Page 230 - Trust in ICT 2017
P. 230
3 Trust in ICT
[b-Ahmed] Ahmed, A., Bakar, K.A., Channa, M.I., Haseeb, K. and Khan, A.W. (2015), A survey on
trust based detection and isolation of malicious nodes in ad-hoc and sensor networks,
Frontiers of Computer Science, Vol. 9, No. 2, April, pp. 280-296.
[b-Sherchan] Sherchan, W., Nepal, S. and Paris, C. (2013), A Survey of trust in social networks, ACM
Computing Surveys, Vol. 45, No. 4, August, pp. 47-79.
[b-EU-Safeharbor] EU Safe Harbor, http://www.export.gov/safeharbor/eu/eg_main_018476.asp
[b-Yoo-2012] Yoo, Y., Boland, R.J., Lyytinen, K. and Majchrzak, A. (2012), Organizing for Innovation
in the Digitized World, Organization Science, Vol.23, No.5, October, pp. 1398-1408.
[b-Yoo-2010] Yoo, Y., Henfridsson, O. and Lyytinen, K. (2010). Research commentary: The new
organizing logic of digital innovation: an agenda for information systems research,
Information Systems Research, Vol.21, No. 4, June, pp. 724-735.
[b-Eisenmann] Eisenmann, T., Parker, G., and Van Alstyne, M. W. (2006). Strategies for two-sided
markets. Harvard business review, Vol.84, No.10, October, pp. 92-104.
[b-Gawer] Gawer, A. (Eds.) (2009). Platforms, markets and innovation, Cheltenham, UK: Edward
Elgar Publishing.
[b-Sandberg] Sandberg, J., Holmstrom, J. and Lyytinen, K. (2013). Platform change: theorizing the
evolution of hybrid product platforms in process automation, In Platform Strategy
Research Symposium. Boston University, Boston, MA.
[b-Mayer] Mayer, R. C., Davis, J. H. and Schoorman, F. D. (1995). An integrative model of
organizational trust, Academy of management review, Vol.20, No. 3, July, pp. 709-
734.
[b-Gilson] Internet of Things Lacks Safety Today, Opening Door to Major Threats Tomorrow,
Warns OTA. Online Trust Alliance. Retrieved from https://otalliance.org/news-
events/press-releases/internet-things-lacks-safety-today-opening-door-major-
threats-tomorrow
[b-OTA] OTA IoT Trust Framework – Pre-Release Draft. Retrieved from
https://otalliance.org/system/files/files/initiative/documents/iot_trust_framework_l
astcall.pdf
[b-TCG 2013] TCG Published. (2013, October). Architect’s Guide: Cybersecurity. TCG Published.
Retrieved from
http://www.trustedcomputinggroup.org/files/resource_files/CA36D107-1A4B-B294-
D08829372D5796E1/Architects Guide Cybersecurity.pdf
[b-Leigh Ann Gilson] Leigh Ann Gilson. (2015). Internet of Things Lacks Safety Today, Opening Door to
Major Threats Tomorrow, Warns OTA. Online Trust Alliance. Retrieved from
https://otalliance.org/news-events/press-releases/internet-things-lacks-safety-
today-opening-door-major-threats-tomorrow
[b-TCG 2015] TCG Published. (2015, September 14). Guidance for Securing IoT Using TCG
Technology. 1.1. TCG Published. Retrieved from
https://www.trustedcomputinggroup.org/files/resource_files/CD35B517-1A4B-B294-
D0A08D30868AB3D1/TCG_Guidance_for_Securing_IoT_1_0r21.pdf
[b-Christensen] Christensen, Clayton M. (2014). Disruptive Innovation. In: Soegaard, Mads and Dam,
Rikke Friis (eds.). The Encyclopedia of Human-Computer Interaction, 2nd Ed. Aarhus,
Denmark: The Interaction Design Foundation.
[b-McKnight 2002] McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validatingt trust
measures for e-commerce: An integrative typology. Information systems research,
13(3), 334-359.
222