An investigation of email processing from a risky decision making perspective
暂无分享,去创建一个
Rui Chen | Jingguo Wang | H. Raghav Rao | Tejaswini Herath | H. Rao | Jingguo Wang | Tejaswini C. Herath | Rui Chen
[1] Janet Fulk,et al. Organizational Colleagues, Media Richness, and Electronic Mail , 1991 .
[2] M. Zuckerman. Sensation Seeking : Beyond the Optimal Level of Arousal , 1979 .
[3] S. Sitkin,et al. Determinants of Risky Decision-Making Behavior: A Test of the Mediating Role of Risk Perceptions and Propensity , 1995 .
[4] Barbara H Wixom,et al. A Theoretical Integration of User Satisfaction and Technology Acceptance , 2005, Inf. Syst. Res..
[5] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[6] Peter A. Todd,et al. Assessing IT usage: the role of prior experience , 1995 .
[7] Sirkka L. Jarvenpaa,et al. Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence , 2003, Int. J. Electron. Commer..
[8] N. Jianakoplos,et al. ARE WOMEN MORE RISK AVERSE , 1998 .
[9] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[10] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[11] Ron Weber,et al. The Grim Reaper : The Curse of E-mail , 2004 .
[12] Steve H. Barr,et al. Propensity to adopt technological innovations: the impact of personal characteristics and organizational context , 1999 .
[13] Hsinchun Chen,et al. Fighting cybercrime: a review and the Taiwan experience , 2006, Decis. Support Syst..
[14] A. Tversky,et al. Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .
[15] H. Raghav Rao,et al. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2008, Decis. Support Syst..
[16] Deborah Compeau,et al. Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..
[17] Albert Levi,et al. Risks in email security. , 2001 .
[18] Mark Keil,et al. An investigation of risk perception and risk propensity on the decision to continue a software development project , 2000, J. Syst. Softw..
[19] Laurence Steinberg,et al. Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: an experimental study. , 2005, Developmental psychology.
[20] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[21] M. Leary,et al. Self-presentational determinants of health risk behavior among college freshmen , 2001 .
[22] Gurpreet Dhillon,et al. Principles of information systems security - text and cases , 2006 .
[23] Janet Fulk,et al. Social construction of communication technology , 1993 .
[24] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[25] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[26] R. Linn. Educational measurement, 3rd ed. , 1989 .
[27] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[28] M. Zuckerman,et al. A comparison of three structural models for personality: the big three , 1993 .
[29] A. Bandura. Reflections on self-efficacy , 1978 .
[30] Robert D. Klassen,et al. Linking forward and reverse supply chain investments: The role of business uncertainty , 2007 .
[31] Eugene F. Stone. Research methods in organizational behavior , 1978 .
[32] Arvind K. Tripathi,et al. Economics of first-contact email advertising , 2006, Decis. Support Syst..
[33] Matthew K. O. Lee,et al. A Trust Model for Consumer Internet Shopping , 2001, Int. J. Electron. Commer..
[34] Phyllis C. Panzano,et al. AN ORGANIZATIONAL-LEVEL TEST OF A PARTIALLY MEDIATED MODEL OF RISKY DECISION MAKING BEHAVIOR. , 1997 .
[35] J KimDan,et al. A trust-based consumer decision-making model in electronic commerce , 2008 .
[36] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[37] Paul A. Pavlou,et al. Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..
[38] Alladi Venkatesh,et al. Has the Internet become indispensable? , 2004, CACM.
[39] Paul A. Pavlou,et al. Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..
[40] J. Dutton,et al. Discerning threats and opportunities. , 1988 .
[41] Annika E. Sundén,et al. Gender Differences in the Allocation of Assets in Retirement Savings Plans , 1998 .
[42] Stewart Thornhill,et al. Entrepreneurs and Evolutionary Biology: The Relationship between Testosterone and New Venture Creation , 2006 .
[43] P. M. Podsakoff,et al. Self-Reports in Organizational Research: Problems and Prospects , 1986 .
[44] Shuliang Li,et al. The development of a hybrid intelligent system for developing marketing strategy , 2000, Decis. Support Syst..
[45] Tejaswini Herath,et al. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..
[46] Ron Weber,et al. E-Mail Management: A Techno-Managerial Research Perspective , 2005, Commun. Assoc. Inf. Syst..
[47] Paul A. Pavlou,et al. Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role , 2005, Inf. Syst. Res..
[48] Balaji Padmanabhan,et al. Toward user patterns for online security: Observation time and online user identification , 2010, Decis. Support Syst..
[49] Gerald J.S. Wilde,et al. Differences in risk experience between sensation avoiders and sensation seekers , 1996 .
[50] Bernard C. Y. Tan,et al. A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects , 2000, MIS Q..
[51] Gilbert A. Churchill. A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .
[52] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[53] Albert Levi,et al. Inside risks: Risks in email security , 2001, Commun. ACM.
[54] H. Thomas,et al. Toward a Contingency Model of Strategic Risk Taking , 1985 .
[55] H. Raghav Rao,et al. Web channels in e-commerce , 2001, CACM.
[56] E. Weber,et al. A Domain-Specific Risk-Taking (DOSPERT) Scale for Adult Populations , 2006, Judgment and Decision Making.
[57] W. G. Sanders,et al. Behavioral Responses of CEOs to Stock Ownership and Stock Option Pay , 2001 .
[58] Viswanath Venkatesh,et al. Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..
[59] Vallabh Sambamurthy,et al. Sources of Influence on Beliefs about Information Technolgoy Use: An Empirical Study of Knowledge Workers , 2003, MIS Q..
[60] I. Ajzen. The theory of planned behavior , 1991 .
[61] Kar Yan Tam,et al. Understanding the Adoption of Multipurpose Information Appliances: The Case of Mobile Data Services , 2006, Inf. Syst. Res..
[62] Rui Chen,et al. Visual e-mail authentication and identification services: An investigation of the effects on e-mail use , 2009, Decis. Support Syst..
[63] Bing-Sheng Teng,et al. Strategic risk behaviour and its temporalities: between risk propensity and decision context , 2001 .
[64] Amy L. Pablo,et al. Reconceptualizing the Determinants of Risk Behavior , 1992 .
[65] Michael D Slater,et al. Brief measures of sensation seeking for screening and large-scale surveys. , 2003, Drug and alcohol dependence.
[66] Barry M. Staw,et al. Threat-rigidity effects in organizational behavior: A multilevel analysis. , 1981 .
[67] J. March,et al. Managerial perspectives on risk and risk taking , 1987 .
[68] K. Jöreskog,et al. Intraclass Reliability Estimates: Testing Structural Assumptions , 1974 .
[69] Peter M. Bentler,et al. Cognitive Motivations and Sensation Seeking as Long-Term Predictors of Drinking Problems , 1993 .
[70] T. C. Edwin Cheng,et al. Adoption of internet banking: An empirical study in Hong Kong , 2006, Decis. Support Syst..
[71] Ritu Agarwal,et al. A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology , 1998, Inf. Syst. Res..
[72] A. Bandura. Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .
[73] R. RaoH.,et al. Encouraging information security behaviors in organizations , 2009 .
[74] M. Zuckerman. Behavioral Expressions and Biosocial Bases of Sensation Seeking , 1994 .
[75] YangYinghui,et al. Toward user patterns for online security , 2010, DSS 2010.
[76] Traci Carte,et al. In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..
[77] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[78] L. Donohew,et al. Television campaigns and adolescent marijuana use: tests of sensation seeking targeting. , 2001, American journal of public health.
[79] Kin Fai Ellick Wong. The role of risk in making decisions under escalation situations , 2005 .