Arabia,” Journal of Electronic Commerce Research, Vol. 12, No. 1, 2011, pp. 78-93.
|
[32]
|
M. Koller, “Risk as a Determinant of Trust,” Basic and Applied Social Psychology, Vol. 9, No. 4, 1988, pp. 265-276. doi:10.1207/s15324834basp0904_2
|
[33]
|
J. Zheng, E. Bakker and L. Knight, “A Strategic Case for E-Adoption in Healthcare Supply Chains,” International Journal of Information Management, Vol. 26, No. 4, 2006, pp. 290-301. doi:10.1016/j.ijinfomgt.2006.03.010
|
[34]
|
M. A. Islam, M. A. Khan, T. Ramayah and M. M. Hossain, “The Adoption of Mobile Commerce Service among Employed Mobile Phone Users in Bangladesh: Self-Efficacy as a Moderator,” International Business Research, Vol. 4, No. 2, 2011, pp. 80-89. doi:10.5539/ibr.v4n2p80
|
[35]
|
R. Larzelere and T. Huston, “The Dyadic Trust Scale: Toward Understanding Interpersonal Trust in Close Relationships,” Journal of Marriage and the Family, Vol. 42, No. 3, 1980, pp. 595-604. doi:10.2307/351903
|
[36]
|
J. Cook and T. Wall, “New Work Attitude Measures of Trust, Organizational Commitment, and Personal Need Nonfulfillment,” Journal of Occupational Psychology, Vol. 53, No. 1, 1980, pp. 39-52.
doi:10.1111/j.2044-8325.1980.tb00005.x
|
[37]
|
A. P. Jones, L. R. James and J. R. Bruni, “Perceived Leadership Behavior and Employee Confidence in the Leader as Moderated by Job Involvement,” Journal of Applied Psychology, Vol. 60, No. 1, 1975, pp. 146-149.
doi:10.1037/h0076359
|
[38]
|
R. Gulati, “Does Familiarity Breed Trust? The Implications of Repeated Ties for Contractual Choice in Alliances,” Academy of Management Journal, Vol. 38, No. 1, 1995, pp. 85-112. doi:10.2307/256729
|
[39]
|
M. J. Culnan, “Consumer Awareness of Name Removal Procedures: Implications for Direct Marketing,” Journal of Direct Marketing, Vol. 9, No. 2, 1995, pp. 10-19.
doi:10.1002/dir.4000090204
|
[40]
|
M. J. Culnan and P. K. Armstrong, “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation,” Organization Science, Vol. 10, No. 1, 1999, pp. 104-115. doi:10.1287/orsc.10.1.104
|
[41]
|
S. M. Lee, S.-H. Park, S. N. Yoon and S.-J. Yeon, “RFID Based Ubiquitous Consumer Trust,” Industrial Management & Data Systems, Vol. 107, No. 5, 2007, pp. 605-617.
doi:10.1108/02635570710750381
|
[42]
|
K.-P. Wiedmann, N. Hennigs, D. Varelmann and M.-O. Reeh, “Determinants of Consumers’ Perceived Trust in IT-Ecosystems,” Journal of Theoretical and Applied Electronic Commerce Research, Vol. 5, No. 2, 2010, pp. 137-154. doi:10.4067/S0718-18762010000200009
|
[43]
|
L. V. Casaló, C. Flavián and M. Guinaliíu, “The Role of Security, Privacy, Usability and Reputation in the Development of Online Banking,” Online Information Review, Vol. 31, No. 5, 2007, pp. 583-603.
doi:10.1108/14684520710832315
|
[44]
|
M. V. Nepomuceno, M. Laroche, R. Marie-Odile and A. Eggert, “Relationship between Intangibility and Perceived Risk: Moderating Effect of Privacy, System Security and General Security Concerns,” The Journal of Consumer Marketing, Vol. 29, No. 3, 2012, pp. 176-189.
doi:10.1108/07363761211221701
|
[45]
|
M. Eurich, N. Oertel and R. Boutellier, “The Impact of Perceived Privacy Risks on Organizations’ Willingness to Share Item-level Event Data across the Supply Chain,” Electronic Commerce Research, Vol. 10, No. 3-4, 2010, pp. 423-440. doi:10.1007/s10660-010-9062-0
|
[46]
|
M. Taleghani, A. S. Sharifi and S. Gilaninia, “The Role of Key Factors in E-Banking for New Enterprises (Concepts & Applications),” Interdisciplinary Journal of Con temporary Research in Business, Vol. 3, No. 3, 2011, pp. 999-1006.
|
[47]
|
S. Taylor and P. A. Todd, “Assessing IT Usage: The Role of Prior Experience,” MIS Quarterly, Vol. 19, No. 4, 1995, pp. 561-570. doi:10.2307/249633
|
[48]
|
M. T. Elliott and S. Speck, “Factors that Affect Attitude toward a Retail Web Site,” Journal of Marketing Theory and Practice, Vol. 13, No. 1, 2005, pp. 40-51.
|
[49]
|
L. S. Strickland and L. E. Hunt, “Technology, Security, and Individual Privacy: New Tools, New Threats, and New Public Perceptions,” Journal of the American Society for Information Science and Technology, Vol. 56, No. 3, 2005, pp. 221-234. doi:10.1002/asi.20122
|
[50]
|
P. A. Pavlou and D. Gefen, “Building Effective Online Marketplaces with Institution-Based Trust,” Information Systems Research, Vol. 15, No. 1, 2004, pp. 37-59.
doi:10.1287/isre.1040.0015
|
[51]
|
M. Alkailani and R. Kumar, “Investigating Uncertainty Avoidance and Perceived Risk for Impacting Internet Buying: A Study in Three National Cultures,” International Journal of Business and Management, Vol. 6, No. 5, 2011, pp. 76-92.
|
[52]
|
Y.-J. Hu, “Exploring the Relationship between Customer Involvement, Brand Equity, Perceived Risk and Customer Loyalty: The Case of Electrical Consumer Products,” The International Journal of Organizational Innovation, Vol. 4, No. 1, 2011, pp. 111-127.
|
[53]
|
S. H. Lim and C. E. Koh, “RFID Implementation Strategy: Perceived Risks and Organizational Fits,” Industrial Management & Data Systems, Vol. 109, No. 8, 2009, pp. 1017-1036. doi:10.1108/02635570910991274
|
[54]
|
E. W. T. Ngai, K. K. L. Moon, F. J. Riggins and Y. Y. Candace, “RFID Research: An Academic Literature Re view (1995-2005) and Future Research Directions,” International Journal of Production Economics, Vol. 112, No. 2, 2008, pp.510-520. doi:10.1016/j.ijpe.2007.05.004
|
[55]
|
L. Lee, “RFID for Everyday People,” Perspectives in Business, Vol. 3, No. 2, 2005, pp. 25-31.
|
[56]
|
R. L. Juban and D. C. Wyld, “Would You Like Chips with That? Consumer Perspectives of RFID,” Management Research News, Vol. 27, No. 11-12, 2004, pp. 29-44.
doi:10.1108/01409170410784653
|