Mining significant factors affecting the adoption of SaaS using the rough set approach

Journal of Systems and Software - Tập 84 Số 3 - Trang 435-441 - 2011
Wei‐Wen Wu1
1Department of International Trade, Ta Hwa Institute of Technology, 1, Ta-Hwa Rd., Chiung-Lin, Hsin Chu 307, Taiwan#TAB#

Tóm tắt

Từ khóa


Tài liệu tham khảo

Catteddu, 2009, Cloud Computing: Benefits, risks and recommendations for information security, European Network and Information Security Agency (ENISA), 1

Cisco Systems, 2009

Coombe, 2009, Cloud computing-overview, advantages, and challenges for enterprise deployment, Bechtel Technology Journal, 2, 1

Corritore, 2003, On-line trust: concepts, evolving themes, a model, International Journal of Human-Computer Studies, 58, 737, 10.1016/S1071-5819(03)00041-7

Davis, F.D., 1986. A technology acceptance model for empirically testing new end-user information systems: Theory and results. Doctoral dissertation, Sloan School of Management, Massachusetts Institute of Technology, Cambridge, MA.

Davis, 1989, User acceptance of computer technology: a comparison of two theoretical models, Management Science, 35, 982, 10.1287/mnsc.35.8.982

Deutsch, 1962, Cooperation and trust: some theoretical notes, 275

Evans, 2010, Elements of trust: risk and perspective-taking, Journal of Experimental Social Psychology

Feuerlicht, 2010, Next generation SOA: can SOA survive cloud computing?, 19

Fishbein, 1975

Goscinski, 2010, Toward dynamic and attribute based publication, discovery and selection for cloud computing, Future Generation Computer Systems, 10.1016/j.future.2010.03.009

Huang, 2008, Simplifying essential competencies for Taiwan civil servants by using the rough set approach, Journal of the Operational Research Society, 59, 259, 10.1057/palgrave.jors.2602516

King, 2006, A meta-analysis of the technology acceptance model, Information & Management, 43, 740, 10.1016/j.im.2006.05.003

Klems, 2009, Do clouds compute? A framework for estimating the value of cloud computing, 110

Lee, 2010, Exploring high-performers’ required competencies, Expert Systems with Applications, 37, 434, 10.1016/j.eswa.2009.05.064

Lee, 2010, Analysis of adopting an integrated decision making trial and evaluation laboratory on a technology acceptance model, Expert Systems with Applications, 37, 1745, 10.1016/j.eswa.2009.07.034

Lin, 2008, A causal analytical method for group decision-making under fuzzy environment, Expert Systems with Applications, 34, 205, 10.1016/j.eswa.2006.08.012

Lopez-Nicolas, 2008, An assessment of advanced mobile services acceptance: contributions from TAM and diffusion theory models, Information & Management, 45, 359, 10.1016/j.im.2008.05.001

Mehrtens, 2001, A model of Internet adoption by SMEs, Information & Management, 39, 165, 10.1016/S0378-7206(01)00086-6

Mi, 2004, Approaches to knowledge reduction based on variable precision rough set model, Information Sciences, 159, 255, 10.1016/j.ins.2003.07.004

Misra, 2010, Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding return on investment, Mathematical and Computer Modelling

Morasca, 2000, A hybrid approach to analyze empirical software engineering data and its application to predict module fault-proneness in maintenance, Journal of Systems and Software, 53, 225, 10.1016/S0164-1212(00)00014-5

Mowbray, 2009, A Client-based privacy manager for cloud computing

Paquette, 2010, Identifying the security risks associated with governmental use of cloud computing, Government Information Quarterly, 27, 245, 10.1016/j.giq.2010.01.002

Pawlak, 2002, Rough sets, decision algorithms and Bayes’ theorem, European Journal of Operational Research, 136, 181, 10.1016/S0377-2217(01)00029-7

Pawlak, 1997, Rough set approach to knowledge-based decision support, European Journal of Operational Research, 99, 48, 10.1016/S0377-2217(96)00382-7

Pawlak, 1982, Rough sets, International Journal of Computer and Information Science, 11, 341, 10.1007/BF01001956

Polancic, 2010, An empirical examination of application frameworks success based on technology acceptance model, Journal of Systems and Software, 83, 574, 10.1016/j.jss.2009.10.036

Rogers, 1995

Shin, 2009, Towards an understanding of the consumer acceptance of mobile wallet, Computers in Human Behavior, 25, 1343, 10.1016/j.chb.2009.06.001

Subashini, 2010, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications

Tung, 2008, An extension of trust and TAM model with IDT in the adoption of the electronic logistics information system in HIS in the medical industry, International journal of medical informatics, 77, 324, 10.1016/j.ijmedinf.2007.06.006

Venkatesh, 2008, Technology acceptance model 3 and a research agenda on interventions, Decision Sciences, 39, 273, 10.1111/j.1540-5915.2008.00192.x

Venkatesh, 2000, A theoretical extension of the technology acceptance model: four longitudinal field studies, Management Science, 46, 186, 10.1287/mnsc.46.2.186.11926

Venkatesh, 1996, A model of the antecedents of perceived ease of use: development and test, Decision Sciences, 27, 451, 10.1111/j.1540-5915.1996.tb01822.x

Venkatesh, 2003, User acceptance of information technology: toward a unified view, MIS Quarterly, 27, 425, 10.2307/30036540

Wu, 2009, Exploring core competencies for R&D technical professionals, Expert Systems with Applications, 36, 9574, 10.1016/j.eswa.2008.07.052

Wu, 2007, Developing global managers’ competencies using the fuzzy DEMATEL method, Expert Systems with Applications, 32, 499, 10.1016/j.eswa.2005.12.005