Examining the Impact of Training in the Unified Theory of Acceptance and Use of Technology
暂无分享,去创建一个
Jeffrey J. Johnson | Robert J. Mills | Matthew E. Harris | Christopher Fawson | Jeffrey J. Johnson | C. Fawson | R. Mills | M. Harris
[1] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[2] Olivia R. Liu Sheng,et al. Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology , 1999, J. Manag. Inf. Syst..
[3] S. Goldfinch,et al. Pessimism, Computer Failure, and Information Systems Development in the Public Sector , 2007 .
[4] I. Ajzen. The theory of planned behavior , 1991 .
[5] Kimberly A. Lawless,et al. Training Groups of End Users: Examining Group Interactions in a Computer-Based Learning Environment , 2006, J. Comput. Inf. Syst..
[6] A. Bandura. Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .
[7] J. Colquitt,et al. Toward an integrative theory of training motivation: a meta-analytic path analysis of 20 years of research. , 2000, The Journal of applied psychology.
[8] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[9] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[10] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[11] Janet H. Marler,et al. A Model of Employee Self-Service Technology Acceptance , 2005 .
[12] Rocco J. Perla,et al. Ten Common Misunderstandings, Misconceptions, Persistent Myths and Urban Legends about Likert Scales and Likert Response Formats and their Antidotes , 2007 .
[13] Judy E. Scott,et al. Managing risks in enterprise systems implementations , 2002, CACM.
[14] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[15] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[16] Winston Bennett,et al. A META-ANALYSIS OF THE RELATIONS AMONG TRAINING CRITERIA , 1997 .
[17] Blair H. Sheppard,et al. The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research , 1988 .
[18] Edward G. Carmines,et al. Reliability and Validity Assessment , 1979 .
[19] Fred Niederman,et al. Information Systems Management Issues for the 1990s , 1991, MIS Q..
[20] Robert J. Mills,et al. The Role Of End-User Training In Technology Acceptance , 2011, BIS 2011.
[21] C. Reigeluth. Instructional-Design Theories and Models , 1999 .
[22] M. David Merrill,et al. First principles of instruction , 2012 .
[23] Darren Dalcher,et al. Introduction: Avoiding IS/IT Implementation Failure , 2003, Technol. Anal. Strateg. Manag..
[24] James C. Wetherbe,et al. Key Issues in Information Systems Management: 1994-95 SIM Delphi Results , 1996, MIS Q..
[25] Sirkka L. Jarvenpaa,et al. The Use of Information Technology to Enhance Management School Education: A Theoretical View , 1995, MIS Q..
[26] Marilyn E. Gist,et al. EFFECTS OF ALTERNATIVE TRAINING METHODS ON SELF-EFFICACY AND PERFORMANCE IN COMPUTER SOFTWARE TRAINING , 1989 .
[27] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[28] Janet H. Marler,et al. Training and Effective Employee Information Technology Use , 2006 .
[29] Carol Saunders,et al. Computerspeak: Message Content and Perceived Appropriateness in an Educational Setting , 1993 .
[30] George Alliger,et al. Who's Afraid of Level 4 Evaluation? A Practical Approach. , 1993 .
[31] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[32] R. Vallerand. Toward A Hierarchical Model of Intrinsic and Extrinsic Motivation , 1997 .
[33] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[34] Jane M. Howell,et al. Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..
[35] Patricia Carlson,et al. A Review of MIS Research and Disciplinary Development , 1992, J. Manag. Inf. Syst..
[36] Ritu Agarwal,et al. Training experiences and usage intentions: a field study of a graphical user interface , 1996, Int. J. Hum. Comput. Stud..
[37] G. Glass,et al. Consequences of Failure to Meet Assumptions Underlying the Fixed Effects Analyses of Variance and Covariance , 1972 .
[38] James H. Dulebohn. 7. Information technology implementation: The need for compensation system congruency , 2003 .
[39] James C. Wetherbe,et al. Key issues in information systems management , 1987 .
[40] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .
[41] M. Lynne Markus,et al. If we build it, they will come: Designing information systems that people want to use , 1994 .
[42] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[43] B. Muthén,et al. Applying Multigroup Confirmatory Factor Models for Continuous Outcomes to Likert Scale Data Complicates Meaningful Group Comparisons , 2004 .
[44] Laurie J. Bassi. The Top Ten Trends. , 1996 .
[45] Darren George,et al. SPSS for Windows Step by Step: A Simple Guide and Reference , 1998 .