[1]
2009 Annual Report of Hutchison Whampoa Limited, Hutchison Whampoa Limited, (2009).
Google Scholar
[2]
P. Olla, N.V. Patel. A value chain model for mobile data service providers. Telecommunications policy, Vol. 26 (2002), pp.551-571.
DOI: 10.1016/s0308-5961(02)00031-9
Google Scholar
[3]
A. Tsalgatidou, J. Veijalainen. Mobile Electronic Commerce: Emerging Issues. Springer, Berlin, Heidelberg, (2000), pp.477-486.
DOI: 10.1007/3-540-44463-7_42
Google Scholar
[4]
The 2009 Statistical Bulletin of the National Telecom Industry, Ministry of Industry and Information Technology of the People's Republic of China, (2009).
Google Scholar
[5]
F.C. Harmantzis V.P. Tanguturi. Investment decisions in the wireless industry applying real options. Telecommunications Policy, Vol. 31, (2007), pp.107-123.
DOI: 10.1016/j.telpol.2006.02.005
Google Scholar
[6]
H. Gruber. An investment view of mobile telecommunications in the European Union. Telecommunications Policy, Vol. 23 (1999), pp.521-538.
DOI: 10.1016/s0308-5961(99)00042-7
Google Scholar
[7]
M. Pagani , C.H. Fine. Value network dynamics in 3G-4G wireless communications: A systems thinking approach to strategic value assessment. Journal of Business Research, Vol. 61, (2008), pp.1102-1112.
DOI: 10.1016/j.jbusres.2007.11.004
Google Scholar
[8]
V.P. Tanguturi ,F.C. Harmantzis . Migration to 3G wireless broadband internet and real options: The case of an operator in India. Telecommunications Policy, Vol. 30( 2006), pp.400-419.
DOI: 10.1016/j.telpol.2006.02.004
Google Scholar
[9]
E. Bohlin. Business models and financial impacts of future mobile broadband networks. Telematics and Informatics, Vol. 24(2007), pp.217-37.
DOI: 10.1016/j.tele.2007.04.002
Google Scholar
[10]
Y. F, Kuo, C. W, Yu. 3G telecommunication operators' challenges and roles: A perspective of mobile commerce value chain. Technovation, Vol. 26, (2006), pp.1347-56.
DOI: 10.1016/j.technovation.2005.08.004
Google Scholar
[11]
A.K. Ghosh, T.M. Swaminatha. Software security and privacy risks in mobile e-commerce, Communications of the ACM, Vol. 44, (2001), pp.51-57.
DOI: 10.1145/359205.359227
Google Scholar
[12]
G. Ng-Kruelle, P.A. Swatman, D.S. Rebne, F. Hampe. The Price of Convenience: Privacy and Mobile Commerce. Quarterly Review of Electronic Commerce, Vol. 3, (2002), pp.273-285.
Google Scholar
[13]
H. Galanxhi, H. Nah FF. Privacy issues in the era of ubiquitous commerce. Electronic markets, Vol. 16(2006), pp.222-232.
DOI: 10.1080/10196780600841894
Google Scholar
[14]
T. Walter,L. Bussard,Y. Roudier. Secure mobile business applications—framework, architecture and implementation. Information Security Technical Report, Vol. 9(2004), pp.6-21.
DOI: 10.1016/s1363-4127(05)70036-4
Google Scholar
[15]
G.S. Schwiderski, H. Knospe. Secure mobile commerce. Electronics & Communication Engineering Journal, Vol. 14(2002), pp.228-238.
DOI: 10.1049/ecej:20020506
Google Scholar
[16]
E, B, Cleff. Implementing the legal criteria of meaningful consent in the concept of mobile advertising. Computer Law & Security Report, Vol. 23(2007), pp.262-269.
DOI: 10.1016/j.clsr.2007.03.005
Google Scholar
[17]
O. Pitkanen, M. Mantyla, M. Valimaki , J. Kemppinen. Assessing Legal Challenges on the Mobile Internet. International journal of electronic commerce. Vol. 8 (2003), pp.101-120.
Google Scholar
[18]
H. Grupp. Der Delphi-Report: Dt. Verl. -Anst.; (1995).
Google Scholar
[19]
D.G.A. Kenis . Improving group decisions: designing and testing techniques for group decision support systems applying Delphi principles: Utrecht, (1995).
Google Scholar
[20]
H.H. Holzmüller,J. Schlüchter. Delphi study about the future of B2B marketplaces in Germany. Electronic commerce research and applications, Vol. 1, (2002), pp.2-19.
DOI: 10.1016/s1567-4223(02)00003-0
Google Scholar
[21]
T. Addison. E-commerce project development risks: evidence from a Delphi survey. International Journal of Information Management, Vol. 23 (2003), pp.25-40.
DOI: 10.1016/s0268-4012(02)00066-x
Google Scholar
[22]
M. Keil, A. Tiwana, A. Bush. Reconciling user and project manager perceptions of IT project risk: a Delphi study. Information systems journal, Vol. 12, (2002), pp.103-19.
DOI: 10.1046/j.1365-2575.2002.00121.x
Google Scholar
[23]
R. Schmidt, K. Lyytinen, M. Keil, P. Cule. Identifying software project risks: An international Delphi study. Journal of Management Information Systems, Vol. 17( 2001), pp.5-36.
DOI: 10.1080/07421222.2001.11045662
Google Scholar
[24]
M. Adler, E. Ziglio Gazing into the oracle: the Delphi method and its application to social policy and public health: Jessica Kingsley Pub, (1996).
Google Scholar
[25]
A. L. Delbecq. A.H. Van, D.H. Gustafson. Group techniques for program planning: A guide to nominal group and Delphi processes: Green Briar Press, Middleton, WI, (1975).
Google Scholar
[26]
B.W. Boehm . Software Risk Management: Principles and Practices. IEEE software, Vol. 8(1991), p.32.
Google Scholar
[27]
R. Schmidt. Managing Delphi surveys using non-parametric statistical techniques. Decision sciences, Vol. 28(1997), pp.63-74.
Google Scholar
[28]
A.T. Cox Jr . What's wrong with risk matrices? Risk Analysis, Vol. 28(2008), pp.497-512.
Google Scholar
[29]
J.S. Bain. Relation of profit rate to industry concentration: American manufacturing, 1936-1940. The Quarterly Journal of Economics, Vol. 65 (1951), pp.293-324.
DOI: 10.2307/1882217
Google Scholar
[30]
J.S. Bain . Industrial organization: John Wiley & Sons; (1968).
Google Scholar
[31]
E.W.T. Ngai, A. Gunasekaran. A review for mobile commerce research and applications. Decision support systems, Vol. 43(2007), pp.3-15.
DOI: 10.1016/j.dss.2005.05.003
Google Scholar
[32]
The 2009 Ernst & Young business risk report—Telecommunications, Global telecommunications center of ernst & young, (2009).
Google Scholar
[33]
The Mobile Internet Report, Morgan Stanley, (2009).
Google Scholar