Burda, D. and Teuteberg, F. (2014) ‘The role of trust and
risk perceptions in cloud archiving-Results from an
empirical study’, The Journal of High Technology
Management Research, 25(2), pp. 172-187.
Charalabidis, Y., Markaki, O., Lampathaki, F., Mantzakou, I.
and Sarantis, D. (2010) ‘Towards a scientific approach to
e-government research’, in tGov Workshop.
Chi, H., Yeh, H. and Hung, W. C. (2012) ‘The moderating
effect of subjective norm on cloud computing users’
perceived risk and usage intention’, International
Journal of Marketing Studies, 4(6), pp. 95.
Communications and Information Technology
Commission (CITC) (2015) ‘ICT Report’.
Gefen, D., Karahanna, E. and Straub, D. W. (2003) ‘Trust
and TAM in online shopping: An integrated model’,
MIS quarterly, vol. 27(1) pp. 51-90.
Im, I., Hong, S. and Kang, M. S. (2011) ‘An international
comparison of technology adoption: Testing the UTAUT
model’, Information & Management, 48(1), pp. 1-8.
Kanwal, A., Masood, R., Ghazia, U. E., Shibli, M. A. and
Abbasi, A. G. (2013) ‘Assessment Criteria for Trust
Models in Cloud Computing’, in Green Computing
and Communications (GreenCom), 2013 IEEE and
Internet of Things (iThings/CPSCom), IEEE
International Conference on and IEEE Cyber, Physical
and Social Computing, Beijing, pp. 254-261.
Khan, F., Zhang, B., Khan, S. and Chen, S. (2011)
‘Technological leap frogging e-government through
cloud computing’, in Broadband Network and
Multimedia Technology (IC-BNMT), 2011 4th IEEE
International Conference, Shenzhen, pp. 201-206.
Khan, K. M. and Malluhi, Q. (2010) ‘Establishing trust in
cloud computing’, IT professional, 12(5), pp. 20-27.
Kim, D. J., Ferrin, D. L. and Rao, H. R. (2008) ‘A trust-based
consumer decision-making model in electronic commerce:
The role of trust, perceived risk, and their antecedents’,
Decision support systems, 44(2), pp. 544-564.
Kirs, P. and Bagchi, K. (2012) ‘The impact of trust and
changes in trust: A national comparison of individual
adoptions of information and communication
technologies and related phenomenon’, International
Journal of Information Management, 32(5), pp. 431-441.
Ko, R. K., Lee, B. S. and Pearson, S. (2011) ‘Towards
achieving accountability, auditability and trust in cloud
computing’, in Advances in Computing and
Communications, Springer Berlin Heidelberg, pp. 432-444.
Kurdi, R., Taleb-Bendiab, A., Randles, M. and Taylor, M.
(2011) ‘E-Government Information Systems and
Cloud Computing (Readiness and Analysis)’, in
Developments in E-systems Engineering (DeSE),
2011, Dubai, pp. 404-409.
Lian, J. W. (2015) ‘Critical factors for cloud based e-
invoice service adoption in Taiwan: An empirical
study’, International Journal of Information
Management, 35(1), pp. 98-109.
Liang, J. (2012) ‘Government Cloud: Enhancing
Efficiency of E-Government and Providing Better
Public Services’, in Service Sciences (IJCSS), 2012
International Joint Conference, pp. 261-265.
Martucci, L., Zuccato, A., Smeets, B., Habib, S. M.,
Johansson, T. and Shahmehri, N. (2012) ‘Privacy,
security and trust in cloud computing: The perspective
of the telecommunication industry’, in Ubiquitous
Intelligence & Computing and 9th International
Conference on Autonomic & Trusted Computing
(UIC/ATC), 2012 9th International Conference on,
Fukuoka, pp. 627-632.
Mayer, R. C., Davis, J. H. and Schoorman, F. D. (1995)
‘An integrative model of organizational trust’,
Academy of Management Review, 20(3), pp. 709-734.
Opitz, N., Langkau, T. F., Schmidt, N. H. and Kolbe, L. M.
(2012) ‘Technology acceptance of cloud computing:
empirical evidence from German IT departments’, in
System Science (HICSS), 2012 45th Hawaii International
Conference on IEEE, Maui, HI, pp. 1593-1602.
Park, S. C. and Ryoo, S. Y. (2013) ‘An empirical
investigation of end-users’ switching toward cloud
computing: A two factor theory perspective’,
Computers in Human Behavior, 29(1), pp. 160-170.
Pavlou, P. A. (2003) ‘Consumer acceptance of electronic
commerce: Integrating trust and risk with the
technology acceptance model’, International journal
of electronic commerce, 7(3), pp. 101-134.
Pearson, S. (2013) ‘Privacy, security and trust in cloud
computing’, in Privacy and Security for Cloud
Computing, Springer London, pp. 3-42.
Schaupp, L. C., Carter, L. and McBride, M. E. (2010) ‘E-
file adoption: A study of US taxpayers’ intentions’,
Computers in Human Behavior, 26(4), pp. 636-644.
Seo, J. H., Min, J. S. and Lee, H. (2014) ‘Implementation
Strategy for a Public Service Based on Cloud Computing
at the Government’, International Journal of Software
Engineering & Its Applications, 8(9), pp. 207-220.
Shen, Y., Yang, J. and Keskin, T. (2012) ‘The evolution of
IT towards cloud computing in China and US’, in
Computational Problem-Solving (ICCP), 2012
International Conference on, Leshan, pp. 224-235.
Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F.
D. (2003) ‘User acceptance of information technology:
Toward a unified view’, MIS Quarterly, 27(3), pp.
425-478.
Wu, L. and Chen, J. L. (2005) ‘An extension of trust and
TAM model with TPB in the initial adoption of on-
line tax: an empirical study’, International Journal of
Human-Computer Studies, 62(6), pp. 784-808.
Wu, W. W., Lan, L. W. and Lee, Y. T. (2013) ‘Factors
hindering acceptance of using cloud services in
university: a case study’, The Electronic Library,
31(1), pp. 84-98.
Wyld, D. C. (2009) ‘Moving to the cloud: An introduction
to cloud computing in government’, IBM Center for
the Business of Government.
Wyld, D. C. (2010) ‘Risk in the clouds?: Security issues
facing government use of cloud computing’,
Innovations in Computing Sciences and Software
Engineering, pp. 7-12.
Zhang, W. and Chen, Q. (2010) ‘From E-government to
C-government via cloud computing’, in E-Business
and E-Government (ICEE), 2010 International
Conference, pp. 679-682.