1- داوری، علی و رضازاده، آرش.، 1395، مدل سازی معادلات ساختاری با نرم افزار PLS، تهران، انتشارات جهاد دانشگاهی تهران، چاپ سوم
2- Ahmadi, H., M. Nilashi, et al. (2017). "Hospital Information System adoption: Expert perspectives on an adoption framework for Malaysian public hospitals." Computers in Human Behavior 67: 161-189.
3- Carayannis, E. G. and E. Turner (2006). "Innovation diffusion and technology acceptance: The case of PKI technology." Technovation 26(7): 847-855.
4- Chang, I.-C., H.-G. Hwang, et al. (2007). "Factors affecting the adoption of electronic signature: Executives' perspective of hospital information department." Decision Support Systems 44(1): 350-359.
5- Christian Schaupp, L. and L. Carter (2005). "E-voting: from apathy to adoption." Journal of Enterprise Information Management 18(5): 586-601.
6- Cohen, J. (1992). "A power primer." Psychological bulletin 112(1): 155.
7- Currie, W. L. (2012). "Institutional isomorphism and change: the national programme
8- for IT–10 years on." Journal of Information Technology 27(3): 236-248.
9- Davis, F. D. (1989). "Perceived usefulness, perceived ease of use, and user acceptance of information technology." Mis Quarterly: 319-340.
10- DIMMAGGIO, P. and W. Powell (1983). "The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields." American Sociological Review 48(2): 147-160.10.
11- Fishbein, M. and I. Ajzen (1975). Belief, attitude, intention and behavior: An introduction to theory and research.
12- Geisser, S. (1974). "A predictive approach to the random effect model." Biometrika 61(1): 101-107.
13- Gomez-Barroso, J.-L. and C. Feijoo (2009). "Policy tools for public involvement in the deployment of next generation communications." info 11(6): 3-13.
14- Gupta, A., Y. A. Tung, et al. (2004). "Digital signature: use and modification to achieve success in next generational e-business processes." Information &Management 41(5): 561-575.
15- Hoepner, P. (2006). "Study PKI and Certificate Usage in Europe." Fraunhofer Institute FOKUS, Institute for Open Communication Systems.
16- Hulland, J. (1999). "Use of partial least squares (PLS) in strategic management research: A review of four recent studies." Strategic management journal: 195-204.
17- Lin, H.-F. and S.-M. Lin (2008). "Determinants of e-business diffusion: A test of the technology diffusion perspective." Technovation 28(3): 135-145.Carayannis, E. G. and E. Turner (2006). "Innovation diffusion and technology acceptance: The case of PKI technology." Technovation26(7): 847-855.
18- Lopez, J., R. Oppliger, et al. (2005). "Why have public key infrastructures failed so far?" Internet Research15(5): 544-556.
19- Loukis, E., S. Kokolakis, et al. (2011). "FACTORS OF PKI ADOPTION IN UROPEAN FIRMS."
20- Low, C., Y. Chen, et al. (2011). "Understanding the determinants of cloud computing adoption." Industrial Management & Data Systems111(7): 1006-1023.
21- OECD (1997). Diffusing technology to industry: government policy and rogrammes, OECD.
22- Pan, M.-J. and W.-Y. Jang (2008). "Determinants of the adoption of enterprise resource planning within the technology-organization-environment framework: Taiwan's communications industry." Journal of Computer information systems 48(3): 94-102.
23- Rossi, B., B. Russo, et al. (2012). "Adoption of free/libre open source software in public organizations: factors of impact." Information Technology & People25(2): 156-187.
24- Raina, K. (2003). PKI security solutions for the Enterprise: solving HIPAA, E-Paper Act, and other compliance issues, John Wiley & Sons.
25- Rogers, E. M. (2002). "Diffusion of preventive innovations." Addictive behaviors 27(6): 989-993.
26- Rogers Everett, M. (1995). "Diffusion of innovations." New York.
27- Rossi, B., B. Russo, et al. (2012). "Adoption of free/libre open source software in public organizations: factors of impact." Information Technology & People 25(2): 156-187.
28- Schumacker, R. E. and R. G. Lomax (2012). A beginner's guide to structural equation modeling, Routledge.
29- Son, J.-Y. and I. Benbasat (2007). "Organizational buyers' adoption and use of B2Belectronic marketplaces: efficiency-and legitimacy-oriented perspectives." Journal of Management Information Systems 24(1): 55-99.
30- Srivastava, A. (2011). "Resistance to change: six reasons why businesses don’t use e-signatures." Electronic Commerce Research 11(4): 357-382.
31- Stone, M. (1974). "Cross-validatory choice and assessment of statistical predictions." Journal of the royal statistical society. Series B (Methodological): 111-147.
32- Tornatzky, L. G., M. Fleischer, et al. (1990). Processes of technological innovation, Lexington Books.
33- Tornatzky, L. G. and K. J. Klein (1982). "Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings." Engineering Management, IEEE Transactions on(1): 28-45.
34- Zhu, K. and K. L. Kraemer (2005). Post-adoption variations in usage and value of e-business by organizations: cross-country evidence from the retail industry." Information systems research 16(1): 61-84.