Mining significant factors affecting the adoption of SaaS using the rough set approach
Tóm tắt
Từ khóa
Tài liệu tham khảo
Catteddu, 2009, Cloud Computing: Benefits, risks and recommendations for information security, European Network and Information Security Agency (ENISA), 1
Cisco Systems, 2009
Coombe, 2009, Cloud computing-overview, advantages, and challenges for enterprise deployment, Bechtel Technology Journal, 2, 1
Corritore, 2003, On-line trust: concepts, evolving themes, a model, International Journal of Human-Computer Studies, 58, 737, 10.1016/S1071-5819(03)00041-7
Davis, F.D., 1986. A technology acceptance model for empirically testing new end-user information systems: Theory and results. Doctoral dissertation, Sloan School of Management, Massachusetts Institute of Technology, Cambridge, MA.
Davis, 1989, User acceptance of computer technology: a comparison of two theoretical models, Management Science, 35, 982, 10.1287/mnsc.35.8.982
Deutsch, 1962, Cooperation and trust: some theoretical notes, 275
Evans, 2010, Elements of trust: risk and perspective-taking, Journal of Experimental Social Psychology
Feuerlicht, 2010, Next generation SOA: can SOA survive cloud computing?, 19
Fishbein, 1975
Goscinski, 2010, Toward dynamic and attribute based publication, discovery and selection for cloud computing, Future Generation Computer Systems, 10.1016/j.future.2010.03.009
Huang, 2008, Simplifying essential competencies for Taiwan civil servants by using the rough set approach, Journal of the Operational Research Society, 59, 259, 10.1057/palgrave.jors.2602516
King, 2006, A meta-analysis of the technology acceptance model, Information & Management, 43, 740, 10.1016/j.im.2006.05.003
Klems, 2009, Do clouds compute? A framework for estimating the value of cloud computing, 110
Lee, 2010, Exploring high-performers’ required competencies, Expert Systems with Applications, 37, 434, 10.1016/j.eswa.2009.05.064
Lee, 2010, Analysis of adopting an integrated decision making trial and evaluation laboratory on a technology acceptance model, Expert Systems with Applications, 37, 1745, 10.1016/j.eswa.2009.07.034
Lin, 2008, A causal analytical method for group decision-making under fuzzy environment, Expert Systems with Applications, 34, 205, 10.1016/j.eswa.2006.08.012
Lopez-Nicolas, 2008, An assessment of advanced mobile services acceptance: contributions from TAM and diffusion theory models, Information & Management, 45, 359, 10.1016/j.im.2008.05.001
Mehrtens, 2001, A model of Internet adoption by SMEs, Information & Management, 39, 165, 10.1016/S0378-7206(01)00086-6
Mi, 2004, Approaches to knowledge reduction based on variable precision rough set model, Information Sciences, 159, 255, 10.1016/j.ins.2003.07.004
Misra, 2010, Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding return on investment, Mathematical and Computer Modelling
Morasca, 2000, A hybrid approach to analyze empirical software engineering data and its application to predict module fault-proneness in maintenance, Journal of Systems and Software, 53, 225, 10.1016/S0164-1212(00)00014-5
Mowbray, 2009, A Client-based privacy manager for cloud computing
Paquette, 2010, Identifying the security risks associated with governmental use of cloud computing, Government Information Quarterly, 27, 245, 10.1016/j.giq.2010.01.002
Pawlak, 2002, Rough sets, decision algorithms and Bayes’ theorem, European Journal of Operational Research, 136, 181, 10.1016/S0377-2217(01)00029-7
Pawlak, 1997, Rough set approach to knowledge-based decision support, European Journal of Operational Research, 99, 48, 10.1016/S0377-2217(96)00382-7
Pawlak, 1982, Rough sets, International Journal of Computer and Information Science, 11, 341, 10.1007/BF01001956
Polancic, 2010, An empirical examination of application frameworks success based on technology acceptance model, Journal of Systems and Software, 83, 574, 10.1016/j.jss.2009.10.036
Rogers, 1995
Shin, 2009, Towards an understanding of the consumer acceptance of mobile wallet, Computers in Human Behavior, 25, 1343, 10.1016/j.chb.2009.06.001
Subashini, 2010, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications
Tung, 2008, An extension of trust and TAM model with IDT in the adoption of the electronic logistics information system in HIS in the medical industry, International journal of medical informatics, 77, 324, 10.1016/j.ijmedinf.2007.06.006
Venkatesh, 2008, Technology acceptance model 3 and a research agenda on interventions, Decision Sciences, 39, 273, 10.1111/j.1540-5915.2008.00192.x
Venkatesh, 2000, A theoretical extension of the technology acceptance model: four longitudinal field studies, Management Science, 46, 186, 10.1287/mnsc.46.2.186.11926
Venkatesh, 1996, A model of the antecedents of perceived ease of use: development and test, Decision Sciences, 27, 451, 10.1111/j.1540-5915.1996.tb01822.x
Venkatesh, 2003, User acceptance of information technology: toward a unified view, MIS Quarterly, 27, 425, 10.2307/30036540
Wu, 2009, Exploring core competencies for R&D technical professionals, Expert Systems with Applications, 36, 9574, 10.1016/j.eswa.2008.07.052