Skip to main content
Erschienen in: Mobile Networks and Applications 1/2019

25.09.2018

Innovative Citizen’s Services through Public Cloud in Pakistan: User’s Privacy Concerns and Impacts on Adoption

verfasst von: Umar Ali, Amjad Mehmood, Muhammad Faran Majeed, Siraj Muhammad, Muhammad Kamal Khan, Houbing Song, Khalid Mahmood Malik

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The world is going to be more and more digital with effective utilization of information and communication technologies in government services to provide services to their citizens. In developing countries, public cloud is now considered a powerful platform, for providing scalable and cost effective public services to the citizens, due to their limited resources and budget. Public cloud has been adopted by both developed and developing countries for providing e-government services. User’s adoption is equally essential just like the government’s adoption of new services. Government needs to assess the user’s behavior intention and use behavior before choosing public cloud as platform for their innovative citizen’s services also known as government to citizen’s services (G2C). As citizen’s information is stored on public cloud, which is provided by a third party, so user’s concerns about privacy of information may affect the adoption of these services. The aim of this study is to find out the privacy factors that influence the adoption of e-government services by choosing and recommend suitable technology adoption model. As a methodology, the Unified Theory of Acceptance and Use of Technology (UTAUT) Model was amended to add two additional privacy variables from e-commerce domain i.e., Perceived Internal Privacy Risk (PIPR) and Cloud Information Privacy Concern (CIPC). Thus the new model included in addition to PIPR and CIPC, its own four elements of performance expectancy (PE), Effort Expectancy (EE), Social Influence (SI), and Facilitating Condition (FC). The data was collected from respondents who had used both public cloud and e-government services. Structure Equation Modeling (SEM) was used to investigate the effect of all variables on Behavior Intention (BI) and Use Behavior (UB). The findings show that Performance Expectancy (PE), Effort Expectancy (EE) and Social Influence (SI) had positive effects on user’s Behavior Intention (BI) while Cloud Information Privacy Concerns (CIPC) and Perceived Internet Privacy Risks (PIPR) had negative effects on Behavior Intention (BI). The Facilitating Conditions (FC) and Behavior Intention (BI) had a strong positive effect on User Behavior (UB).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Mukerji M (2013) Introduction. In: ICTs and development, Springer, pp. 1–11 Mukerji M (2013) Introduction. In: ICTs and development, Springer, pp. 1–11
2.
Zurück zum Zitat Basu S (2004) E-government and developing countries: an overview. International Review of Law, Computers, & Technology 18(1):109–132CrossRef Basu S (2004) E-government and developing countries: an overview. International Review of Law, Computers, & Technology 18(1):109–132CrossRef
3.
Zurück zum Zitat Harris JG, Alter AE (2010) Cloudrise: rewards and risks at the dawn of cloud computing. 20 Harris JG, Alter AE (2010) Cloudrise: rewards and risks at the dawn of cloud computing. 20
4.
Zurück zum Zitat Umar MM, Mehmood A, Song H, Choo K-KR (2017) I-marks: an iris code embedding system for ownership identification of multimedia content. Comput Electr Eng 63:209–219CrossRef Umar MM, Mehmood A, Song H, Choo K-KR (2017) I-marks: an iris code embedding system for ownership identification of multimedia content. Comput Electr Eng 63:209–219CrossRef
5.
Zurück zum Zitat Alshawi S, Alalwany H (2009) E-government evaluation: Citizen’s perspective in developing countries. Inf Technol Dev 15(3):193–208CrossRef Alshawi S, Alalwany H (2009) E-government evaluation: Citizen’s perspective in developing countries. Inf Technol Dev 15(3):193–208CrossRef
6.
Zurück zum Zitat Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 425–478 Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 425–478
7.
Zurück zum Zitat Alshehri M, Drew S, Alfarraj O (2012) A comprehensive analysis of E-government services adoption in Saudi Arabia: obstacles and challenges. High Educ 6:8–2 Alshehri M, Drew S, Alfarraj O (2012) A comprehensive analysis of E-government services adoption in Saudi Arabia: obstacles and challenges. High Educ 6:8–2
8.
Zurück zum Zitat Suna D, Changb G, Suna L, Wanga X (2011) Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering 15:2852–2856CrossRef Suna D, Changb G, Suna L, Wanga X (2011) Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering 15:2852–2856CrossRef
9.
Zurück zum Zitat Khan R, Mehmood A (2012) Realization of interoperability & portability among open clouds by using agents mobility & intelligence. International Journal of Multidisciplinary Sciences and Engineering 3(7):7–11 Khan R, Mehmood A (2012) Realization of interoperability & portability among open clouds by using agents mobility & intelligence. International Journal of Multidisciplinary Sciences and Engineering 3(7):7–11
10.
Zurück zum Zitat Heeks R, Bailur S (2007) Analyzing E-government research: perspectives, philosophies, theories, methods, and practice. Gov Inf Q 24(2):243–265CrossRef Heeks R, Bailur S (2007) Analyzing E-government research: perspectives, philosophies, theories, methods, and practice. Gov Inf Q 24(2):243–265CrossRef
11.
Zurück zum Zitat Mehmood A, Roman M, Umar MM, Song H (2015) Cloud computing security: a survey. International Journal of Computer Science and Information Security 13(7):20 Mehmood A, Roman M, Umar MM, Song H (2015) Cloud computing security: a survey. International Journal of Computer Science and Information Security 13(7):20
12.
Zurück zum Zitat Mehmood A, Alrajeh N, Mukherjee M, Abdullah S, Song H (2018) A survey on proactive, active and passive fault diagnosis protocols for wsns: network operation perspective. Sensors (Basel, Switzerland) 18(6):1787CrossRef Mehmood A, Alrajeh N, Mukherjee M, Abdullah S, Song H (2018) A survey on proactive, active and passive fault diagnosis protocols for wsns: network operation perspective. Sensors (Basel, Switzerland) 18(6):1787CrossRef
14.
Zurück zum Zitat Zhang Z, Mehmood A, Shu L, Huo Z, Zhang Y, Mukherjee M (2018) A survey on fault diagnosis in wireless sensor networks. IEEE Access 6:11349–11364CrossRef Zhang Z, Mehmood A, Shu L, Huo Z, Zhang Y, Mukherjee M (2018) A survey on fault diagnosis in wireless sensor networks. IEEE Access 6:11349–11364CrossRef
15.
Zurück zum Zitat Sang S, Lee J, Lee J (2010) E-government adoption in Cambodia: a partial least squares approach, trans- forming government: people. Process and Policy 4(2):138–157 Sang S, Lee J, Lee J (2010) E-government adoption in Cambodia: a partial least squares approach, trans- forming government: people. Process and Policy 4(2):138–157
16.
Zurück zum Zitat Mehmood A, Ahmed SH, Sarkar M (2017) Cyber-physical systems in vehicular communications, in: Handbook of Research on Advanced Trends in Microwave and Communication Engineering, IGI Global, pp. 477– 497 Mehmood A, Ahmed SH, Sarkar M (2017) Cyber-physical systems in vehicular communications, in: Handbook of Research on Advanced Trends in Microwave and Communication Engineering, IGI Global, pp. 477– 497
17.
Zurück zum Zitat Arshad S, Shah MA, Wahid A, Mehmood A, Song H, Yu H (2018) Samadroid: a novel 3-level hybrid malware detection model for android operating system. IEEE Access 6:4321–4339CrossRef Arshad S, Shah MA, Wahid A, Mehmood A, Song H, Yu H (2018) Samadroid: a novel 3-level hybrid malware detection model for android operating system. IEEE Access 6:4321–4339CrossRef
18.
Zurück zum Zitat Sharma MK, Thapliyal MP (2011) G-cloud: (E-governance in cloud). International Journal Engg TechSci 2(2):134–137 Sharma MK, Thapliyal MP (2011) G-cloud: (E-governance in cloud). International Journal Engg TechSci 2(2):134–137
19.
Zurück zum Zitat Huang M, Zhang Y, Jing W, Mehmood A (2017) Wireless Internet: 9th International Conference, WICON 2016, Haikou, China, December 19-20, 2016, Proceedings, Vol. 214, Springer Huang M, Zhang Y, Jing W, Mehmood A (2017) Wireless Internet: 9th International Conference, WICON 2016, Haikou, China, December 19-20, 2016, Proceedings, Vol. 214, Springer
20.
Zurück zum Zitat Susanto TD, Goodwin R (2013) User acceptance of SMS-based e-government services: differences between adopters and non-adopters. Gov Inf Q 30(4):486–497CrossRef Susanto TD, Goodwin R (2013) User acceptance of SMS-based e-government services: differences between adopters and non-adopters. Gov Inf Q 30(4):486–497CrossRef
21.
Zurück zum Zitat Majeed MF, Esichaikul V, No ME (2013) Use of Multi-agent Based Platform for Providing Document-Centric Interoperability in the Realm of E-government, in: International Conference on Advances in Information Technology, Springer, pp. 141–149 Majeed MF, Esichaikul V, No ME (2013) Use of Multi-agent Based Platform for Providing Document-Centric Interoperability in the Realm of E-government, in: International Conference on Advances in Information Technology, Springer, pp. 141–149
22.
Zurück zum Zitat Mehmood A, Mauri JL, Noman M, Song H (2015) Improvement of the wireless sensor network lifetime using leach with vice-cluster head. Ad Hoc & Sensor Wireless Networks 28(1-2):1–17 Mehmood A, Mauri JL, Noman M, Song H (2015) Improvement of the wireless sensor network lifetime using leach with vice-cluster head. Ad Hoc & Sensor Wireless Networks 28(1-2):1–17
23.
Zurück zum Zitat Moon MJ, Norris DF (2005) Does managerial orientation matter? The adoption of reinventing government and E-government at the municipal level. Inf Syst J 15(1):43–60CrossRef Moon MJ, Norris DF (2005) Does managerial orientation matter? The adoption of reinventing government and E-government at the municipal level. Inf Syst J 15(1):43–60CrossRef
24.
Zurück zum Zitat Yildiz M (2007) E-government research: reviewing the literature, limitations, and ways forward. Gov Inf Q 24(3):646–665CrossRef Yildiz M (2007) E-government research: reviewing the literature, limitations, and ways forward. Gov Inf Q 24(3):646–665CrossRef
25.
Zurück zum Zitat Lee J, Kim HJ, Ahn MJ (2011) The willingness of e-government service adoption by business users: the role of offline service quality and Trust in Technology. Gov Inf Q 28(2):222–230CrossRef Lee J, Kim HJ, Ahn MJ (2011) The willingness of e-government service adoption by business users: the role of offline service quality and Trust in Technology. Gov Inf Q 28(2):222–230CrossRef
26.
Zurück zum Zitat Qaiser N, Khan HGA (2010) E-government challenges in public sector. Int J Comput Sci 7(5):310–317 Qaiser N, Khan HGA (2010) E-government challenges in public sector. Int J Comput Sci 7(5):310–317
27.
Zurück zum Zitat Mehmood A, Khanan A, Mohamed AHH, Mahfooz S, Song H, Abdullah S (2018) Antsc: an intelligent naive bayesian probabilistic estimation practice for traffic flow to form stable clustering in vanet. IEEE Access 6:4452–4461CrossRef Mehmood A, Khanan A, Mohamed AHH, Mahfooz S, Song H, Abdullah S (2018) Antsc: an intelligent naive bayesian probabilistic estimation practice for traffic flow to form stable clustering in vanet. IEEE Access 6:4452–4461CrossRef
28.
Zurück zum Zitat Mehmood A, Mukherjee M, Ahmed SH, Song H, Malik KM (2018) Nbc-maids: Na¨ıve bayesian classifi- cation technique in multi-agent system-enriched ids for securing iot against ddos attacks, J Supercomput 1–15 Mehmood A, Mukherjee M, Ahmed SH, Song H, Malik KM (2018) Nbc-maids: Na¨ıve bayesian classifi- cation technique in multi-agent system-enriched ids for securing iot against ddos attacks, J Supercomput 1–15
29.
Zurück zum Zitat Ren L, Zhang L, Wang L, Tao F, Chai X (2017) Cloud manufacturing: key characteristics and applications. Int J Comput Integr Manuf 30(6):501–515CrossRef Ren L, Zhang L, Wang L, Tao F, Chai X (2017) Cloud manufacturing: key characteristics and applications. Int J Comput Integr Manuf 30(6):501–515CrossRef
30.
Zurück zum Zitat Zhou J, Yang J, Song H, Ahmed SH, Mehmood A, Lv H (2016) An online marking system conducive to learning. J Intell Fuzzy Syst 31(5):2463–2471CrossRef Zhou J, Yang J, Song H, Ahmed SH, Mehmood A, Lv H (2016) An online marking system conducive to learning. J Intell Fuzzy Syst 31(5):2463–2471CrossRef
31.
Zurück zum Zitat Aldegheishem A, Yasmeen H, Maryam H, Shah MA, Mehmood A, Alrajeh N, Song H (2018) Smart road traffic accidents reduction strategy based on intelligent transportation systems (tars). Sensors 18(7):1983CrossRef Aldegheishem A, Yasmeen H, Maryam H, Shah MA, Mehmood A, Alrajeh N, Song H (2018) Smart road traffic accidents reduction strategy based on intelligent transportation systems (tars). Sensors 18(7):1983CrossRef
32.
Zurück zum Zitat Mell P, Grance T, et al (2011) The NIST Definition of Cloud Computing, Tech. rep., National Institute of Standards & Technology Mell P, Grance T, et al (2011) The NIST Definition of Cloud Computing, Tech. rep., National Institute of Standards & Technology
33.
Zurück zum Zitat Wyld DC (2009) The utility of cloud computing as a new pricing and consumption model for information technology. International Journal of Database Management Systems (IJDMS) 1(1):1–20 Wyld DC (2009) The utility of cloud computing as a new pricing and consumption model for information technology. International Journal of Database Management Systems (IJDMS) 1(1):1–20
34.
Zurück zum Zitat Khan F, Zhang B, Khan S, Chen S (2011) Technological Leap Frogging E-government through Cloud Com- puting. In: 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC- BNMT), pp. 201–206 Khan F, Zhang B, Khan S, Chen S (2011) Technological Leap Frogging E-government through Cloud Com- puting. In: 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC- BNMT), pp. 201–206
35.
Zurück zum Zitat Botta A, De Donato W, Persico V, Pescapé A (2016) Integration of cloud computing and internet of things: a survey. Futur Gener Comput Syst 56:684–700CrossRef Botta A, De Donato W, Persico V, Pescapé A (2016) Integration of cloud computing and internet of things: a survey. Futur Gener Comput Syst 56:684–700CrossRef
36.
Zurück zum Zitat Attaran M (2017) Cloud computing technology: leveraging the power of the internet to improve business performance. Journal of International Technology and Information Management 26(1):112–137 Attaran M (2017) Cloud computing technology: leveraging the power of the internet to improve business performance. Journal of International Technology and Information Management 26(1):112–137
37.
Zurück zum Zitat Orakwue E (2010) Private clouds: secure managed services. Information Security Journal: A Global Perspective 19(6):295–298 Orakwue E (2010) Private clouds: secure managed services. Information Security Journal: A Global Perspective 19(6):295–298
38.
Zurück zum Zitat Hofmann P, Woods D (2010) Cloud computing: the limits of public clouds for business applications. IEEE Internet Comput 14(6):90–93CrossRef Hofmann P, Woods D (2010) Cloud computing: the limits of public clouds for business applications. IEEE Internet Comput 14(6):90–93CrossRef
39.
Zurück zum Zitat P. Géczy, N. Izumi, K. Hasida, Cloudsourcing: Managing Cloud Adoption, Tech. rep. (2011) P. Géczy, N. Izumi, K. Hasida, Cloudsourcing: Managing Cloud Adoption, Tech. rep. (2011)
40.
Zurück zum Zitat Krutz RL, Vines RD (2010) Cloud security: a comprehensive guide to secure cloud computing. Wiley Publishing, Hoboken Krutz RL, Vines RD (2010) Cloud security: a comprehensive guide to secure cloud computing. Wiley Publishing, Hoboken
41.
Zurück zum Zitat Sotomayor B, Montero RS, Llorente IM, Foster I (2009) Virtual infrastructure Management in Private and Hybrid Clouds. IEEE Internet Comput 13(5):14–22CrossRef Sotomayor B, Montero RS, Llorente IM, Foster I (2009) Virtual infrastructure Management in Private and Hybrid Clouds. IEEE Internet Comput 13(5):14–22CrossRef
42.
Zurück zum Zitat Montano DE, Kasprzyk D (2015) Theory of reasoned action, theory of planned behavior, and the integrated behavioral model. Health behavior: Theory, Research and Practice 95–124 Montano DE, Kasprzyk D (2015) Theory of reasoned action, theory of planned behavior, and the integrated behavioral model. Health behavior: Theory, Research and Practice 95–124
43.
Zurück zum Zitat Francescato G, Weidemann S, Anderson JR (2018) Evaluating the built environment from the users Perspective: implications of attitudinal models of satisfaction. In: Building performance evaluation, Springer, pp. 87–97 Francescato G, Weidemann S, Anderson JR (2018) Evaluating the built environment from the users Perspective: implications of attitudinal models of satisfaction. In: Building performance evaluation, Springer, pp. 87–97
44.
Zurück zum Zitat de Camargo Fiorini P, Seles BMRP, Jabbour CJC, Mariano EB, de Sousa Jabbour ABL (2018) Management theory and big data literature: from a review to a research agenda. Int J Inf Manag 43:112–129CrossRef de Camargo Fiorini P, Seles BMRP, Jabbour CJC, Mariano EB, de Sousa Jabbour ABL (2018) Management theory and big data literature: from a review to a research agenda. Int J Inf Manag 43:112–129CrossRef
45.
Zurück zum Zitat Hariguna T, Lai M, Hung C, Chen S (2017) Understanding information system quality on public E-government service intention: an empirical study. International Journal of Innovation and Sustainable Development 11(2-3):271–290CrossRef Hariguna T, Lai M, Hung C, Chen S (2017) Understanding information system quality on public E-government service intention: an empirical study. International Journal of Innovation and Sustainable Development 11(2-3):271–290CrossRef
46.
Zurück zum Zitat Carter L, Belanger F (2004) Citizen adoption of electronic government initiatives. In: proceedings of the 37th annual Hawaii international conference on system sciences, IEEE Carter L, Belanger F (2004) Citizen adoption of electronic government initiatives. In: proceedings of the 37th annual Hawaii international conference on system sciences, IEEE
47.
Zurück zum Zitat Alkhater N, Walters R, Wills G (2018) An empirical study of factors influencing cloud adoption among private sector Organisations. Telematics Inform 35(1):38–54CrossRef Alkhater N, Walters R, Wills G (2018) An empirical study of factors influencing cloud adoption among private sector Organisations. Telematics Inform 35(1):38–54CrossRef
48.
Zurück zum Zitat Venkatesh V, Thong JYL, Xu X (2012) Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q 36:157–178CrossRef Venkatesh V, Thong JYL, Xu X (2012) Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q 36:157–178CrossRef
49.
Zurück zum Zitat Reddick CG (2005) Citizen interaction with E-government: from the streets to servers? Government Information Quarterly 22(1):38–57CrossRef Reddick CG (2005) Citizen interaction with E-government: from the streets to servers? Government Information Quarterly 22(1):38–57CrossRef
50.
Zurück zum Zitat Maruping LM, Bala H, Venkatesh V, Brown SA (2017) Going beyond intention: integrating behavioral expectation into the unified theory of acceptance and use of technology. J Assoc Inf Sci Technol 68(3):623–637CrossRef Maruping LM, Bala H, Venkatesh V, Brown SA (2017) Going beyond intention: integrating behavioral expectation into the unified theory of acceptance and use of technology. J Assoc Inf Sci Technol 68(3):623–637CrossRef
51.
Zurück zum Zitat Harby FA, Qahwaji R, Kamala M (2012) End-users acceptance of biometrics authentication to secure E- commerce within the context of Saudi culture: applying the UTAUT model, globalization, Technology Diffusion and Gender Disparity: Social Impacts of ICTs 225–246 Harby FA, Qahwaji R, Kamala M (2012) End-users acceptance of biometrics authentication to secure E- commerce within the context of Saudi culture: applying the UTAUT model, globalization, Technology Diffusion and Gender Disparity: Social Impacts of ICTs 225–246
52.
Zurück zum Zitat Van SC, Shim JT, Johnson R, Jiang JJ (2006) Concern for Information Privacy and Online Consumer Purchasing, Tech. rep. Van SC, Shim JT, Johnson R, Jiang JJ (2006) Concern for Information Privacy and Online Consumer Purchasing, Tech. rep.
53.
Zurück zum Zitat Tsohou A, Lee H, Irani Z (2014) Innovative public governance through cloud computing: information privacy, business models and performance measurement challenges. Transforming Government: People, Process and Policy 8(2):251–282CrossRef Tsohou A, Lee H, Irani Z (2014) Innovative public governance through cloud computing: information privacy, business models and performance measurement challenges. Transforming Government: People, Process and Policy 8(2):251–282CrossRef
54.
Zurück zum Zitat Moqbel MA, Bartelt VL (2015) Consumer acceptance of personal cloud: integrating trust and risk with the technology acceptance model. AIS Transactions on Replication Research 1(1):1–5 Moqbel MA, Bartelt VL (2015) Consumer acceptance of personal cloud: integrating trust and risk with the technology acceptance model. AIS Transactions on Replication Research 1(1):1–5
55.
Zurück zum Zitat AlAwadhi S, Morris A (2008) The use of the UTAUT model in the adoption of E-government Services in Kuwait. In: proceedings of the 41st annual Hawaii international conference on system sciences, IEEE, pp. 219–219 AlAwadhi S, Morris A (2008) The use of the UTAUT model in the adoption of E-government Services in Kuwait. In: proceedings of the 41st annual Hawaii international conference on system sciences, IEEE, pp. 219–219
56.
Zurück zum Zitat Foster SP (2000) The digital divide: some reflections. The International Information & Library Review 32(3-4):437–451CrossRef Foster SP (2000) The digital divide: some reflections. The International Information & Library Review 32(3-4):437–451CrossRef
57.
Zurück zum Zitat McGarr O, Gavaldon G (2018) Exploring Spanish pre-service teachers talk in relation to ICT: balancing different expectations between the university and practicum school. Technol Pedagog Educ 27(2):199–209CrossRef McGarr O, Gavaldon G (2018) Exploring Spanish pre-service teachers talk in relation to ICT: balancing different expectations between the university and practicum school. Technol Pedagog Educ 27(2):199–209CrossRef
58.
Zurück zum Zitat Angelopoulos K, Diamantopoulou V, Mouratidis H, Pavlidis M, Salnitri M, Giorgini P, Ruiz JF (2017) A holistic approach for privacy protection in E-government. In: proceedings of the 12th international conference on availability, Reliability and Security, ACM, p. 17 Angelopoulos K, Diamantopoulou V, Mouratidis H, Pavlidis M, Salnitri M, Giorgini P, Ruiz JF (2017) A holistic approach for privacy protection in E-government. In: proceedings of the 12th international conference on availability, Reliability and Security, ACM, p. 17
59.
Zurück zum Zitat Sekaran U, Bougie R (2006) Research methods for business: a skill building approach. John Wiley & Sons, Hoboken Sekaran U, Bougie R (2006) Research methods for business: a skill building approach. John Wiley & Sons, Hoboken
60.
Zurück zum Zitat Rehman M, Kamal MM, Esichaikul V (2016) Adoption of E-government Services in Pakistan: a comparative study between online and offline users. Inf Syst Manag 33(3):248–267CrossRef Rehman M, Kamal MM, Esichaikul V (2016) Adoption of E-government Services in Pakistan: a comparative study between online and offline users. Inf Syst Manag 33(3):248–267CrossRef
61.
Zurück zum Zitat Cohen P, West SG, Aiken LS (2014) Applied multiple regression/correlation analysis for the behavioral sciences. Psychology Press, HoveCrossRef Cohen P, West SG, Aiken LS (2014) Applied multiple regression/correlation analysis for the behavioral sciences. Psychology Press, HoveCrossRef
62.
Zurück zum Zitat Churchill GA, Iacobucci D (2006) Marketing research: methodological foundations. Dryden Press, New York Churchill GA, Iacobucci D (2006) Marketing research: methodological foundations. Dryden Press, New York
63.
Zurück zum Zitat Schmitt A, Reimer A, Hermanns N, Kulzer B, Ehrmann D, Krichbaum M, Huber J, Haak T (2017) Depres- Sion is linked to Hyperglycaemia via suboptimal diabetes self-management: a cross-sectional mediation analysis. Journal of Pychosomatic Research 94:17–23CrossRef Schmitt A, Reimer A, Hermanns N, Kulzer B, Ehrmann D, Krichbaum M, Huber J, Haak T (2017) Depres- Sion is linked to Hyperglycaemia via suboptimal diabetes self-management: a cross-sectional mediation analysis. Journal of Pychosomatic Research 94:17–23CrossRef
Metadaten
Titel
Innovative Citizen’s Services through Public Cloud in Pakistan: User’s Privacy Concerns and Impacts on Adoption
verfasst von
Umar Ali
Amjad Mehmood
Muhammad Faran Majeed
Siraj Muhammad
Muhammad Kamal Khan
Houbing Song
Khalid Mahmood Malik
Publikationsdatum
25.09.2018
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2019
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1132-x

Weitere Artikel der Ausgabe 1/2019

Mobile Networks and Applications 1/2019 Zur Ausgabe

Neuer Inhalt