An integrated value-risk investigation of contactless mobile payments adoption

M Cocosila, H Trabelsi - Electronic Commerce Research and Applications, 2016 - Elsevier
The objective of this study is to investigate empirically consumer adoption views on credit
card contactless payments with smartphones. Contactless Near Field Communication (NFC) …

Design and evaluation of auto-ID enabled shopping assistance artifacts in customers' mobile phones

V Venkatesh, JA Aloysius, H Hoehle, S Burton - Mis Quarterly, 2017 - JSTOR
There has been widespread use of auto-ID technologies. With the increasing diffusion of
smartphones, the potential to serve content to shoppers using auto-ID technologies is …

Main difficulties during RFID implementation: An exploratory factor analysis approach

EA Moretti, R Anholon, IS Rampasso… - … Analysis & Strategic …, 2019 - Taylor & Francis
ABSTRACT RFID (Radio Frequency Identification) systems are meant to increase accuracy
and velocity in objects identification, supporting Industry 4.0. However, there are challenges …

The challenge of cyber supply chain security to research and practice–An introduction

JD Linton, S Boyson, J Aje - Technovation, 2014 - Elsevier
The tremendous potential to assist or degrade economic and national security performance
make security in the cyber supply chain a topic of critical importance. This is reflected by the …

Novel retail technologies and marketing analytics

M Petrescu, AS Krishen - Journal of Marketing Analytics, 2018 - Springer
Retailers utilize the latest technology for obtaining consumer data and marketing analytics
including IP addresses, geo-fencing data, beacons, behavioral data from the Internet of …

Building theory from consumer reactions to RFID: discovering Connective Proximity

A Margulis, H Boeck, Y Bendavid, F Durif - Ethics and Information …, 2016 - Springer
Academic research into RFID technology has largely neglected ethics. What scarce
research was being performed has now dwindled despite having some consumers continue …

Better safe than sorry: A study of investigating individuals' protection of privacy in the use of storage as a cloud computing service

LL Visinescu, O Azogu, SD Ryan, YA Wu… - International Journal of …, 2016 - Taylor & Francis
Since the use of network-based storage as a cloud computing service [Storage as a Service
(StaaS)] becomes ubiquitous, users who store data in the cloud are exposed to risk and …

Digital Payments in India: Impact of Emerging Technologies

M Sharma - Industry 4.0 Technologies for Business Excellence, 2021 - taylorfrancis.com
The world has changed the way it worked primarily due to the technological revolution. The
information and communication technologies along with the rise of the Internet have opened …

[PDF][PDF] Privacy concern of personal Information in the ict usage, internet and social media perspective

JA Jamin, MS Noor, N Rosli, A Shukry - Malaysian E Commerce …, 2019 - academia.edu
The evolution of information technology has rapidly increased the sophisticated online
application where accommodates most activities of users. Information and communication …

[图书][B] Understanding factors influencing intention to use electronic health records (EHRS): An integration of multiple theoretical perspectives

MS Rahman - 2015 - search.proquest.com
Abstract Electronic Health Records (EHRs) are expected to make a significant impact in
transforming the healthcare industry. While healthcare organizations are increasingly …