AlAhmad, A. S., Kahtan, H., Alzoubi, Y. I., Ali, O. & Jaradat, A. (2021). Mobile cloud computing models security issues: A systematic review.
Journal of Network and Computer Applications, 190. 103152.
https://doi.org/10.1016/j.jnca.2021.103152
Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice.
Computers in Human Behavior, 85, 218-226.
https://doi.org/10.1016/j.chb.2018.04.003
Chin, W. W. (1998). The partial least squares approach for structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Lawrence Erlbaum Associates Publishers.
Fornell, C. & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics
. Journal of Marketing Research;18(3), 382-388.
https://doi.org/10.1177/002224378101800313
Ghasemi, S., Kiumarsi, F. & Zamani Dehkordi, B. (2017) Review of secure data storage and transmission in cloud-based networks. in National Conference on Vision 2041 and Technological Advances in Electrical Engineering, Computer and Information Technology, Shiraz: Iran Modern Education Development Center (Metana). [in Persian]
Henseler, J., Ringle, C.M. & Sinkovics, R.R. (2009), The use of partial least squares path modeling in international marketing, Sinkovics, R.R. and Ghauri, P.N. (Ed.)
New Challenges to International Marketing (Advances in International Marketing, Vol. 20), Emerald Group Publishing Limited, Bingley, pp. 277-319.
https://doi.org/10.1108/S1474-7979(2009)0000020014
Jahangiri, N. (2011). A conceptual framework for assessing the richness and awareness of users information security (Case study: Post Bank), Master Thesis in Information Technology Management, Faculty of Engineering, Payame Noor University, Central Branch, Tehran. [in Persian]
kaur, A. & kaur, R. (2018). Cloud computing: A focus on security issues in cloud computing region.
International Journal of Advanced Research in Computer Science, 9(2), 267-269.
https://doi.org/10.26483/ijarcs.v9i2.5556
Kazempourian Mamghani, S. & Mirahmadi, J. (2016) Information technology risk management in cloud computing. in 3rd International Conference on Research in Engineering, Science and Technology. [in Persian]
Khan, B., Alghathbar, K. S., Nabi, S. I. & Khan, M. K. (2011). Effectiveness of information security awareness methods based on psychological theories.
African Journal of Business Management,
5(26), 10862-10868.
https://doi.org/10.5897/AJBM11.067
Makarevich, O., Mashkina, I. & Sentsova, A. (2013, November). The method of the information security risk assessment in cloud computing systems. In Proceedings of the 6th International Conference on Security of Information and Networks (pp. 446-447).
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M. & Pattinson, M. (2017). Individual differences and information security awareness.
Computers in Human Behavior, 69, 151-156.
https://doi.org/10.1016/j.chb.2016.11.065
Motahari, F., Rouhani, S. & Zare Rawasan, A. (2014). Introduction of cloud computing: Security and threats. in 1st National Conference on Researches of Computer Engineering, Tehran: Farzin Center for Sustainable Development of Science and Technology. [in Persian]
Prajapati, P. & Shah, P. (2020). A review on secure data deduplication: Cloud storage security issue.
Journal of King Saud University-Computer and Information Sciences,
34(7), 3996-4007.
https://doi.org/10.1016/j.jksuci.2020.10.021
Sehgal, N. K., Bhatt, P. C. P. & Acken, J. M. (2020). Future trends in cloud computing. In Cloud Computing with Security (pp. 235-259). Springer, Cham.
Talib, S., Clarke, N. L., & Furnell, S. M. (2010, February). An analysis of information security awareness within home and work environments. In 2010 International Conference on Availability, Reliability and Security (pp. 196-203). IEEE.
Tenenhaus, M., Amato, S. & Esposito Vinzi, V. (2004, June). A global goodness-of-fit index for PLS structural equation modelling. In Proceedings of the XLII SIS scientific meeting (Vol. 1, No. 2, pp. 739-742).
Tsohou, A., Karyda, M. & Kokolakis, S. (2015). Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs.
Computers & Security, 52, 128-141.
https://doi.org/10.1016/j.cose.2015.04.006
Zandvakili, M., Salehi, S. & Rashidi, A. (2012). Conceptual expression of brand and its essence in marketing communication development; Case Study: Apple's Brand.
Journal of Visual and Applied Arts, 5(9), 71-91.
https://doi.org/10.30480/vaa.2012.261 [in Persian]
Zeinali Khosroshahi, A., Babaei, Sh. & Ghasemi, E. (2018) Review of security challenges in cloud computing. in 13th Conference on Recent Research in Science and Technology, Kerman: Aseman Mehvaran Company. [in Persian]
Zhang, Y., Xu, C. & Shen, X. S. (2020). Summary and future research directions. In Data Security in Cloud Storage (pp. 167-171). Springer, Singapore.