{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:45:05Z","timestamp":1742978705618,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319072920"},{"type":"electronic","value":"9783319072937"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07293-7_4","type":"book-chapter","created":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T05:31:11Z","timestamp":1401687071000},"page":"37-48","source":"Crossref","is-referenced-by-count":2,"title":["Examing Significant Factors and Risks Affecting the Willingness to Adopt a Cloud\u2013Based CRM"],"prefix":"10.1007","author":[{"given":"Nga","family":"Le Thi Quynh","sequence":"first","affiliation":[]},{"given":"Jon","family":"Heales","sequence":"additional","affiliation":[]},{"given":"Dongming","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2308\/jis.2011.25.1.1","volume":"25","author":"J. Blaskovich","year":"2011","unstructured":"Blaskovich, J., Mintchik, N.: Information Technology Outsourcing: A Taxonomy of Prior Studies and Directions for Future Research. Journal of Information Systems\u00a025(1), 1\u201336 (2011)","journal-title":"Journal of Information Systems"},{"issue":"2","key":"4_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2308\/isys-50229","volume":"26","author":"F.A. Alali","year":"2012","unstructured":"Alali, F.A., Chia-Lun, Y.: Cloud Computing: Overview and Risk Analysis. Journal of Information Systems\u00a026(2), 13\u201333 (2012)","journal-title":"Journal of Information Systems"},{"doi-asserted-by":"crossref","unstructured":"Pearson, S.: Privacy, Security and Trust in Cloud Computing, in Technical Reports, HP: HP (2012)","key":"4_CR3","DOI":"10.1007\/978-1-4471-4189-1_1"},{"issue":"4","key":"4_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M. Armbrust","year":"2010","unstructured":"Armbrust, M., et al.: A View of Cloud Computing. Communications of the ACM\u00a053(4), 50\u201358 (2010)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Youseff, L., Butrico, M., Da Silva, D.: Toward a unified ontology of cloud computing. In: Grid Computing Environments Workshop, GCE 2008. IEEE (2008)","key":"4_CR5","DOI":"10.1109\/GCE.2008.4738443"},{"issue":"2","key":"4_CR6","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.dss.2009.07.006","volume":"48","author":"H.-S. Kim","year":"2010","unstructured":"Kim, H.-S., Kim, Y.-G., Park, C.-W.: Integration of firm\u2019s resource and capability to implement enterprise CRM: A case study of a retail bank in Korea. Decision Support Systems\u00a048(2), 313\u2013322 (2010)","journal-title":"Decision Support Systems"},{"issue":"4","key":"4_CR7","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.indmarman.2004.09.021","volume":"34","author":"G.J. Avlonitis","year":"2005","unstructured":"Avlonitis, G.J., Panagopoulos, N.G.: Antecedents and consequences of CRM technology acceptance in the sales force. Industrial Marketing Management\u00a034(4), 355\u2013368 (2005)","journal-title":"Industrial Marketing Management"},{"unstructured":"Efraim, T., Linda, V., Gregory, W.: Information Technology for Management, 9th edn. (2013)","key":"4_CR8"},{"issue":"1","key":"4_CR9","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S. Marston","year":"2011","unstructured":"Marston, S., et al.: Cloud computing \u2014 The business perspective. Decision Support Systems\u00a051(1), 176\u2013189 (2011)","journal-title":"Decision Support Systems"},{"issue":"2","key":"4_CR10","first-page":"117","volume":"9","author":"B. Iyer","year":"2010","unstructured":"Iyer, B., Henderson, J.C.: Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing. MIS Quarterly Executive\u00a09(2), 117\u2013131 (2010)","journal-title":"MIS Quarterly Executive"},{"issue":"1","key":"4_CR11","first-page":"51","volume":"11","author":"B. Iyer","year":"2012","unstructured":"Iyer, B., Henderson, J.C.: Business value from Clouds: Learning from Users. MIS Quarterly Executive\u00a011(1), 51\u201360 (2012)","journal-title":"MIS Quarterly Executive"},{"unstructured":"Fishbein, M., Ajzen, I.: Belief, attitude, intention and behavior: An introduction to theory and research (1975)","key":"4_CR12"},{"unstructured":"Davis Jr., F.D: A technology acceptance model for empirically testing new end-user information systems: Theory and results. Massachusetts Institute of Technology (1986)","key":"4_CR13"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V. Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science\u00a046(2), 186\u2013204 (2000)","journal-title":"Management Science"},{"issue":"5996","key":"4_CR15","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1126\/science.1185231","volume":"329","author":"D. Centola","year":"2010","unstructured":"Centola, D.: The Spread of Behavior in an Online Social Network Experiment. Science\u00a0329(5996), 1194\u20131197 (2010)","journal-title":"Science"},{"issue":"4","key":"4_CR16","doi-asserted-by":"publisher","first-page":"125","DOI":"10.2753\/JEC1086-4415110405","volume":"11","author":"D.-H. Park","year":"2007","unstructured":"Park, D.-H., Lee, J., Han, I.: The Effect of On-Line Consumer Reviews on Consumer Purchasing Intention: The Moderating Role of Involvement. International Journal of Electronic Commerce\u00a011(4), 125\u2013148 (2007)","journal-title":"International Journal of Electronic Commerce"},{"issue":"3","key":"4_CR17","doi-asserted-by":"publisher","first-page":"20","DOI":"10.2307\/1252308","volume":"58","author":"R.M. Morgan","year":"1994","unstructured":"Morgan, R.M., Shelby, D.H.: The Commitment-Trust Theory of Relationship Marketing. Journal of Marketing\u00a058(3), 20\u201338 (1994)","journal-title":"Journal of Marketing"},{"issue":"1","key":"4_CR18","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1080\/07421222.2004.11045792","volume":"21","author":"D. Gefen","year":"2004","unstructured":"Gefen, D.: What Makes an ERP Implementation Relationship Worthwhile: Linking Trust Mechanisms and ERP Usefulness. Journal of Management Information Systems\u00a021(1), 263\u2013288 (2004)","journal-title":"Journal of Management Information Systems"},{"unstructured":"Luhmann, N.: Familiarity, confidence, trust: Problems and alternatives. Trust: Making and Breaking Cooperative Relations 6, 94\u2013107 (2000)","key":"4_CR19"},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJCC.2013.050953","volume":"2","author":"J. Huang","year":"2013","unstructured":"Huang, J., Nicol, D.: Trust mechanisms for cloud computing. Journal of Cloud Computing\u00a02(1), 1\u201314 (2013)","journal-title":"Journal of Cloud Computing"},{"issue":"1","key":"4_CR21","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D. Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly\u00a027(1), 51\u201390 (2003)","journal-title":"MIS Quarterly"},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/B978-0-12-590241-0.50012-5","volume":"1","author":"L.S. Wrightsman","year":"1991","unstructured":"Wrightsman, L.S.: Interpersonal trust and attitudes toward human nature. Measures of Personality and Social Psychological Attitudes\u00a01, 373\u2013412 (1991)","journal-title":"Measures of Personality and Social Psychological Attitudes"},{"issue":"3","key":"4_CR23","doi-asserted-by":"crossref","first-page":"473","DOI":"10.5465\/amr.1998.926622","volume":"23","author":"D.H. McKnight","year":"1998","unstructured":"McKnight, D.H., Cummings, L.L., Chervany, N.L.: Initial Trust Formation in New Organizational Relationships. The Academy of Management Review\u00a023(3), 473\u2013490 (1998)","journal-title":"The Academy of Management Review"},{"issue":"6","key":"4_CR24","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1016\/S0305-0483(00)00021-9","volume":"28","author":"D. Gefen","year":"2000","unstructured":"Gefen, D.: E-commerce: the role of familiarity and trust. Omega\u00a028(6), 725\u2013737 (2000)","journal-title":"Omega"},{"unstructured":"Koehler, P., et al.: Cloud Services from a Consumer Perspective. In: AMCIS. Citeseer (2010)","key":"4_CR25"},{"unstructured":"Sitkin, S.B.: On the positive effects of legalization on trust. Research on Negotiation in Organizations 5, 185\u2013218 (1995)","key":"4_CR26"},{"unstructured":"Holmes, J.G.: Trust and the appraisal process in close relationships (1991)","key":"4_CR27"},{"issue":"3-4","key":"4_CR28","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.mcm.2010.03.037","volume":"53","author":"S.C. Misra","year":"2011","unstructured":"Misra, S.C., Mondal, A.: Identification of a company\u2019s suitability for the adoption of cloud computing and modelling its corresponding Return on Investment. Mathematical and Computer Modelling\u00a053(3-4), 504\u2013521 (2011)","journal-title":"Mathematical and Computer Modelling"},{"issue":"1","key":"4_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S. Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications\u00a034(1), 1\u201311 (2011)","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"4_CR30","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1177\/014920639101700108","volume":"17","author":"J. Barney","year":"1991","unstructured":"Barney, J.: Firm Resources and Sustained Competitive Advantage. Journal of Management\u00a017(1), 99 (1991)","journal-title":"Journal of Management"},{"issue":"1","key":"4_CR31","first-page":"66","volume":"82","author":"C.A. Nicolaou","year":"2012","unstructured":"Nicolaou, C.A., Nicolaou, A.I., Nicolaou, G.D.: Auditing in the Cloud: Challenges and Opportunities. CPA Journal\u00a082(1), 66\u201370 (2012)","journal-title":"CPA Journal"},{"unstructured":"Barwick, H.: Cloud computing still a security concern: CIOs, September 17-20 (2013), \n                    \n                      http:\/\/www.cio.com.au\/article\/526676\/cloud_computing_still_security_concern_cios\/?fp=16&fpid=1","key":"4_CR32"},{"unstructured":"Emison, J.M.: 9 vital questions on moving Apps to the Cloud, in InformationWeek Reports (2012)","key":"4_CR33"},{"unstructured":"Buttle, F.: Customer relationship management. Routledge","key":"4_CR34"},{"issue":"1","key":"4_CR35","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.dss.2011.07.007","volume":"52","author":"A. Benlian","year":"2011","unstructured":"Benlian, A., Hess, T.: Opportunities and risks of software-as-a-service: Findings from a survey of IT executives. Decision Support Systems\u00a052(1), 232\u2013246 (2011)","journal-title":"Decision Support Systems"},{"issue":"5","key":"4_CR36","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/1735223.1735242","volume":"53","author":"D. Durkee","year":"2010","unstructured":"Durkee, D.: Why cloud computing will never be free. Commun. ACM\u00a053(5), 62\u201369 (2010)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Dillon, T., Wu, C., Chang, E.: Cloud computing: Issues and challenges. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA). IEEE (2010)","key":"4_CR37","DOI":"10.1109\/AINA.2010.187"},{"issue":"2","key":"4_CR38","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.emj.2009.04.010","volume":"28","author":"D.J. Finnegan","year":"2010","unstructured":"Finnegan, D.J., Currie, W.L.: A multi-layered approach to CRM implementation: An integration perspective. European Management Journal\u00a028(2), 153\u2013167 (2010)","journal-title":"European Management Journal"},{"issue":"9","key":"4_CR39","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/2330667.2330685","volume":"55","author":"G. Garrison","year":"2012","unstructured":"Garrison, G., Kim, S., Wakefield, R.L.: Success Factors for Deploying Cloud Computing. Communications of the ACM\u00a055(9), 62\u201368 (2012)","journal-title":"Communications of the ACM"},{"issue":"12","key":"4_CR40","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1002\/smj.274","volume":"23","author":"P.W. Roberts","year":"2002","unstructured":"Roberts, P.W., Dowling, G.R.: Corporate Reputation and Sustained Superior Financial Performance. Strategic Management Journal\u00a023(12), 1077\u20131093 (2002)","journal-title":"Strategic Management Journal"},{"unstructured":"AICPA, Audit Risk and Materiality in Conducting an Audit. Statement on Auditing Standards No.107, AICPA (2006)","key":"4_CR41"},{"issue":"6","key":"4_CR42","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1287\/mksc.1050.0165","volume":"25","author":"B. Sun","year":"2006","unstructured":"Sun, B.: Technology Innovation and Implications for Customer Relationship Management. Marketing Science\u00a025(6), 594\u2013597 (2006)","journal-title":"Marketing Science"},{"unstructured":"Yin, R.K.: Case study research: Design and methods, vol.\u00a05. Sage (2003)","key":"4_CR43"}],"container-title":["Lecture Notes in Computer Science","HCI in Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07293-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:22:28Z","timestamp":1582413748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07293-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319072920","9783319072937"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07293-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}