Alignment of IT Authority and Citizens of Proposed Smart Cities in India: System Security and Privacy Perspective
- 21 Downloads
KeywordsAdoption Citizens E-governance Flexibility Privacy Smart city of India System security User experience
Compliance with Ethical Standards
Conflict of interest
The authors declare that they have no competing interests.
- Barclay, D., Thompson, R., & Higgins, C. (1995). The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration. Technology Studies, 2(2), 285–309.Google Scholar
- Barskar, R., Jayant, A., Bharti, J., Ahmed, G. F. (2010). The algorithm analysis of E-commerce security issues for online payment transaction system in banking technology. Journal of Computer Science and Information Security, 8(1), 307–312.Google Scholar
- Bartol, A., Hernandez-Serranoy, J., Soriano, M., Dohler, M., Kountouris, A., & Barthel, D. (2011). Security and privacy in your smart city. In Proceedings of Barcelona Smart Cities Congress, Barcelona, Spain, pp. 1–6. Google Scholar
- Bresz, F. P. (2004). People-often the weakest link in security, but one of the best places to start. Journal of Health Care Compliance, 6(4), 57–60.Google Scholar
- Chin, W. W. (1998). The partial least square approach to structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Mahwah, NJ: Erlbaum.Google Scholar
- Dijkstra, T. (1985). Latent variables in linear stochastic models: Reflections on maximum likelihood and partial list square methods (2nd ed.). Amsterdam: Socio Economic Research Foundation.Google Scholar
- Duhigg, C. (2012). How companies learn your secrets. The New York Times Magazine. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html. Accessed Oct 2016.
- Ernst & Young. (2008). Ernst & Young 2008 Global Information Security Survey. http://faisaldanka.wordpress.com/2008/10/20/ernst-young-2008-globa-informationsecurity-survey. Accessed 3 Oct 2016.
- Falconer, G., & Mitchell, S. (2012). Smart city framework: A systematic process for enabling smart + connected communities. http://www.cisco.com/c/dam/en_us/about/ac79/docs/ps/motm/Smart-City-Framework.pdf. Accessed Feb 2017.
- Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issue. Journal of Public & Marketing, 12, 106–119.Google Scholar
- Greet, H. (1997). Cultures and organizations: Software of the mind (3rd ed.). New York: McGraw-Hill.Google Scholar
- Jaiswal, P., & Bhal, K. T. (2014). Behavioural flexibility: The use of upward impression management tactics by subordinates for good performance rating from leader and impact of organizational & leader’s machiavellianism. Global Journal of Flexible Systems Management, 15(4), 313–326.CrossRefGoogle Scholar
- Jeberson, W., Singh, G., & Sahu, G. P. (2011). Analysis of security measure implemented on G2C online payment systems in India. MIT International Journal of Computer Science and Information Technology, 1(1), 19–27.Google Scholar
- LosHuertos, G. (2010). End of privacy—Herding Firesheep in Starbucks. CNN Money. http://money.cnn.com/2010/12/14/technology/firesheep_starbucks/index.htm. Accessed May 2016.
- McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473–490.Google Scholar
- Nunnally, J. C., & Bernstein, I. H. (1978). Psychometric theory (2nd ed.). New York: McGraw Hill. ISBN-13: 978-0070478497.Google Scholar
- Piggott, S. (1950). Pre-historic India (p. 165). Harmondsworth: Penguin Books.Google Scholar
- Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., & Xu, W. (2010). Security and privacy incredulities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the 19th USENIX Conference on Security, Berkeley, CA, USA. USENIX Association. http://www.winlab.rutgers.edu/~gruteser/papers/xu_tpms10.pdf. Accessed Oct 2016.
- Standard British Institute. (2014). Smart city framework – Guide to establishing strategies for smart cities and communities. London: BSI.Google Scholar
- Srikanth, V. (2012). E-commerce online security and trust marks. International Journal of Computer Engineering & Technology, 3(2), 238–255.Google Scholar
- Tripathy, B., & Mishra, J. (2013). Protective measures in E-Commerce to deal with security threats arising out of social issues—A framework. International Journal of Computer Engineering and Technology, 4(1), 46–53. Google Scholar
- Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding on-line purchase intentions: Contribution from technology and trust perspectives. European Journal of Information System, 12(1), 47–48.Google Scholar
- Wolcott, P., Press, L., McHenry, W., Goodman, S. E., & Foster, W. (2001). A framework for assessing the global diffusion of the internet. Journal of the Association for Information System, 2(6), 1–53.Google Scholar
- Yasmin, S., & Hasseb, K. (2012). Cryptography best E-commerce security: A review. International Journal of Computer Science and Information Technology, 9(2), 132–137.Google Scholar
- Yazdanifard, R., & Edres, N. A.-H. (2010). Security and privacy issues as a potential risk for further E-commerce development. In International Conference on Information, Communication and Management, IPCSIT (Vol. 16, pp. 23–27).Google Scholar