References
- C. M. Angelopoulos, A. Damianou & V. Katos. (2020). DHP Framework: Digital Health Passport Using Blockchain. arXiv, 2020.10.1111/j.1365-2966.2005.08922.x
- World Economic Forum. (2020). Here's What Travelling Could Be Like after COVID-19, 06 May 2020. https://www.weforum.org/agenda/2020/05/this-is-what-travelling-will-be-like-after-covid-19/
- R. Diego. (2020). Mass-Tracking COVI-PASS Immunity Passports Slated to Roll Out in 15 Countries. MintPress News, 26 June 2020. https://www.mintpressnews.com/mass-tracking-covipass-immunity-passports-slated-roll-15-countries/269006/
- M. A. Hossain & M. Quaddus. (2013). Does Mandatory Pressure Increase RFID Adoption? A Case Study of Western Australian Livestock Industry. IFIP International Federation for Information Processing, 184-202. 10.1007/978-3-642-38862-0_12
- P. H. O'Neill, T. Ryan-Mosley & B. Johnson. (2020). A Flood of Coronavirus Apps Are Tracking Us. Now It's Time to Keep Track of Them. MIT Technology Review, 7 May 2020. https://www.technologyreview.com/2020/05/07/1000961/launching-mittr-covid-tracing-tracker/
- H. Xu, H. H. Teo, B. C. Y. Tan & R. Agarwal. (2009). The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services. Journal of Management Information Systems, 26(3), 135-173. 10.2753/MIS0742-1222260305
- Lowry & C. Greer. (2013). Information Disclosure on Mobile Devices: Re-examining Privacy Calculus with Actual User Behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173. 10.1016/j.ijhcs.2013.08.016
- M. S. Featherman, A. D. Miyazaki & D. E. Sprott. (2010). Reducing Online Privacy Risk to Facilitate e-Service Adoption: The Influence of Perceived Ease of Use and Corporate Credibility. Journal of Services Marketing, 24(3), 219-229. 10.1108/08876041011040622
- S. Y. Yousafzai, J. G. Pallister & G. R. Foxall. (2003). A Proposed Model of e-Trust for Electronic Banking. Technovation, 23, 847-860. 10.1016/S0166-4972(03)00130-5
- Y. Hwang. (2005). Investigating Enterprise Systems Adoption: Uncertainty Avoidance, Intrinsic Motivation, and the Technology Acceptance Model. European Journal of Information Systems, 14, 150-161. 10.1057/palgrave.ejis.3000532
- W. Wang & P. A. Hsieh. (2006). Beyond Routine: Symbolic Adoption, Extended Use, and Emergent Use, and Emergent Use of Complex Information Systems in the Mandatory Orgnizational Context. ICIS 2006 Proceedings, Paper 48. https://aisel.aisnet.org/icis2006/48
- X. Tan, L. Qin, Y. Kim & J. Hsu. (2012). Impact of Privacy Concern in Social Networking Web Sites. Internet Research, 22(2), 211-233. 10.1108/10662241211214575
- D. Mather, P. Caputi & R. Jayasuriya. (2002). Is the Technology Acceptance Model a Valid Model of User Satisfaction of Information Technology in Environments Where Usage is Mandatory?. ACIS 2002 School of Information Sysetms, 1241-1250. https://aisel.aisnet.org/acis2002/49
- F. D. Davis, (1993). User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts. International Journal of Man-Machine Studies, 38, 475-487. 10.1006/imms.1993.1022
- M. Igbaria, N. Zinatelli, P. Cragg & A. L. M. Cavaye. (1997). Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model. MIS Quarterly, 21(3), 279-303. 10.2307/249498
- F. K. Y. Chan, J. Y. L. Thong, V. Venkatesh, S. A. Brown, P. J. H. Hu & K. Y. Tam. (2010). Modeling Citizen Satisfaction with Mandatory Adoption of an E-Government Technology. Journal of the Association for Information Systems, 11(10), 519-549. 10.17705/1jais.00239
- S. A. Brown, A. P. Massey, M. M. Montoya-Weiss & J. R. Burkman. (2002). Do I Really Have To? User Acceptance of Mandated Technology. European Journal of Information Systems, 11(4), 283-295. 10.1057/palgrave.ejis.3000438
- D. Roback & R. L. Wakefield. (2013). Privacy Risk versus Socialness in the Decision to Use MObile Location-based Applications. DATA BASE for Advances in Information Systems, 44(2), 19-38. 10.1145/2488968.2488971
- P. Rawstorne, R. Jayasuriya, P. Caputi. (2000). Issues in Predicting and Explaining Usage Behaviors with the Technology Acceptance Model and the Theory of Planned Behavior When Usage Is Mandatory, ICIS 2000 Proceedings, 37-46. https://aisel.aisnet.org/icis2000/5
- V. Venkatesh & F. D. Davis. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2), 186-204. 10.1287/mnsc.46.2.186.11926
- J. Hartwick & H. Barki. (1994). Explaining the Role of User Participation in Information System Use. Management Science, 40(4), 440-465. 10.1287/mnsc.40.4.440
- C. Liao, C. C. Liu & K. Chen. (2011). Examining the Impact of Privacy, Trust and Risk Perceptions beyond Monetary Transactions: An Integrated Model. Electronic Commerce Research and Applications, 10, 702-715. 10.1016/j.elerap.2011.07.003
- T. Zhou. (2012). Examining Location-based Services Usage from the Perspectives of Unified Theory of Acceptance and Use of Technology and Privacy Risk. Journal of Electronic Commerce Research, 13(2), 135-144. http://www.jecr.org/node/50
- H. Xu & S. Gupta. (2009). The Effects of Privacy Concerns and Personal Innovativeness on Potential and Experienced Customers' Adoption of Location-based Services. Electronic Markets, 19, 137-149. 10.1007/s12525-009-0012-4
- S. L. Jarvenpaa, N. Tractinsky & M. Vitale. (2000). Consumer Trust in an Internet Store. Information Technology and Management, 1, 45-71. 10.1023/A:1019104520776
- T. Dinev & P. Hart. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17(1), 61-80. 10.1287/isre.1060.0080
- M. J. Culnan & P. Amstrong. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104-115. 10.1287/orsc.10.1.104
- N. Hajli & X Lin. (2016). Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information. Journal of Business Ethics, 133, 111-123. 10.1007/s10551-014-2346-x
- T. Dinev, H. Xu, J. H. Smith & P. Hart. (2013). Information Privacy and Correlates: An Empirical Attempt to Bridge and Distinguish Privacy-related Concepts. European Journal of Information Systems, 22, 295-316. 10.1057/ejis.2012.23
- H. S. Byeon & M. S. Yim. (2014). The Impact of Users' Congruity and Emotion on Intention to Game Use. Journal of Digital Convergence, 12(11), 89-98. DOI : 10.14400/JDC.2014.12.11.89
- M. S. Yim. (2014). Understanding the Technostress: An Individual Difference Investigation. Journal of Digital Convergence, 12(3), 17-27. DOI : 10.14400/JDC.2014.12.3.17
- M. S. Yim. (2013). Understanding an Employee Information Systems Security Violations. Journal of Digital Convergence, 11(2), 19-32. 10.14400/JDPM.2013.11.2.019
- M. S. Yim. (2013). The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees. Journal of Digital Convergence, 11(1), 27-38. 10.14400/JDPM.2013.11.1.027