I. Ajzen, “From intentions to actions: A theory of planned behavior’. Action control: From cognition to behavior 2: 11-39, 1985.
 I. Ajzen, “The Theory of Planned Behavior”. Organizational Behavior and Human Decision Processes. 50(2): 179-211, 1991.
 A. I. Al-Alawi and M. A. Al-Amer, “Young generation attitudes and awareness towards the implementation of smart card in Bahrain: an exploratory study”, Journal of Computer Science, 2 (5), 441-446, 2006.
 B. A. Aubert and G. Hamel, “Adoption of Smart Cards in the Medical Sector: The Canadian Experience”. Social Science and Medicine. 53(7): 879-894, 2001.
 J. E. Bailey and S. W. Pearson, “Development of a tool for measuring and analyzing computer user satisfaction”, Management Science, 29, 530–544, 1983.
 A. Bandura, “Self-efficacy mechanism in human agency”, American Psychologist, 37 (2), 122-147, 1982.
 J. A. Cruz and W. J. Frey, “An Effective Strategy for Integration Ethics Across the Curriculum in Engineering: An ABET 2000 Challenge,” Science and Engineering Ethics, p. 543-568, 2003.
 M. Fishbein, and I. Ajzen, Intention and Behavior: An Introduction to Theory and Research. 1975. Boston, MA: Addition-Wesley.
 L. Floridi, Philosophy and Computing, 1999. London: Routledge.
 C. Fornell, M. D. Johnson, E. W. Anderson, J. Cha, and B. E. Bryant. 1996. The American customer satisfaction index: Nature, purpose and findings. Journal of Marketing 60 (October): 7-18.
 B. Friedman, (Ed.) 1997. Human values and the design of computer technology. New York: Cambridge University Press and CSLI, Stanford University.
 D. Gollman, Computer Security. 1999. John Wile & Sons, UK.
 L. Halawi, J. Aronson and R. McCarthy, Resource-based view of knowledge management for competitive advantage. Journal of Knowledge Management, 3(2),pp. 75-86, 2005.
 F. Heider, The Psychology of Interpersonal Relations. 1958. New York: Wiley.
 R. A. Howard, “ Decision analysis: practice and promise. Management Science, 346, 679-695, 1988.
 C. Huff, and Frey, W. 2005. Moral Pedagogy and Practical Ethics, in Science and Engineering Ethics (Forthcoming).
 M. Igbaria, and Parasuraman, S. “A path analytic study of individual characteristics, computer anxiety, and attitudes towards microcomputers”. Journal of Management, 15 (3), 373-388, 1989.
 Kim, Soyoung and Leslie Stoel, “Apparel retailers: website quality dimensions and satisfaction”. Journal of Retailing and Consumer Services, 11.109-117, 2004.
 R. O. Mason, “Four Ethical Issues of the Information Age”, Management Information Systems Quarterly, 10, 1, 5-12, 1986.
 K. Mathieson, ‘Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior”. Information Systems Research 2(3): 173-191, 1991.
 R. W. McGee, “The Ethics of Tax Evasion: A Survey of International Business Academics”. Presented at the 60th International Atlantic Economic Conference, New York, October 6–9, 2005.
 D. Mellisa, 2006. A Framework for Information Security in Ethics Education system. University of Maryland.
 D. Michael , Johnson, L. Nilsson, “The Importance of Reliability and Customization from Goods to Services”. Quality Management Journal. Vol 10, No 1, 2006.
 M. Namayandeh, M. Masrom, and Ismail Z, “Development of Computer Ethics Framework for Information Security within Educational Context”. SEATUC. Shibuara University, Japan., pp. 235-240, 2009.
 NBS Technologies Inc., 2004. Smart Card Frequently Asked Questions. http://www.nbstech.com/solutions_faq.html
 R.L.Oliver, A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions, Journal of Marketing Research, Vol. 17, No. 4, pp. 460−469. 1980.
 A. C. Raub, Correlates of computer anxiety in college students. Unpublished doctoral dissertation, University of Pennsylvania. 1981.
 H. Taherdoost., Masrom. M, Ismail. Z. Evaluation of Smart Card Acceptance: Security, Technology and Usage. Conference Proceedings of 3th International Conference on e-Commerce, e-Administration, e-Society, and e-Education (e-CASE). The Grand Copthorne Waterfront, Singapore, January 8-10, 2009, pp. 765-779.
 S. Taylor, and Todd, P. (1995). Assessing IT usage: the role of prior experience. MIS Quarterly. 19(4), 561–570. 2004.
 G. Terrell. A Critique of Design Approaches for Notification Systems. Technical Report TR-04-29, Computer Science, Virginia Tech.
 G.J. Walters, Privacy and Security: An Ethical Analysis, Computers and Society, 31, 2, 8-23. 2001.
 M. Wolfinbarger,, Gilly, M.C., 2003. eTailQ: Dimensionalizing, Measuring and Predicting Etail Quality. Journal of Retailing. 79(3), 183-198.
 Yoon, Sung-Joon, 2002. The antecedents and consequences of trust in online-purchase decisions. Journal of Interactive Marketing, 16: 47-63.
 H. Taherdoost, , Sahibuddin, S., Jalaliyoon, N. 2011. Smart Card Security; Technology and Adoption, International Journal of Security (IJS),Volume: 5, Issue: 2, Page: 74 – 84.
 H. Taherdoost, Jalaliyoon, N., Namayandeh, M., Forghani, A., Zamani, M. Adoption Framework Expansion based on the Computer Ethics Related Research Models and Ethical Scenarios Analysis, International Conference on Economics, Business and Management, Page: 219 – 223. 4-5, December 2010, Manila, Philippines.
 H. Taherdoost, Sahibuddin, S., Namayandeh, M., Jalaliyoon, N. Proposed an educational plan for computer ethics and information security, WCETR , Procedia - Social and Behavioral Sciences. Volume 28, Pages: 815–819. 2011.
 H. Taherdoost, Masrom, M. An examination of smart card technology acceptance using adoption model, 31st International Conference Information Technology Interfaces (ITI09), Cavtat / Dubrovnik, Croatia, June 22-25, Pages: 329-334. 2009.
 H. Taherdoost, Zamani, M., Namayandeh, M. Study of Smart Card Technology and Probe User Awareness about It: A Case Study of Middle Eastern Students. International Conference on Management Technology and Applications (ICMTA 2009). Beijing, China, 8-11 August, Volume 5, Pages 334-338.
 H. Taherdoost, Sahibuddin, S., Namayandeh, M., Jalaliyoon, N. (2013). Computer and Information Security Ethics’ Models. International Conference on Advanced Computer Science Applications and Technologies, 145-149.
 H. Taherdoost, Sahibuddin, S., Namayandeh, M., Jalaliyoon, N., Kalantari. A., Chaeikar, S,S. (2012). International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 3, No. 4, 1792-1796.