An empirical investigation of anti-spyware software adoption: A multitheoretical perspective
暂无分享,去创建一个
[1] Deborah Compeau,et al. Application of Social Cognitive Theory to Training for Computer Skills , 1995, Inf. Syst. Res..
[2] Karen D. Loch,et al. Ethics and computer use , 1995, CACM.
[3] Herman Wold,et al. Soft modelling: The Basic Design and Some Extensions , 1982 .
[4] Paul Jen-Hwa Hu,et al. Investigating healthcare professionals' decisions to accept telemedicine technology: an empirical test of competing theories , 2002, Inf. Manag..
[5] Shalom H. Schwartz,et al. Normative explanations of helping behavior: A critique, proposal, and empirical test , 1973 .
[6] Viswanath Venkatesh,et al. Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..
[7] R. Zmud,et al. Information technology implementation research: a technological diffusion approach , 1990 .
[8] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[9] Mun Y. Yi,et al. Understanding information technology acceptance by individual professionals: Toward an integrative view , 2006, Inf. Manag..
[10] Quey-Jen Yeh,et al. Threats and countermeasures for information system security: A cross-industry study , 2007, Inf. Manag..
[11] Susan J. Harrington,et al. The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..
[12] Younghwa Lee,et al. Investigating factors affecting the adoption of anti-spyware systems , 2005, CACM.
[13] Lori N. K. Leonard,et al. Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..
[14] Fred D. Davis,et al. Developing and Validating an Observational Learning Model of Computer Software Training and Skill Acquisition , 2003, Inf. Syst. Res..
[15] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[16] Jen-Her Wu,et al. What drives mobile commerce?: An empirical evaluation of the revised technology acceptance model , 2005, Inf. Manag..
[17] Detmar W. Straub,et al. Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..
[18] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[19] E. Rogers,et al. Diffusion of Innovations , 1964 .
[20] H. Kelman. Compliance, identification, and internalization three processes of attitude change , 1958 .
[21] Viswanath Venkatesh,et al. A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges , 2001, MIS Q..
[22] Kar Yan Tam,et al. Factors Affecting the Adoption of Open Systems: An Exploratory Study , 1997, MIS Q..
[23] A. Manstead,et al. Evaluating and extending the theory of planned behaviour , 1995 .
[24] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[25] I. Ajzen,et al. Predicting dishonest actions using the theory of planned behavior , 1991 .
[26] J. Hair. Multivariate data analysis , 1972 .
[27] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[28] Thomas F. Stafford,et al. Spyware: a view from the (online) street , 2005, CACM.
[29] Peter A. Todd,et al. Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication , 1992, MIS Q..
[30] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[31] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[32] Helen Kelley,et al. Morality and Computers: Attitudes and Differences in Moral Judgments , 1999, Inf. Syst. Res..
[33] Sree Nilakanta,et al. Implementation of Electronic Data Interchange: An Innovation Diffusion Perspective , 1994, J. Manag. Inf. Syst..
[34] M. Conner,et al. Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .
[35] Timothy Paul Cronan,et al. Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..
[36] Ojelanki K. Ngwenyama,et al. Communication Richness in Electronic Mail: Critical Social Theory and the Contextuality of Meaning , 1997, MIS Q..
[37] Martin R. Smith. Commonsense Computer Security , 1994 .
[38] Cheng-Kiang Farn,et al. Acceptance of electronic tax filing: A study of taxpayer intentions , 2006, Inf. Manag..
[39] Detmar W. Straub,et al. Validating Instruments in MIS Research , 1989, MIS Q..
[40] I. Ajzen. The theory of planned behavior , 1991 .
[41] Lei-da Chen,et al. Enticing online consumers: an extended technology acceptance perspective , 2002, Inf. Manag..
[42] Richard G. Netemeyer,et al. Measurement of Consumer Susceptibility to Interpersonal Influence , 1989 .