Location-based mobile phone service utilisation for emergency management in Australia
暂无分享,去创建一个
[1] Elizabeth Martin,et al. METHODS FOR TESTING AND EVALUATING SURVEY QUESTIONS , 2004 .
[2] Tim Galpin,et al. The Use of Mail Questionnaires as a Method of Data Collection. , 1987 .
[3] F. Bookstein,et al. Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory , 1982 .
[4] Hans van der Heijden,et al. Factors influencing the usage of websites: the case of a generic portal in The Netherlands , 2003, Inf. Manag..
[5] John Ingham,et al. Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..
[6] Qingxiong Ma,et al. The Technology Acceptance Model: A Meta-Analysis of Empirical Findings , 2004, J. Organ. End User Comput..
[7] Per E. Pedersen,et al. Intentions to use mobile services: Antecedents and cross-service comparisons , 2005 .
[8] Viswanath Venkatesh,et al. Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..
[9] E. Quarantelli. What Should we Study? Questions and Suggestions for Researchers about the Concept of Disasters , 1987, International Journal of Mass Emergencies & Disasters.
[10] Marcela D. Rodríguez,et al. Context-Aware Mobile Communication in Hospitals , 2003, Computer.
[11] Paul A. Pavlou,et al. Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..
[12] Michael A Matos. The Creative Enterprise: Managing Innovative Organizations and People , 2008 .
[13] M. D. Myers,et al. Qualitative Research in Information Systems: A Reader , 2002 .
[14] Scott W VanderStoep,et al. Research Methods for Everyday Life: Blending Qualitative and Quantitative Approaches , 2009 .
[15] Christina M. Gardner,et al. Development of an instrument to measure the acceptance of Internet technology by consumers , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[16] Patrick Meier,et al. New technologies in emergencies and conflicts: the role of information and social networks. , 2009 .
[17] Iris A. Junglas,et al. Personality Traits and Privacy Perceptions: An Empirical Study in the Context of Location-Based Services , 2006, 2006 International Conference on Mobile Business.
[18] Dbcde. Telecommunications Amendment (Integrated Public Number Database) Bill 2009 , 2009 .
[19] Earl R. Babbie,et al. The practice of social research , 1969 .
[20] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[21] Cornelia Zuell,et al. Text Analysis Software: Commonalities, Differences and Limitations: The Results of a Review , 2000 .
[22] Dubravka Cecez-Kecmanovic. Critical Research in Information Systems: The Question of Methodology , 2007, ECIS.
[23] Patrick Rawstorne,et al. A systematic analysis of the theory of reasoned action, the theory of planned behaviour and the technology acceptance model when applied to the prediction and explanation of information systems use in mandatory usage contexts , 2005 .
[24] E. Guba,et al. Competing paradigms in qualitative research. , 1994 .
[25] J. A. Mancini,et al. Providing Access to Resilience-Enhancing Technologies for Disadvantaged Communities and Vulnerable Populations , 2008 .
[26] Keith Punch,et al. Introduction to Social Research: Quantitative and Qualitative Approaches , 1998 .
[27] Joe Astroth. Location-based services: criteria for adoption and solution deployment , 2003 .
[28] S. Barnes,et al. Driving consumer acceptance of mobile marketing: a theoretical framework and empirical study , 2005 .
[29] Chin-Lung Hsu,et al. Adoption of the mobile Internet: An empirical study of multimedia message service (MMS) , 2007 .
[30] John M. Carroll,et al. Making Use: Scenario-Based Design of Human-Computer Interactions , 2000 .
[31] David Templeman,et al. Taking a punch: Building a more resilient Australia , 2008 .
[32] T. Wilks. The Use of Vignettes in Qualitative Research into Social Work Values , 2004 .
[33] France Bélanger,et al. The utilization of e‐government services: citizen trust, innovation and acceptance factors * , 2005, Inf. Syst. J..
[34] Viswanath Venkatesh,et al. Adoption of Collaboration Technologies: Integrating Technology Acceptance and Collaboration Technology Research , 2008 .
[35] Michael D. Myers,et al. A classification scheme for interpretive research in information systems , 2001 .
[36] Chien-Wei Chen,et al. Location-Based Services for Tourism Industry: An Empirical Study , 2006, UIC.
[37] Scott A. Bridwell. The dimensions of locational privacy , 2007 .
[38] David Gefen,et al. The conceptualization of trust, risk and their electronic commerce: the need for clarifications , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[39] Shelby D. Hunt,et al. Commentary on an empirical investigation of a general theory of marketing ethics , 1990 .
[40] J. P. Fernandes. Emergency Warnings With Short Message Service , 2008 .
[41] James B. Rule,et al. Privacy in PerilHow We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience , 2009 .
[42] Shin-Yuan Hung,et al. Critical factors of WAP services adoption: an empirical study , 2003, Electron. Commer. Res. Appl..
[43] Michael G. Morris,et al. User Acceptance of Information Technology: Theories and Models , 1996 .
[44] W. Neuman,et al. Basics of Social Research: Qualitative and Quantitative Approaches , 2006 .
[45] Douglas Currivan,et al. Methods for Testing and Evaluating Survey Questionnaires (review) , 2006 .
[46] Jochen Schiller,et al. Location Based Services , 2004 .
[47] R. Fisher. Social Desirability Bias and the Validity of Indirect Questioning , 1993 .
[48] Anthony J. Onwuegbuzie,et al. Positivists, Post-Positivists, Post-Structuralists, and Post-Modernists: Why Can't We All Get Along? Towards a Framework for Unifying Research Paradigms. , 2000 .
[49] Gary T. Marx,et al. What's in a Name? Some Reflections on the Sociology of Anonymity , 1999, Inf. Soc..
[50] Peter A. Todd,et al. Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication , 1992, MIS Q..
[51] E. Buttery,et al. Design of a Marketing Information System: Useful Paradigms , 1991 .
[52] Peter Sandborn,et al. Designing Engineering Systems for Sustainability , 2008 .
[53] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[54] Michael D. Myers,et al. A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems , 1999, MIS Q..
[55] Joobin Choobineh,et al. Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[56] S. Zlatanova,et al. Location Interoperability Services for Medical Emergency Operations during Disasters , 2005 .
[57] C. Gilbert,et al. Studying disaster: Changes in the main conceptual tools , 2005 .
[58] Younes Benslimane,et al. An exploration of wireless computing risks: Development of a risk taxonomy , 2004, Inf. Manag. Comput. Secur..
[59] Peter Ping Li,et al. Toward a Geocentric Framework of Trust: An Application to Organizational Trust , 2008, Management and Organization Review.
[60] D. Harrison McKnight,et al. Perceived Information Quality in Data Exchanges: Effects on Risk, Trust, and Intention to Use , 2006, Inf. Syst. Res..
[61] Geoff Walsham,et al. Learning about being critical , 2005, Inf. Syst. J..
[62] Erwin Aitenbichler. A Focus on Location Context , 2008, Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises.
[63] James C. Anderson,et al. Predicting the performance of measures in a confirmatory factor analysis with a pretest assessment of their substantive validities. , 1991 .
[64] R. P. McDonald,et al. Principles and practice in reporting structural equation analyses. , 2002, Psychological methods.
[65] Sally Rao Hill,et al. A Conceptual Framework and Propositions for the Acceptance of Mobile Services , 2007, J. Theor. Appl. Electron. Commer. Res..
[66] John Mingers,et al. Combining IS Research Methods: Towards a Pluralist Methodology , 2001, Inf. Syst. Res..
[67] Iris A. Junglas,et al. On the usefulness and ease of use of location-based services: insights into the information system innovator's dilemma , 2007, Int. J. Mob. Commun..
[68] Fred D. Davis,et al. Development and Test of a Theory of Technological Learning and Usage , 1992 .
[69] J. A. Hatch,et al. Doing Qualitative Research in Education Settings , 2002 .
[70] Robert P. Minch,et al. Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[71] H. M. Jagtman. Cell broadcast trials in The Netherlands: Using mobile phone technology for citizens' alarming , 2010, Reliab. Eng. Syst. Saf..
[72] Gretchen B. Rossman,et al. Designing qualitative research, 3rd ed. , 1999 .
[73] Giora Keinan,et al. Attitudes and reactions to media coverage of terrorist acts , 2003 .
[74] P. Garthwaite. An Interpretation of Partial Least Squares , 1994 .
[75] Nuwan Waidyanatha,et al. Two complementary mobile technologies for disaster warning , 2009 .
[76] Lei-da Chen,et al. Enticing online consumers: an extended technology acceptance perspective , 2002, Inf. Manag..
[77] Katina Michael,et al. Innovative Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants , 2009 .
[78] Selma C. Etter. Database Nation the Death of Privacy in the 21st Century , 2000, Journal of Computing in Higher Education.
[79] Geoffrey S. Hubona,et al. The mediation of external variables in the technology acceptance model , 2006, Inf. Manag..
[80] S. Gaines,et al. Terror threat perception and its consequences in contemporary Britain. , 2005, British journal of psychology.
[81] Victor R. Prybutok,et al. A consumer perspective of E-service quality , 2005, IEEE Transactions on Engineering Management.
[82] T. Konrad,et al. Reported response rates to mailed physician questionnaires. , 2001, Health services research.
[83] Shuigeng Zhou,et al. Providing Location-Based Services under Web Services Framework , 2007 .
[84] A. Bandura. Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .
[85] Wynne W. Chin,et al. Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.
[86] Paris Panayiotopoulos,et al. Predicting behavioural intention in a small business context , 1999 .
[87] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[88] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[89] ThaeMin Lee,et al. The role of contextual marketing offer in Mobile Commerce acceptance: comparison between Mobile Commerce users and nonusers , 2007, Int. J. Mob. Commun..
[90] John W. Creswell,et al. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2010 .
[91] Elena Karahanna,et al. Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..
[92] Ezejiofo Patrick Udeh,et al. Exploring User Acceptance of Free Wireless Fidelity Public Hot Spots : An Empirical Study , 2008 .
[93] Marcus Wigan,et al. You are where you have been. , 2008 .
[94] J. Jacoby,et al. The Components of Perceived Risk , 1972 .
[95] I. Ajzen. Residual Effects of Past on Later Behavior: Habituation and Reasoned Action Perspectives , 2002 .
[96] Katina Michael,et al. Location-Based Services: a vehicle for IT&T convergence , 2004 .
[97] Maurice Joseph Mcginley,et al. Design criteria for public emergency warning systems , 2006 .
[98] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[99] Jörgen Samsioe,et al. Introduction to Location Based Services — Markets and Technologies , 2002 .
[100] Judy Drennan,et al. Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..
[101] Peter A. Todd,et al. Assessing IT usage: the role of prior experience , 1995 .
[102] Christian S. Jensen. Research challenges in location-enabled m-services , 2002, Proceedings Third International Conference on Mobile Data Management MDM 2002.
[103] Judith L. Green,et al. Evolution of Qualitative Research Methodology: Looking Beyond Defense to Possibilities , 1999 .
[104] Rudy Hirschheim,et al. A Paradigmatic Analysis Contrasting Information Systems Development Approaches and Methodologies , 1998, Inf. Syst. Res..
[105] A. Onwuegbuzie,et al. Mixed Methods Research: A Research Paradigm Whose Time Has Come , 2004 .
[106] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[107] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[108] T. Raykov. Estimation of Composite Reliability for Congeneric Measures , 1997 .
[109] A. Parasuraman,et al. A conceptual framework for understanding e-service quality : implications for future research and managerial practice , 2000 .
[110] Kevin Chong,et al. New Zealand Telecommunications Based Public Alerting Systems Technology Study , 2008 .
[111] D. Avison,et al. Research in information systems : a handbook for research supervisors and their students , 2005 .
[112] Ben M. Bensaou,et al. Inter-organizational relationships and information technology: a conceptual synthesis and a research framework , 1996 .
[113] Johan Hjelm,et al. Creating Location Services for the Wireless Web: Professional Developer's Guide , 2002 .
[114] Nick Bontis,et al. A MODEL OF USER ADOPTION OF MOBILE PORTALS , 2004 .
[115] Juhani Iivari,et al. A paradigmatic analysis of contemporary schools of IS development , 1991 .
[116] L. Kanuk,et al. Mail Surveys and Response Rates: A Literature Review , 1975 .
[117] H. Tootell. Investigating the relationship between Location-Based Services and National Security , 2005, TENCON 2005 - 2005 IEEE Region 10 Conference.
[118] Izak Benbasat,et al. Quo vadis TAM? , 2007, J. Assoc. Inf. Syst..
[119] M. Gordon,et al. The “Science of the Sophomore” Revisited: from Conjecture to Empiricism , 1986 .
[120] Paul P. Biemer,et al. Introduction to Survey Quality , 2003 .
[121] Stuart L. Esrock,et al. A Dichotomy of Privacy: Personal and Professional Attitudes of Marketers , 1999 .
[122] Gilbert A. Churchill. A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .
[123] Margaret C. Campbell,et al. The Moderating Effect of Perceived Risk on Consumers’ Evaluations of Product Incongruity: Preference for the Norm , 2001 .
[124] Lucien G. Canton,et al. Emergency Management: Concepts and Strategies for Effective Programs , 2006 .
[125] Sally Dibb,et al. Using email questionnaires for research: Good practice in tackling non-response , 2006 .
[126] I. Ajzen. Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .
[127] Peter Joore,et al. Social aspects of location-monitoring systems: the case of Guide Me and of My-SOS , 2008 .
[128] B.A. Bakaimis. A New Scheme for Synergy Among Cellular and Broadcast Networks , 2005, EUROCON 2005 - The International Conference on "Computer as a Tool".
[129] Kristiina Jokinen. User Interaction in Mobile Navigation Applications , 2008, Map-based Mobile Services.
[130] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[131] Stuart J. Barnes,et al. Exploring the acceptance of mobile auctions in China , 2007, International Conference on the Management of Mobile Business (ICMB 2007).
[132] J. Wilcox,et al. The Pretest in Survey Research: Issues and Preliminary Findings , 1982 .
[133] Axel Küpper. Location-based Services: Fundamentals and Operation , 2005 .
[134] Bodo B. Schlegelmilch,et al. Pre-Testing in Questionnaire Design: A Review of the Literature and Suggestions for Further Research , 1993 .
[135] Ritu Agarwal,et al. The Role of Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technologies , 1997 .
[136] H. Bossel. Viability and sustainability: Matching development goals to resource constraints , 1987 .
[137] Sarah Spiekermann,et al. General Aspects of Location Based Services , 2004, Location-Based Services.
[138] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[139] John P. Wilson,et al. Geographic Information Science: An Introduction , 2008 .
[140] Joe E. Wheaton,et al. Online Data Collection: Strategies for Research. , 2004 .
[141] L. G. Tornatzky,et al. Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.
[142] I. Ajzen. Attitudes, Personality and Behavior , 1988 .
[143] H. Cooper,et al. A Quantitative Review of Research Design Effects on Response Rates to Questionnaires , 1983 .
[144] David A. de Vaus,et al. Surveys in Social Research , 1996 .
[145] Viswanath Venkatesh,et al. Bringing non-adopters along: the challenge facing the PC industry , 2003, CACM.
[146] Roula Michaelides,et al. Technology acceptance and m-commerce in an operational environment , 2006, J. Enterp. Inf. Manag..
[147] Jon Howell,et al. Do I live in a flood basin?: synthesizing ten thousand maps , 2008, CHI.
[148] E. V. Van Teijlingen,et al. The importance of pilot studies. , 2002, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[149] Daniel A. Griffith,et al. PRACTICAL HANDBOOK of Spatial Statistics , 1998 .
[150] M.H.P. Kleijnen,et al. Consumer acceptance of wireless finance , 2004 .
[151] V. Zeithaml,et al. E-S-QUAL A Multiple-Item Scale for Assessing Electronic Service Quality , 2004 .
[152] Christopher Spencer,et al. Understanding seat‐belt use: A test of Bentler and Speckart's extension of the ‘theory of reasoned action’ , 1984 .
[153] G. Gow. Information Privacy and Mobile Phones , 2005 .
[154] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[155] Dimitrios Christelis,et al. Household Economic Decisions under the Shadow of Terrorism , 2009 .
[156] Robyn Betts. The Missing Links in Community Warning Systems: Findings from Two Victorian Community Warning System Projects , 2003 .
[157] Mark Conner,et al. Alcohol Consumption and the Theory of Planned Behavior: An Examination of the Cognitive Mediation of Past Behaviorid , 1999 .
[158] Fred D. Davis. A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .
[159] D. Meadows-Klue. Mobile Marketing: Achieving Competitive Advantage Through Wireless Technology , 2008 .
[160] Marcel Creemers,et al. Predicting online purchase behavior: replications and tests of competing models , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[161] H. Tootell,et al. The social impact of using automatic identification technologies and location-based services in national security , 2007 .
[162] Steven P. French,et al. The Future of GIS in Planning: Converging Technologies and Diverging Interests , 2008 .
[163] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[164] Robert Y. Cavana,et al. Applied Business research: Qualitative and Quantitative Methods , 2001 .
[165] Claire Hewson,et al. Internet-mediated research as an emergent method and its potential role in facilitating mixed methods research , 2008 .
[166] A. Parasuraman,et al. Service quality delivery through web sites: A critical review of extant knowledge , 2002, Journal of the Academy of Marketing Science.
[167] William Lewis,et al. PLS, Small Sample Size, and Statistical Power in MIS Research , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[168] Katina Michael,et al. Introducing location-based services into information technology curriculum: reflections on practice , 2005, International Conference on Mobile Business (ICMB'05).
[169] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[170] Markus Uhlirz. A Market and User View on LBS , 2007, Location Based Services and TeleCartography.
[171] Peter Axel Nielsen,et al. Mobile Systems Development: A Literature Review , 2005, Designing Ubiquitous Information Environments.
[172] G. Williamson. Introduction to Social Research Quantitative and Qualitative Approaches, 2nd edn , 2006 .
[173] Shohreh A. Kaynama,et al. A Proposal to Assess the Service Quality of Online Travel Agencies: An Exploratory Study , 2000 .
[174] Nuri Basoglu,et al. Adoption Factors of Mobile Services , 2006, 2006 International Conference on Mobile Business.
[175] Hans van der Heijden,et al. Effects of Context Relevance and Perceived Risk on User Acceptance of Mobile Information Services , 2005, ECIS.
[176] George D. Haddow,et al. Introduction to Emergency Management , 2003 .
[177] K. Moore,et al. Attitudes and intentions towards purchasing GM food , 2002 .
[178] Arno Scharl,et al. Diffusion and success factors of mobile marketing , 2005, Electron. Commer. Res. Appl..
[179] J. Gotlieb,et al. The Moderating Effects of Message Framing and Source Credibility on the Price-perceived Risk Relationship , 1994 .
[180] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[181] Wanda J. Orlikowski,et al. Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..
[182] R. Lissitz,et al. Effect of the number of scale points on reliability: A Monte Carlo approach. , 1975 .
[183] Colin J. Bennett. LOCATION-BASED SERVICES AND THE SURVEILLANCE OF MOBILITY: AN ANALYSIS OF PRIVACY RISKS IN CANADA , 2005 .
[184] Nicola Green. Who's watching whom? Monitoring and accountability in mobile relations , 2001 .
[185] Johan Hjelm,et al. Local Positioning Systems: LBS Applications and Services , 2006 .
[186] Aaron Ben-Ze'ev,et al. Privacy, emotional closeness, and openness in cyberspace , 2003, Comput. Hum. Behav..
[187] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[188] S. Feldman,et al. Gender Differences in Response to Terrorism and War , 2008 .
[189] Hock-Hai Teo,et al. Privacy Considerations in Location-Based Advertising , 2005, Designing Ubiquitous Information Environments.
[190] Rudy Hirschheim,et al. The Application of Neohumanist Principles in Information Systems Development , 1993, Human, Organizational, and Social Dimensions of Information Systems Development.
[191] P. Goodson. Predictors of Intention to Promote Family Planning: A Survey of Protestant Seminarians in the United States , 2002, Health education & behavior : the official publication of the Society for Public Health Education.
[192] J. Mccroskey. Reliability and validity of the willingness to communicate scale , 1992 .
[193] Norman L. Chervany,et al. What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..
[194] Iris A. Junglas,et al. A Research Model for Studying Privacy Concerns Pertaining to Location-Based Services , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[195] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[196] W. Neuman,et al. Social Research Methods: Qualitative and Quantitative Approaches , 2002 .
[197] Sharon L. Weinberg,et al. Data Analysis for the Behavioral Sciences Using SPSS , 2002 .
[198] William R. King,et al. A meta-analysis of the technology acceptance model , 2006, Inf. Manag..
[199] D. Brin. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? , 1998 .
[200] Geoff Boughton. The Community: Central to Emergency Risk Management , 1998 .
[201] Deborah Compeau,et al. Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..
[202] Wynne W. Chin,et al. A critical look at partial least squares modeling , 2009 .
[203] Detmar W. Straub,et al. Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..
[204] Zygmunt J. Haas,et al. A Scheme for Location-Based Internet Broadcasting and Its Applications , 2007, IEEE Communications Magazine.
[205] Henri Barki,et al. Explaining the Role of User Participation in Information System Use , 1994 .
[206] Axel Küpper,et al. Zone Services - An Approach for Location-Based Data Collection , 2006, The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services (CEC/EEE'06).
[207] Kieran Mathieson,et al. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..
[208] Ritu Agarwal,et al. Are Individual Differences Germane to the Acceptance of New Information Technologies , 1999 .
[209] H. Hexmoor,et al. Introducing agent based implementation of the theory of reasoned action: a case study in user acceptance of computer technology , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems.
[210] Youngjin Yoo,et al. It's all about attitude: revisiting the technology acceptance model , 2004, Decis. Support Syst..
[211] N. Malhotra,et al. Marketing Research: An Applied Approach , 2000 .
[212] Edgar Erdfelder,et al. G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences , 2007, Behavior research methods.
[213] Marisa Maio Mackay,et al. Young Australians' perceptions of mobile phone content and information services:an analysis of the motivations behind usage , 2007 .
[214] Fred D. Davis,et al. Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .
[215] Carol Saunders,et al. PLS: A Silver Bullet? , 2006 .
[216] Mark A. Fuller,et al. Applying TAM to e-services adoption: the moderating role of perceived risk , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[217] Christo Boshoff,et al. A Psychometric Assessment of E-S-Qual: A Scale to Measure Electronic Service Quality , 2007 .
[218] T. Cook,et al. Quasi-experimentation: Design & analysis issues for field settings , 1979 .
[219] S. Green. How Many Subjects Does It Take To Do A Regression Analysis. , 1991, Multivariate behavioral research.
[220] Kar Yan Tam,et al. What leads to user acceptance of digital libraries? , 2004, CACM.
[221] H. Raghav Rao,et al. Risk of Terrorism, Trust in Government, and e-Government Services: An Exploratory Study of Citizens’ Intention to use e Government Services in a Turbulent Environment , 2005 .
[222] George Agapiou,et al. Cell Broadcasting Opportunities of Modern Mobile Communications and Its Usage in Emergency Warning Facilities , 2009 .
[223] Dennis F. Galletta,et al. Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[224] Jane M. Howell,et al. Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..
[225] Church attendance in Northern Ireland: Catholics and protestants compared , 1996 .
[226] K. Perreault,et al. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2011 .
[227] Matti Rossi,et al. The Impact of Use Situation and Mobility on the Acceptance of Mobile Ticketing Services , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[228] Ajai S. Gaur,et al. Statistical Methods for Practice and Research: A Guide to Data Analysis Using SPSS , 2006 .
[229] Gerhard Navratil,et al. What makes Location-Based Services fail? , 2007, Location Based Services and TeleCartography.
[230] Anuket Bhaduri,et al. User Controlled Privacy Protection in Location-Based Services , 2003 .
[231] Charles C. Ragin,et al. The Comparative Method: Moving Beyond Qualitative and Quantitative Strategies. , 1990 .
[232] Russell E. Glasgow,et al. Predicting the Performance of Dental Hygiene Behaviors: An Examination of the Fishbein and Ajzen Model and Self‐Efficacy Expectations1 , 1988 .
[233] Kenneth C. C. Yang,et al. Exploring factors affecting the adoption of mobile commerce in Singapore , 2005, Telematics Informatics.
[234] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[235] Norman W. H. Blaikie,et al. Analyzing Quantitative Data: From Description to Explanation , 2000 .
[236] S. Kay. Global Security in the Twenty-First Century: The Quest for Power and the Search for Peace , 2006 .
[237] Judith Gebauer,et al. User requirements of mobile technology: results from a content analysis of user reviews , 2008, Inf. Syst. E Bus. Manag..
[238] Rita Marie Cain. Global Privacy Concerns and Regulation-- Is the United States a World Apart? , 2002 .
[239] Alexandros Nanopoulos,et al. Monitoring and Tracking Moving Objects in Mobile Environments , 2007 .
[240] Shaohan Cai,et al. Services quality dimensions of Internet retailing: an exploratory analysis , 2003 .
[241] Il Im,et al. The effects of perceived risk and technology type on users' acceptance of technologies , 2008, Inf. Manag..
[242] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[243] Detmar W. Straub,et al. Validating Instruments in MIS Research , 1989, MIS Q..
[244] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[245] Eija Kaasinen,et al. User Acceptance of Mobile Services , 2009, Int. J. Mob. Hum. Comput. Interact..
[246] B. Buzan,et al. Security: A New Framework for Analysis , 1997 .
[247] Stephen Sutton,et al. Predicting intentions and use of dental floss among adolescents: An application of the theory of planned behaviour , 1998 .
[248] Olivia R. Liu Sheng,et al. Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology , 1999, J. Manag. Inf. Syst..
[249] Dan J. Kim,et al. A B-to-C Trust Model for On-line Exchange , 2001 .
[250] Myeong-Cheol Park,et al. Mobile internet acceptance in Korea , 2005, Internet Res..
[251] I. Ajzen. The theory of planned behavior , 1991 .
[252] Sherah Kurnia,et al. Consumers' perception of mobile internet in Australia , 2006 .
[253] Deborah Compeau,et al. Application of Social Cognitive Theory to Training for Computer Skills , 1995, Inf. Syst. Res..
[254] Kalle Lyytinen,et al. A framework for selecting a location based service (LBS) strategy and service portfolio , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[255] Craig K. Enders,et al. A Primer on Maximum Likelihood Algorithms Available for Use With Missing Data , 2001 .
[256] J. Creswell,et al. Qualitative Research Designs , 2007 .
[257] T. Jick. Mixing Qualitative and Quantitative Methods: Triangulation in Action. , 1979 .
[258] L. Moore. The Emergency Alert System (EAS) and All-Hazard Warnings , 2009 .
[259] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[260] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[261] ThaeMin Lee,et al. THE IMPACT OF PERCEPTIONS OF INTERACTIVITY ON CUSTOMER TRUST AND TRANSACTION INTENTIONS IN MOBILE COMMERCE , 2005 .
[262] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[263] A. N. Oppenheim. Questionnaire Design and Attitude Measurement , 1966 .
[264] Gilbert A. Churchill,et al. Marketing Research: Methodological Foundations , 1976 .
[265] Philip E. T. Lewis,et al. Research Methods for Business Students , 2006 .
[266] Dennis S. Mileti,et al. Communication of Emergency Public Warnings: A Social Science Perspective and State-of-the-Art Assessment , 1990 .
[267] A. E. Anderson,et al. Using Vignettes in Cognitive Research on Establishment Surveys , 2004 .
[268] Elliott D. Kaplan. Understanding GPS : principles and applications , 1996 .
[269] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[270] John Steenbruggen,et al. The Value of Gi4DM for Transport & Water Management , 2005 .
[271] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[272] Andrew E. Smith. Automatic Extraction of Semantic Networks from Text using Leximancer , 2003, NAACL.
[273] H. Becker,et al. The Use of Vignettes in Survey Research , 1978 .
[274] Deborah Compeau,et al. Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..
[275] Gary Klein,et al. Prototyping mediators to project performance: Learning and interaction , 2006, J. Syst. Softw..
[276] Paul A. Pavlou,et al. Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..
[277] C. Rizos. TRENDS IN GEOPOSITIONING FOR LBS , NAVIGATION AND MAPPING , 2005 .
[278] Jaemin Han,et al. Architecture for Implementing the Mobile Government Services in Korea , 2004, ER.
[279] Norman A. Johnson,et al. Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..
[280] J. Dawes. Do Data Characteristics Change According to the Number of Scale Points Used? An Experiment Using 5-Point, 7-Point and 10-Point Scales , 2008 .
[281] J.R. Casar,et al. Building a framework to characterize location-based services , 2007, The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007).
[282] J. Finch. The Vignette Technique in Survey Research , 1987 .
[283] S. Hunt,et al. The Commitment-Trust Theory of Relationship Marketing , 1994 .
[284] N. Samama. Global Positioning: Technologies and Performance , 2008 .
[285] P. Norman,et al. Understanding pedestrians' road crossing decisions: an application of the theory of planned behaviour. , 1998, Health education research.
[286] Minna Pura. Linking perceived value and loyalty in location‐based mobile services , 2005 .
[287] Stuart J. Barnes,et al. The mobile commerce value chain: analysis and future developments , 2002, Int. J. Inf. Manag..
[288] Ingoo Han,et al. The impact of the online and offline features on the user acceptance of Internet shopping malls , 2004, Electron. Commer. Res. Appl..
[289] R. Zajonc. Attitudinal effects of mere exposure. , 1968 .
[290] Shumaila Y. Yousafzai,et al. Technology acceptance: a meta‐analysis of the TAM: Part 2 , 2007 .
[291] Maya Gadzheva,et al. Privacy concerns pertaining to location-based services , 2007 .
[292] Per E. Pedersen,et al. Adoption of Mobile Internet Services: An Exploratory Study of Mobile Commerce Early Adopters , 2005, J. Organ. Comput. Electron. Commer..
[293] George M. Giaglis,et al. Investigating Factors Affecting Actual Usage Patterns of Mobile Data Services , 2007 .
[294] Detmar W. Straub,et al. Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..
[295] A. Froomkin. The Death of Privacy? , 2000 .
[296] Shuchih Ernest Chang,et al. A User Study on the Adoption of Location Based Services , 2007, APWeb/WAIM Workshops.
[297] Michaela Koller. Risk as a Determinant of Trust , 1988 .
[298] S. Godar,et al. We know where you are: the ethics of LBS advertising , 2003 .
[299] Sherah Kurnia,et al. The Acceptance of Online Grocery Shopping , 2003, Bled eConference.
[300] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[301] Cipriano Forza,et al. Survey research in operations management: a process‐based perspective , 2002 .
[302] Izak Benbasat,et al. The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..
[303] Grant T. Savage,et al. Stakeholder analysis for multi‐sector innovations , 2002 .
[304] Lothar Fritsch,et al. Profiling and Location-Based Services (LBS) , 2008, Profiling the European Citizen.
[305] Magid Igbaria,et al. User acceptance of microcomputer technology: An empirical test , 1993 .
[306] Varun Grover,et al. Information systems research with an attitude , 2006, DATB.
[307] Stathes Hadjiefthymiades,et al. Mobile E-Commerce and Location-Based Services: Technology and Requirements , 2003, ScanGIS.
[308] Rahul C. Basole,et al. Location-Based Mobile Decision Support Systems and Their Effect On User Performance , 2004, AMCIS.
[309] Shirley Gregor,et al. The systems development or engineering approach to research in information systems: an action research perspective , 1999 .
[310] Charles D. Barrett. Understanding Attitudes and Predicting Social Behavior , 1980 .
[311] Fred D. Davis. User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts , 1993, Int. J. Man Mach. Stud..