1 |
K. Y. Lee, T. H. Park, J. I. Lin, "A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office", Journal of Korea Institute of Information Security & Cryptology, Vol. 21, No. 5, pp. 109-127, Oct. 2011.
|
2 |
H. Tian, D. Liu, J. Lin, Y. Jin, "What Drives Mobile Office Service? A Revised Technology Acceptance Model Based on the Characteristics of Wireless Mobile Office Technology", 2010 International Conference of Information Science and Management Engineering, Vol. 1, pp. 166-170, Aug. 2011.
|
3 |
G. Li, Y. Jiang, A. Hu, "Study on Application of TNC Technology in Mobile Office", 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 799-803, Nov. 2010.
|
4 |
Y. Zhiyu, Z. Linwei, L. Wenna, "Study on Security Strategy of Wireless Mobile Office System ", 2009. ETCS '09. First International Workshop on Education Technology and Computer Science, pp. 495-498, Mar. 2009.
|
5 |
Y. Jiang, G. Li, A. Hu, "Mobile Office Security Technology for WLAN ", 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 795-798, Nov. 2010.
|
6 |
T. Wang, J. Zhang, L. Li, J. Jin, "Design and realization of the traffic police mobile office system based on Android ", 2011 19th International Conference on Geoinformatics, pp. 1-5, Jun. 2011.
|
7 |
C. Martin, H. J. Bohme, H. -M. Gross, "Conception and realization of a multi-sensory interactive mobile office guide ", 2004 IEEE International Conference on Systems, Man and Cybernetics, Vol. 6, pp. 5368-5373, Oct. 2004.
|
8 |
Z. Ahmed, H. Jamal, R. Mehboob, S. Khan, M. Shahbaz, "Secure cognitive mobile hotspot ", IEEE Transactions on Consumer Electronics, Vol. 56, No.2, pp. 606-612, 2012.
DOI
|
9 |
J. Anderson, D. W. Gerbing, "Structure Equation Modeling in Practive: A Review and Recommended Two-step Approach". Psychological Bulletin, vol. 103, No.3, pp. 411-423. 1998.
DOI
|
10 |
F. D. Davis, R. P. Bagozzi, P. R. Warshaw, "User acceptance of computer technology: A comparison of two theoretical models", Management Science, Vol. 35, No. 8, pp.982-1003, 1989.
DOI
ScienceOn
|
11 |
D.K.W.Chiu, S.C.Cheung, E. Kafeza, and H.F.Leung. "A Three-Tier View Methodology for adapting M-services", IEEE Transactions on Systems, Man and Cybernetics, Part A, Vol. 33, No. 6, pp. 725-741,2003.
|
12 |
J Jing, A S Helal. "Client-server computing in Mobile Environments ", ACM Computing survey, Vol. 31, No. 2, pp.117-157, 1993.
|
13 |
K.van Hee, N.Sidorova. T. "Inheritance of workflows: an approach to tackling problems related to change. Theoretical computer science", Vol. 270, No.1-2, pp.125-203, 2002.
DOI
ScienceOn
|
14 |
K. Mathieson, E. Peacock, W. ChinW, "Extending the technology acceeptance model: the influence of perceived user resources", DATABASE, Vol. 32, No. 3, pp. 86-112, 2001.
|
15 |
Yankee Group. "Mobile workers number almost 50 million", Business Communications Review,2005, Vol. 35, No. 8 pp. 8-12, 2005.
|