References
- CISCO. "Mobility: Transforming the Internet for the future," In CISCO Reports. Retrieved January 9, 2023, from https://www.cisco.com/c/dam/en/us/solutions/collateral/executive-perspectives/annual-internet-report/air-executive-summary-pgr-mobility.pdf
- H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: Architecture, applications, and approaches," Wireless Communications and Mobile Computing, vol. 13, no. 18, pp. 1587-1611, 2013. https://doi.org/10.1002/wcm.1203
- M. Almaiah and A. Al-Khasawneh, "Investigating the main determinants of mobile cloud computing adoption in university campus," Education and Information Technologies, vol. 25, pp. 3087-3107, 2020. https://doi.org/10.1007/s10639-020-10120-8
- W. Al-Ghaith, "Extending protection motivation theory to understand security determinants of anti-virus software usage on mobile devices," International Journal of Computers, vol. 10, pp. 125-138, 2016.
- S. Furnell and N. Clarke, "Power to the people? The evolving recognition of human aspects of security," Computers & Security, vol. 31, no. 8, pp. 983-988, 2012. https://doi.org/10.1016/j.cose.2012.08.004
- R. Willison and M. Warkentin, "Beyond deterrence: An expanded view of employee computer abuse," MIS Quarterly, vol. 37, no. 1, pp. 1-20, 2013. https://doi.org/10.25300/MISQ/2013/37.1.01
- S. Abraham and I. Chengalur-Smith, "An overview of social engineering malware: Trends, tactics, and implications," Technology in Society, vol. 32, no. 3, pp. 183-196, 2010. https://doi.org/10.1016/j.techsoc.2010.07.001
- M. Maray and J. Shuja, "Computation offloading in mobile cloud computing and mobile edge computing: survey, taxonomy, and open issues." Mobile Information Systems, 2022.
- J. Wan, C. Zou, S. Ullah, C. Lai, M. Zhou and X. Wang, "Cloud-enabled wireless body area networks for pervasive healthcare," IEEE Network, vol. 27, no. 5. pp.56-61, 2013. https://doi.org/10.1109/MNET.2013.6616116
- X. Jin, W. Hua, Z. Wang and Y. Chen, "A survey of research on computation offloading in mobile cloud computing," Wireless Networks, vol. 28, no. 4, pp.1563-1585, 2022.
- M. I. Sahu and U. Pandey, ''Mobile cloud computing: Issues and challenges,'' in Proc. Int. Conf. Adv. Comput., Commun. Control Netw. (ICAC-CCN), Oct. 2018, pp. 247_250.
- A.S. Al-Ahmad, H. Kahtan, F. Hujainah and H.A. Jalab, "Systematic literature review on penetration testing for mobile cloud computing applications," IEEE Access, VOL. 7, pp. 173524-173540, 2019. https://doi.org/10.1109/ACCESS.2019.2956770
- R. W. Rogers, "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal Of Psychology, vol. 91, no. 1, pp. 93-114, 1975. https://doi.org/10.1080/00223980.1975.9915803
- R. W. Rogers, "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation," in Social Psychophysiology, New York, Guilford Press, 1983, p. 153-176.
- W. Al-Ghaith, "Extending protection motivation theory to understand security determinants of anti-virus software usage on mobile devices," International Journal of Computers, vol. 10, pp. 125-138, 2016.
- S. Milne, P. Sheeran and S. Orbell, "Prediction and intervention in health-related behavior: a meta-analytic of protection motivation theory," Journal of Applied Social Psychology, vol. 30, no. 1, p. 106-143, 2000. https://doi.org/10.1111/j.1559-1816.2000.tb02308.x
- B. T. McClendon and S. Prentice-Dunn, "Reducing skin cancer risk: an intervention based on protection motivation theory," Journal of Health Psychology, vol. 6, p. 321-328, 2001. https://doi.org/10.1177/135910530100600305
- C. Pechimann, G. Zhao, M. E. Goldberg and E. T. Reibling, "What to convey in antismoking advertisements for adolescents: the use of protection motivation theory to identify effective message theme," Journal of Marketing, vol. 67, no. April, p. 1-18, 2003. https://doi.org/10.1509/jmkg.67.2.1.18607
- H. M. Alnajrani and A. A. Norman, "The effects of applying privacy by design to preserve privacy and personal data protection in mobile cloud computing: An exploratory study," Symmetry, vol. 12, pp. 2039, 2020.
- H. R. Nikkhah, V. Grover and R. Sabherwal, "Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers," Information & Computer Security, vol. ahead-of-print, no. ahead-of-print, 2023.
- R. Palanisamy and Y. Shi, "Users' attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China," Information & Computer Security, vol. 31, no. 1, pp. 65-87, 2023. https://doi.org/10.1108/ICS-03-2022-0048
- M. Al-Emran, M. N. Al-Nuaimi, I. Arpaci, M. A. , Al-Sharafi and B. Anthony Jnr, "Towards a wearable education: Understanding the determinants affecting students' adoption of wearable technologies using machine learning algorithms," Education and Information Technologies, vol. 28, no. 3, pp. 2727-2746, 2023.
- H. Al-Samarraie and N. Saeed, "A systematic review of cloud computing tools for collaborative learning: Opportunities and challenges to the blended-learning environment," Computers & Education, vol. 124, pp. 77-91, 2018. https://doi.org/10.1016/j.compedu.2018.05.016
- K. Kumar, D. Liu and L. Carter, "Understanding the adoption of digital conferencing tools: Unpacking the impact of privacy concerns and incident response efficacy," Computers & Security, vol.132, pp. 103375, 2023.
- Y. Lee and K. R. Larsen, "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," European Journal of Information Systems, vol. 18, pp. 177-187, 2009. https://doi.org/10.1057/ejis.2009.11
- J. H. Wu and S. C. Wang, "What drives mobile commerce? An empirical evaluation of the revised technology acceptance model," Information & Management, vol. 42, no. 5, p. 719-729, 2005. https://doi.org/10.1016/j.im.2004.07.001
- J. L. Reardon and E. Davidson, "An organizational learning perspective on the assimilation of electronic medical records among small physician practices.," European Journal of Information Systems, vol. 16, no. 6, pp. 681-694, 2007. https://doi.org/10.1057/palgrave.ejis.3000714
- D. Marikyan, S. Papagiannidis, O. F. Rana and R. Ranjan, "Blockchain adoption: A study of cognitive factors underpinning decision making," Computers in Human Behavior, vol. 131, pp. 107207, 2022.
- M. Al-Emran, A. Granic, M. A. Al-Sharafi, N. Ameen and M. Sarrab, "Examining the roles of students' beliefs and security concerns for using smartwatches in higher education," Journal of Enterprise Information Management, vol. 34, no. 4, pp. 1229-1251, 2021. https://doi.org/10.1108/JEIM-02-2020-0052
- W. Al-Ghaith, "Understanding Social Network Usage: Impact of Co-Presence, Intimacy, and Immediacy," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 6, no. 8, pp. 99-111, 2015. https://doi.org/10.14569/IJACSA.2015.060813
- B. Sheppard, J. Hartwick and P. Warshaw, "The theory of reasoned action: a meta-analysis of past research with recommendations for modifications and future research," Journal of Consumer Research, vol. 15, no. 3, p. 325-343, 1988. https://doi.org/10.1086/209170
- S. Taylor and P. A. Todd, "Understanding information technology usage: A test of competing models," Information Systems Research, vol. 6, no. 2, pp. 144-176, 1995. https://doi.org/10.1287/isre.6.2.144
- L. Chen, L. M. Gillenson and L. D. Sherrell, "Consumer acceptance of virtual stores: a theoretical model and critical success factors for virtual stores," ACM SIGMIS Database, vol. 35, no. 2, pp. 8-31, 2004. https://doi.org/10.1145/1007965.1007968
- W. Al-Ghaith, "Using the Theory of Planned Behavior to Determine the Social Network Usage Behavior in Saudi Arabia," International Journal of Research in Computer Science, vol. 5, no. 1, pp. 1-8, 2015.
- E. Bell, A. Bryman and B. Harley, Business research methods. Oxford university press, 2022.
- W. G. Zikmund, Business research methods (7th ed.), Cincinnati, OH: Thomson, 2003.
- I. M. Y. Woon, G. W. Tan and R. T. Low, "A protection motivation theory approach to home wireless security," in The Twenty-Sixth International Conference on Information Systems (Avison, D., Galletta, D., & DeGross, J., Eds), Las Vegas, 2005.
- V. Venkatesh, M. Morris, M. G. Rris, G. B. Davis and F. D. Davis, "User acceptance of information technology: toward a unified view," MIS Quarterly, vol. 27, no. 3, p. 425-478, 2003. https://doi.org/10.2307/30036540
- G. A. Marcoulides and C. Saunders, "Editor's comments: PLS: a silver bullet?," MIS quarterly, pp. iii-ix, 2006.
- K. K. K. Wong, "Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS," Marketing Bulletin, vol. 24, no. 1, pp. 1-32, 2013.
- G. Premkumar and K. Ramamurthy, "The role of Interorganizational and organizational factors of the decision mode for adoption of interorganizational systems," Decision Science, vol. 26, no. 3, pp. 303-336, 1995. https://doi.org/10.1111/j.1540-5915.1995.tb01431.x
- A. L. Comrey and H. B. Lee, A first course in factor analysis, L., NJ: Erlbaum Associates, 1992.
- H. B. Asher, Causal modeling, Newbury Park: Sage University Press, 1983.
- M. Lee, "Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit," Electronic Commerce Research and Applications, vol. 8, no. 3, pp. 130-141, 2009. https://doi.org/10.1016/j.elerap.2008.11.006
- W. Al-Ghaith, "Understanding Social Network Usage: Impact of Co-Presence, Intimacy, and Immediacy," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 6, no. 8, pp. 99-111, 2015. https://doi.org/10.14569/IJACSA.2015.060813