لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
الهی، شعبان، شایان، علی، قیصری رمضانیان، ملیحه _ "طراحی چهار ...
[مقاله کنفرانسی]T. Tsiakis, G. Sthephanides, The concept of security and trust ...
Heen P. & Balance G.& Chan S., Electronic Commerce Relationship: ...
Xueming Luo, Trust production and privacy concern On the Internet ...
C. Kim, W. Tao, N. Shin, K. Kim, An empirical ...
K. Stroborn, A. Heitmann, K. Leibold, G. Frank, Internet payments ...
T. Tsiakis, G. Sthephanides, The concept of security and trust ...
K. Linck, K. Pousttchi, D.G. Wiedemann, Security issues in mobile ...
A. Kousaridas, G. Parissis, T. Apo stolopoulo S, An open ...
D.L. Hoffman, T.P. Novak, M. Peralta, Building consumef trust online, ...
F. Sultan, G.L. Urban, V. Shankar, I. Bart, Determinans and ...
B. Jeanson, J. Ingham, Consumer TRUST in E-Commerce, Idea Group ...
A. Mansoorian, Measuring Factors for Increasing Trust of People in ...
B. J. Corbitt, T. Thanasankit, H. Yi, T rust and ...
M. Torabi, K. Zamani, Mobile Banking and Its Security Issues, ...
R. Chellappa, P. Pavlou, Perceived information security, financial liability and ...
A. Mukherjee, P. Nath, A model of trust in online ...
M.J. Cotteleer, C.A. Cotteleer, A. Prochnow, Cutting checks: challenges and ...
A. S. Lim, Inter- consortia battles in mobile payments S ...
J. Miyazaki, K. Fernandez, The antecedents and consequence of trust ...
A. Torrubia, F.J. Mora, L. Marti, Cryptography Regulations for E-commerce ...
J. Riegelsberger, M. Angela Sasse, J.D. McCarthy, The mechanics of ...
[25] Y. Zhiwei, J. Zhongyuan, A Survey On the Evolution ...
M. S. Saleh, A. Alfantookh, A new c omprehensive framework ...
M. Wright, Third Generation risk Management Practices, Computer Fraud & ...
T. Finne, Information Systems Risk Management: Key Concepts and Business ...
T. Finne, A Conceptual Framework for Information Security Management, computers ...
L. Niekerk, L. Labuschagne, The PECULIUM model: information security risk ...
J. Spears, A Holistic Risk Analysis Method for Identifying Information ...
A. Zuccato, Holistic security management framework applied in electronic commerce, ...
K. Anderson, Convergence a holistic approach to risk management, Network ...
J. Huang, Y.Ding, Z. Hu, "Knowledge based model for holistic ...
A. Vorster, L. Labuschagne, A framework for comparing different information ...
نمایش کامل مراجع