Acceptance Factors of Wearable Computing: An Empirical Investigation
暂无分享,去创建一个
[1] Klaus Krippendorff,et al. Agreement and Information in the Reliability of Coding , 2011 .
[2] Michael G. Morris,et al. User Acceptance of Information Technology: Theories and Models , 1996 .
[3] Tracy L. Tuten,et al. Personality determinants of online shopping : Explaining online purchase intentions using a hierarchical approach , 2007 .
[4] P. Costa,et al. Personality trait structure as a human universal. , 1997, The American psychologist.
[5] J. Mowen. The 3M Model of Motivation and Personality: Theory and Empirical Applications to Consumer Behavior , 1999 .
[6] Len Bass,et al. Issues in wearable computing: a CHI 97 workshop , 1997, SGCH.
[7] Tao Zhou,et al. The Effects of Personality Traits on User Acceptance of Mobile Commerce , 2011, Int. J. Hum. Comput. Interact..
[8] Fred D. Davis. A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .
[9] Woodrow Barfield,et al. Issues in the design and use of wearable computers , 1998, Virtual Reality.
[10] Dong-Hee Shin,et al. Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk , 2010, Int. J. Mob. Commun..
[11] Philipp Mayring,et al. Qualitative Content Analysis: Theoretical Background and Procedures , 2015 .
[12] Bradley J. Rhodes,et al. The wearable remembrance agent: A system for augmented memory , 1997, Digest of Papers. First International Symposium on Wearable Computers.
[13] P. Planing. Innovation Acceptance: The Case of Advanced Driver-Assistance Systems , 2014 .
[14] Hee-Cheol Kim,et al. Six Human Factors to Acceptability of Wearable Computers , 2013 .
[15] U. Flick. An Introduction to Qualitative Research , 1998 .
[16] M. Marshall. Sampling for qualitative research. , 1996, Family practice.
[17] Dimitris Karaiskos,et al. A predictive model for the acceptance of pervasive information systems by individuals , 2009 .
[18] Kenneth L. Kraemer,et al. Computerization Movements and Technology Diffusion: From Mainframes to Ubiquitous Computing , 2008 .
[19] U. Flick. An introduction to qualitative research, 4th ed. , 2009 .
[20] Clyde W. Holsapple,et al. Measuring perceived security in B2C electronic commerce website usage: A respecification and validation , 2014, Decis. Support Syst..
[21] Gerd Kortuem,et al. Context-aware, adaptive wearable computers as remote interfaces to 'intelligent' environments , 1998, Digest of Papers. Second International Symposium on Wearable Computers (Cat. No.98EX215).
[22] M. Patton,et al. Qualitative evaluation and research methods , 1992 .