{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:37:36Z","timestamp":1743017856648,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811623790"},{"type":"electronic","value":"9789811623806"}],"license":[{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2380-6_61","type":"book-chapter","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:02:47Z","timestamp":1631782967000},"page":"701-710","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Building a Conceptual Model for the Acceptance of Drones in Saudi Arabia"],"prefix":"10.1007","author":[{"given":"Roobaea","family":"Alroobaea","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"key":"61_CR1","unstructured":"Agapiou A (2012) Drones in construction: an international review of the legal and regulatory landscape"},{"issue":"4","key":"61_CR2","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1287\/trsc.2017.0791","volume":"52","author":"N Agatz","year":"2018","unstructured":"Agatz N, Bouman P, Schmidt M (2018) Optimization approaches for the traveling salesman problem with drone. Transp Sci 52(4):965\u2013981","journal-title":"Transp Sci"},{"key":"61_CR3","doi-asserted-by":"crossref","unstructured":"Alonazi M, Beloff N, White M (2019) Developing a model and validating an instrument for measuring the adoption and utilisation of mobile government services adoption in saudi arabia. In: 2019 Federated conference on computer science and information systems (FedCSIS), pp 633\u2013637. IEEE","DOI":"10.15439\/2019F43"},{"key":"61_CR4","doi-asserted-by":"crossref","unstructured":"Alqahtani MA, AlRoobaea RS, Mayhew PJ (2014) Building a conceptual framework for mobile transaction in Saudi Arabia: A user\u2019s perspective. In: 2014 science and information conference, pp 967\u2013973. IEEE","DOI":"10.1109\/SAI.2014.6918303"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"Ashour R, Taha T, Mohamed F, Hableel E, Kheil YA, Elsalamouny M, Kadadha M, Rangan K, Dias J, Seneviratne L, Cai G (2016) Site inspection drone: A solution for inspecting and regulating construction sites. In: 2016 IEEE 59th International midwest symposium on circuits and systems (MWSCAS), pp 1\u20134","DOI":"10.1109\/MWSCAS.2016.7870116"},{"issue":"5","key":"61_CR6","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1007\/s11948-015-9720-7","volume":"22","author":"P Boucher","year":"2016","unstructured":"Boucher P (2016) \u2018you wouldn\u2019t have your granny using them\u2019: drawing boundaries between acceptable and unacceptable applications of civil drones. Sci Engi Ethics 22(5):1391\u20131418","journal-title":"Sci Engi Ethics"},{"key":"61_CR7","doi-asserted-by":"crossref","unstructured":"Budiharto W, Chowanda A, Gunawan AAS, Irwansyah E, Suroso JS (2019) A review and progress of research on autonomous drone in agriculture, delivering items and geographical information systems (gis). In: 2019 2nd world symposium on communication engineering (WSCE), pp 205\u2013209. IEEE","DOI":"10.1109\/WSCE49000.2019.9041004"},{"key":"61_CR8","doi-asserted-by":"publisher","first-page":"90225","DOI":"10.1109\/ACCESS.2020.2992341","volume":"8","author":"V Chamola","year":"2020","unstructured":"Chamola V, Hassija V, Gupta V, Guizani M (2020) A comprehensive review of the covid-19 pandemic and the role of iot, drones, ai, blockchain, and 5g in managing its impact. IEEE Access 8:90225\u201390265","journal-title":"IEEE Access"},{"key":"61_CR9","doi-asserted-by":"crossref","unstructured":"Choudhury S, Solovey K, Kochenderfer MJ, Pavone M (2020) Efficient large-scale multi-drone delivery using transit networks. In: 2020 IEEE international conference on robotics and automation (ICRA), pp 4543\u20134550. IEEE","DOI":"10.1109\/ICRA40945.2020.9197313"},{"issue":"3","key":"61_CR10","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.clsr.2014.03.007","volume":"30","author":"R Clarke","year":"2014","unstructured":"Clarke R, Moses LB (2014) The regulation of civilian drones\u2019 impacts on public safety. Comput Law Secur Rev 30(3):263\u2013285","journal-title":"Comput Law Secur Rev"},{"issue":"1\u20134","key":"61_CR11","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s10846-013-9895-6","volume":"73","author":"H Ergezer","year":"2014","unstructured":"Ergezer H, Leblebicio\u011flu K (2014) 3d path planning for multiple uavs for maximum information collection. Intell Robot Syst 73(1\u20134):737\u2013762","journal-title":"Intell Robot Syst"},{"key":"61_CR12","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.comcom.2020.01.021","volume":"152","author":"E Ever","year":"2020","unstructured":"Ever E, Gemikonakli E, Nguyen HX, Al-Turjman F, Yazici A (2020) Performance evaluation of hybrid disaster recovery framework with d2d communications. Comput Commun 152:81\u201392","journal-title":"Comput Commun"},{"issue":"3","key":"61_CR13","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.1016\/j.dss.2006.03.009","volume":"42","author":"S Hong","year":"2006","unstructured":"Hong S, Thong JY, Tam KY (2006) Understanding continued information technology usage behavior: a comparison of three models in the context of mobile internet. Decision Support Syst 42(3):1819\u20131834","journal-title":"Decision Support Syst"},{"key":"61_CR14","doi-asserted-by":"crossref","unstructured":"Huang C, Yang Z, Kong Y, Chen P, Yang X, Cheng KTT (2019) Learning to capture a film-look video with a camera drone. In: 2019 international conference on robotics and automation (ICRA), pp 1871\u20131877. IEEE","DOI":"10.1109\/ICRA.2019.8793915"},{"key":"61_CR15","doi-asserted-by":"crossref","unstructured":"Hutton C (2019) Augmented reality interfaces for semi-autonomous drones. In: 2019 IEEE conference on virtual reality and 3D user Interfaces (VR), pp 1361\u20131362","DOI":"10.1109\/VR.2019.8797893"},{"key":"61_CR16","doi-asserted-by":"crossref","unstructured":"Ilgi GS, Ever YK (2020) Critical analysis of security and privacy challenges for the internet of drones: a survey. In: Drones in smart-cities, pp 207\u2013214","DOI":"10.1016\/B978-0-12-819972-5.00011-2"},{"key":"61_CR17","doi-asserted-by":"crossref","unstructured":"Kim SJ, Jeong Y, Park S, Ryu K, Oh G (2018) A survey of drone use for entertainment and avr (augmented and virtual reality). In: Augmented reality and virtual reality, pp 339\u2013352. Springer","DOI":"10.1007\/978-3-319-64027-3_23"},{"key":"61_CR18","doi-asserted-by":"publisher","unstructured":"Krichen M, Alroobaea R (2019) Towards optimizing the placement of security testing components for internet of things architectures. In: 2019 IEEE\/ACS 16th international conference on computer systems and applications (AICCSA), pp\u00a01\u20132. https:\/\/doi.org\/10.1109\/AICCSA47632.2019.9035301","DOI":"10.1109\/AICCSA47632.2019.9035301"},{"key":"61_CR19","doi-asserted-by":"crossref","unstructured":"Krichen M (2019) Improving formal verification and testing techniques for internet of things and smart cities. Mobile networks and applications, pp 1\u201312","DOI":"10.1007\/s11036-019-01369-6"},{"key":"61_CR20","doi-asserted-by":"crossref","unstructured":"Krichen M, Alroobaea R, Lahami M (2019) Towards a runtime standard-based testing framework for dynamic distributed information systems","DOI":"10.5220\/0007772101210129"},{"key":"61_CR21","doi-asserted-by":"crossref","unstructured":"Krichen M, Cheikhrouhou O, Lahami M, Alroobaea R, Ma\u00e2lej AJ (2017) Towards a model-based testing framework for the security of internet of things for smart city applications. International conference on smart cities. infrastructure, technologies and applications. Springer, Cham, pp 360\u2013365","DOI":"10.1007\/978-3-319-94180-6_34"},{"key":"61_CR22","doi-asserted-by":"crossref","unstructured":"Krichen M, Lahami M, Cheikhrouhou O, Alroobaea R, Ma\u00e2lej AJ (2020) Security testing of internet of things for smart city applications: a formal approach. In: Smart infrastructure and applications, pp 629\u2013653. Springer, Cham","DOI":"10.1007\/978-3-030-13705-2_26"},{"issue":"1","key":"61_CR23","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2017.1700390","volume":"56","author":"C Lin","year":"2018","unstructured":"Lin C, He D, Kumar N, Choo KKR, Vinel A, Huang X (2018) Security and privacy for the internet of drones: Challenges and solutions. IEEE Commun Mag 56(1):64\u201369","journal-title":"IEEE Commun Mag"},{"issue":"7","key":"61_CR24","doi-asserted-by":"publisher","first-page":"3339","DOI":"10.1109\/TVT.2013.2257188","volume":"62","author":"X Lin","year":"2013","unstructured":"Lin X, Li X (2013) Achieving efficient cooperative message authentication in vehicular ad hoc networks. Trans Vehic Technol 62(7):3339\u20133348","journal-title":"Trans Vehic Technol"},{"key":"61_CR25","doi-asserted-by":"crossref","unstructured":"Merkert R, Bushell J (2020) Managing the drone revolution: a systematic literature review into the current use of airborne drones and future strategic directions for their effective control. J Air Transp Manag 89:101929","DOI":"10.1016\/j.jairtraman.2020.101929"},{"key":"#cr-split#-61_CR26.1","unstructured":"Mojib EBS, Haque AKMB, Raihan MN, Rahman M, Alam FB (2019) A novel approach for border security"},{"key":"#cr-split#-61_CR26.2","unstructured":"surveillance drone with live intrusion monitoring. In: 2019 IEEE international conference on robotics, automation, artificial-intelligence and internet-of-things (RAAICON), pp 65-68"},{"issue":"1","key":"61_CR27","first-page":"51","volume":"1","author":"AM Momani","year":"2017","unstructured":"Momani AM, Jamous M (2017) The evolution of technology acceptance theories. Int J Contemp Comput Res (IJCCR) 1(1):51\u201358","journal-title":"Int J Contemp Comput Res (IJCCR)"},{"key":"61_CR28","doi-asserted-by":"crossref","unstructured":"Momani AM, Jamous MM, Hilles SM (2018) Technology acceptance theories: review and classification. In: Technology adoption and social issues: concepts, methodologies, tools, and applications, pp 1\u201316. IGI Global","DOI":"10.4018\/978-1-5225-5201-7.ch001"},{"issue":"8","key":"61_CR29","doi-asserted-by":"publisher","first-page":"1647","DOI":"10.1109\/LCOMM.2016.2578312","volume":"20","author":"M Mozaffari","year":"2016","unstructured":"Mozaffari M, Saad W, Bennis M, Debbah M (2016) Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage. IEEE Commun Lett 20(8):1647\u20131650","journal-title":"IEEE Commun Lett"},{"issue":"3","key":"61_CR30","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1109\/COMST.2019.2902862","volume":"21","author":"M Mozaffari","year":"2019","unstructured":"Mozaffari M, Saad W, Bennis M, Nam YH, Debbah M (2019) A tutorial on uavs for wireless networks: applications, challenges, and open problems. IEEE Commun Surv Tutorials 21(3):2334\u20132360","journal-title":"IEEE Commun Surv Tutorials"},{"key":"61_CR31","doi-asserted-by":"crossref","unstructured":"Murphy RR (2014) Disaster robotics. MIT Press","DOI":"10.7551\/mitpress\/9407.001.0001"},{"key":"61_CR32","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.trc.2015.03.005","volume":"54","author":"CC Murray","year":"2015","unstructured":"Murray CC, Chu AG (2015) The flying sidekick traveling salesman problem: optimization of drone-assisted parcel delivery. Transp Res Part C: Emerg Technol 54:86\u2013109","journal-title":"Transp Res Part C: Emerg Technol"},{"key":"61_CR33","doi-asserted-by":"crossref","unstructured":"Ni J, Lin X, Zhang K, Shen X (2016) Privacy-preserving real-time navigation system using vehicular crowdsourcing. In: 2016 IEEE 84th vehicular technology Conference (VTC-Fall), pp\u00a01\u20135. IEEE","DOI":"10.1109\/VTCFall.2016.7881177"},{"issue":"4","key":"61_CR34","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1002\/net.21818","volume":"72","author":"A Otto","year":"2018","unstructured":"Otto A, Agatz N, Campbell J, Golden B, Pesch E (2018) Optimization approaches for civil applications of unmanned aerial vehicles (uavs) or aerial drones: a survey. Networks 72(4):411\u2013458","journal-title":"Networks"},{"key":"61_CR35","doi-asserted-by":"crossref","unstructured":"Rashid MT, Zhang DY, Wang D (2020) Socialdrone: an integrated social media and drone sensing system for reliable disaster response. In: IEEE INFOCOM 2020\u2014IEEE Conference on computer communications, pp 218\u2013227","DOI":"10.1109\/INFOCOM41043.2020.9155522"},{"issue":"2","key":"61_CR36","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.compeleceng.2011.01.009","volume":"37","author":"R Roman","year":"2011","unstructured":"Roman R, Alcaraz C, Lopez J, Sklavos N (2011) Key management systems for sensor networks in the context of the internet of things. Comput Electr Eng 37(2):147\u2013159","journal-title":"Comput Electr Eng"},{"issue":"3","key":"61_CR37","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1515\/boku-2017-0012","volume":"68","author":"AG Silva","year":"2018","unstructured":"Silva AG, Canavari M, Sidali KL (2018) A technology acceptance model of common bean growers\u2019 intention to adopt integrated production in the brazilian central region. Die Bodenkultur: J Land Manag Food Environ 68(3):131\u2013143","journal-title":"Die Bodenkultur: J Land Manag Food Environ"},{"issue":"2","key":"61_CR38","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh V, Davis FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag Sci 46(2):186\u2013204","journal-title":"Manag Sci"},{"key":"61_CR39","doi-asserted-by":"crossref","unstructured":"Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Quart, pp. 425\u2013478","DOI":"10.2307\/30036540"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2380-6_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:31:21Z","timestamp":1631784681000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2380-6_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,17]]},"ISBN":["9789811623790","9789811623806"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2380-6_61","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,17]]},"assertion":[{"value":"17 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}