1 |
Kim, S.,Lee, S. and Hwang, H., “A Study of Factors Affecting Attitude Towards Using Mobile Cloud Service,” Journal of the Korea Industrial Information Systems Research, Vol. 18, No. 6, pp. 83-94, 2013.
DOI
|
2 |
Han, H., Yang, H-D. and Kim, K., "Research on Cloud Computing-based SME Information Platform Policy," Journal of the Korea Industrial Information Systems Research, Vol. 19, No. 5, pp. 117-128, 2014.
DOI
|
3 |
Digital Daily. 2015. http:;/ddaily.co.kr/cloud/news/article.html?no=127438
|
4 |
Park, S. and Koo, C., “A Study on End User's Intention to Use for Cloud Computing: Testing the Mediating Role of Key Constructs from UT AUT,” The Journal of Internet Electronic Commerce Research, Vol. 12, No. 3, pp. 141-162, 2012.
|
5 |
Kim, S. and Kim, G., “Understanding Organizational Behavior regarding Cloud Computing: Determinants Impacting on the Implementation Process of Cloud Computing and the Moderating Effect of Evolutional Leadership,” The Journal of Information Systems, Vol. 25, No. 4, pp. 37-61, 2016.
DOI
|
6 |
Kim, T., Yang, J. and Yang, H-D., “Economic Evaluation of Cloud Computing Investment Alternatives,” Journal of the Korea Industrial Information Systems Research, Vol. 16, No. 3, pp. 121-135, 2011.
DOI
|
7 |
Nam, S.H., Ahn, JH. and Yang, H-D., “The Effect of IT Service Outsourcing Project Risks on the Intention of Purchasing Real Options based on Transaction Cost Theory,” Asia pacific journal of information systems, Vol. 23, No. 2, pp. 40-66, 2013.
|
8 |
Nam, S., Kim, T. and Yang, H-D., “The Effect of Exogenous Risks Upon the Choice of Real Options in ERP Projects in Korea: An Empirical Approach,” The Journal of Information Systems, Vol. 22, No. 3, pp. 25-42, 2013.
DOI
|
9 |
Yang, H-D. and Kim, "The Effect of Cloud Service Risks on the Intention of Purchasing Real Options: Focusing on Public Cloud Service of Small and Medium-sized Enterprises," Information Systems Review, Vol. 17, No. 1, pp. 117-140, 2015.
DOI
|
10 |
Jurison, J., “The Role of Risk and Return m Information Technology Outsourcing Decisions,” Journal of Information Technology, Vol. 10, No. 4, pp. 239-247, 1995.
DOI
|
11 |
Willcocks, L., Lacity, M. and Kern, T., “Risk Mitigation m IT Outsourcing Strategy Revisited: Longitudinal Case Research at LISA,” Journal of Strategic Information Systems, Vol. 8, No. 3, pp. 285-314, 1999.
DOI
|
12 |
Lee, J. and Runge, J., “Adoption of Information Technology m Small Business: Testing Drivers of Adoption for Enterprises,” Journal of Computer Information Systems, Vol. 42, No. 1, pp. 44-57, 2016.
|
13 |
Hu, Q., Hart, P. and Cooke, D., “The Role of External and Internal Influences of Information Systems Security: A Neo-Institutional Perspective,” The Journal of Strategic Information Systems, Vol. 16, No. 2, pp. 153-172, 2007.
DOI
|
14 |
Thong, J.Y.L., “An Integrated Model of Information Systems Adoption in Small Businesses,” Journal of Management Information Systems, Vol. 15, No. 4, pp. 187-214, 1999.
DOI
|
15 |
Lacity, M.C. and Hirschheim, R., “The Information Systems Outsourcing Bandwagon,” Sloan Management Review, Vol. 35, No. 1, pp. 73-86, 1993.
|
16 |
Liang, H., Saraf, N., Hu, Q. and Xue, Y., “Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management,” MIS Quarterly, Vol. 31, No. 1, pp. 59-87, 2007.
DOI
|
17 |
Woltman, H., Feldstain, A., MacKay, l C., and Rocchi, M., “An Introduction to Hierarchical Linear Modeling,” Tutorials in Quantitative Methods for Psychology, Vol. 8, No. 1, pp. 52-69, 2012.
DOI
|
18 |
Raudenbush, S.W., “Educational Applications of Hierarchical Linear Models: a Review,” Journal of Educational Statistics, Vol. 13, No. 2, pp. 85-116, 1998.
DOI
|
19 |
Moon, Y., “The Effect of Strategic Recognition and Risks of IT Outsourcing on the Degree of Outsourcing,” Journal of the Korean Operations and Research and Management Science Society, Vol. 27, No. 3, pp. 21-40, 2002.
|
20 |
Seo, l & S. Chang. 2012. "중소기업 클라우드 서비스 도입의 탐색적 연구," 대한산업공학회/한국경영과학회 춘계공동학술대회.
|
21 |
Benaroch, M., Lichtenstein, Y. and Robinson, K, “Real Options in IT Risk Management: An Empirical Validation of Risk-Option Relationships,” MIS Quarterly, Vol. 20, No. 2, pp. 827-864, 2006.
|
22 |
Pennings, J.M.E. and Smidts, A., “Assessing the Construct Validity of Risk Attitude,” Management Science, Vol. 46, No. 10, pp. 1337-1348, 2000.
DOI
|
23 |
Nunally, J., Psychometric Methods, New York: McGraw-Hill, 1978.
|
24 |
Katz, M. L. and Shapiro, C., "Systems Competition and Network Effects," Journal of Economic Perspectives, Vol. 8, pp. 93-115, 1994.
DOI
|
25 |
Arthur, W. B. "Increasing Returns and the New World of Business," Harvard Business Review, pp. 100-109, 1996.
|
26 |
Hair, J. F., Anderson, R E., Tatham, R. L., and Black, W. C., Multivariate Data Analysis (5th ed), Printice-Hall, New Jersey, 1998.
|
27 |
Fornell, C. and Larcker, D., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, pp. 39-50, 1981.
DOI
|
28 |
Klein, K. J., and Kozlowski, S. W. J., Multilevel Theory, Research, and Methods in Organizations, San Francisco: JosseyBass, 2000.
|
29 |
Bliese, P. D., "Within-Group Agreement, Non-Independence, and Reliability: Implications for Data Aggregation and Analyses", in Klein, K.J. & Kozlowski, S.W.J. (Eds), Multilevel Theory, Research, and Methods in Organizations: Foundations, Extensions, and New Directions, San Francisco: Jossey-Bass, pp. 349-381, 2000.
|