Page 230 - Trust in ICT 2017
P. 230

3                                                    Trust in ICT



            [b-Ahmed]           Ahmed, A., Bakar, K.A., Channa, M.I., Haseeb, K. and Khan, A.W. (2015), A survey on
                                trust based detection and isolation of malicious nodes in ad-hoc and sensor networks,
                                Frontiers of Computer Science, Vol. 9, No. 2, April, pp. 280-296.
            [b-Sherchan]        Sherchan, W., Nepal, S. and Paris, C. (2013), A Survey of trust in social networks, ACM
                                Computing Surveys, Vol. 45, No. 4, August, pp. 47-79.
            [b-EU-Safeharbor]   EU Safe Harbor, http://www.export.gov/safeharbor/eu/eg_main_018476.asp

            [b-Yoo-2012]        Yoo, Y., Boland, R.J., Lyytinen, K. and Majchrzak, A. (2012), Organizing for Innovation
                                in the Digitized World, Organization Science, Vol.23, No.5, October, pp. 1398-1408.

            [b-Yoo-2010]        Yoo, Y., Henfridsson, O. and Lyytinen, K. (2010). Research commentary: The new
                                organizing logic of digital innovation: an agenda for information systems research,
                                Information Systems Research, Vol.21, No. 4, June, pp. 724-735.

            [b-Eisenmann]       Eisenmann, T., Parker, G., and Van Alstyne, M. W. (2006). Strategies for two-sided
                                markets. Harvard business review, Vol.84, No.10, October, pp. 92-104.

            [b-Gawer]           Gawer, A. (Eds.) (2009). Platforms, markets and innovation, Cheltenham, UK: Edward
                                Elgar Publishing.

            [b-Sandberg]        Sandberg, J., Holmstrom, J. and Lyytinen, K. (2013). Platform change: theorizing the
                                evolution of hybrid product platforms in process automation, In Platform Strategy
                                Research Symposium. Boston University, Boston, MA.

            [b-Mayer]           Mayer, R. C., Davis, J. H. and Schoorman, F. D. (1995). An integrative model of
                                organizational trust, Academy of management review, Vol.20, No. 3, July, pp. 709-
                                734.
            [b-Gilson]          Internet of Things Lacks Safety Today, Opening Door to Major Threats Tomorrow,
                                Warns OTA. Online Trust Alliance. Retrieved from https://otalliance.org/news-
                                events/press-releases/internet-things-lacks-safety-today-opening-door-major-
                                threats-tomorrow

            [b-OTA]             OTA IoT Trust Framework – Pre-Release Draft. Retrieved from
                                https://otalliance.org/system/files/files/initiative/documents/iot_trust_framework_l
                                astcall.pdf

            [b-TCG 2013]        TCG Published. (2013, October). Architect’s Guide: Cybersecurity. TCG Published.
                                Retrieved from
                                http://www.trustedcomputinggroup.org/files/resource_files/CA36D107-1A4B-B294-
                                D08829372D5796E1/Architects Guide Cybersecurity.pdf
            [b-Leigh Ann Gilson]  Leigh Ann Gilson. (2015). Internet of Things Lacks Safety Today, Opening Door to
                                Major Threats Tomorrow, Warns OTA. Online Trust Alliance. Retrieved from
                                https://otalliance.org/news-events/press-releases/internet-things-lacks-safety-
                                today-opening-door-major-threats-tomorrow

            [b-TCG 2015]        TCG Published. (2015, September 14). Guidance for Securing IoT Using TCG
                                Technology. 1.1. TCG Published. Retrieved from
                                https://www.trustedcomputinggroup.org/files/resource_files/CD35B517-1A4B-B294-
                                D0A08D30868AB3D1/TCG_Guidance_for_Securing_IoT_1_0r21.pdf
            [b-Christensen]     Christensen, Clayton M. (2014). Disruptive Innovation. In: Soegaard, Mads and Dam,
                                Rikke Friis (eds.). The Encyclopedia of Human-Computer Interaction, 2nd Ed. Aarhus,
                                Denmark: The Interaction Design Foundation.

            [b-McKnight 2002]   McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validatingt trust
                                measures for e-commerce: An integrative typology. Information systems research,
                                13(3), 334-359.





            222
   225   226   227   228   229   230   231   232   233   234   235