The privacy-personalization paradox in mHealth services acceptance of different age groups
暂无分享,去创建一个
[1] D. Campbell,et al. Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.
[2] David F. Larcker,et al. Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .
[3] M. Sobel. Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models , 1982 .
[4] L. Verbrugge,et al. Gender and health: an update on hypotheses and evidence. , 1985, Journal of health and social behavior.
[5] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[6] Gayle J. Yaverbaum,et al. Computer science education in the People's Republic of China in the late 1980s , 1988, CACM.
[7] D. DavisFred,et al. User Acceptance of Computer Technology , 1989 .
[8] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[9] R. Kelly Rainer,et al. The Influence of Individual Differences on Skill in End-User Computing , 1992, J. Manag. Inf. Syst..
[10] B. Hughes. A Model for the Comprehensive Assessment of Older People and Their Carers , 1993 .
[11] Tawfiq M. Abu-Ghazzeh. MOVEMENT AND WAYFINDING IN THE KING SAUD UNIVERSITY BUILT ENVIRONMENT: A LOOK AT FRESHMAN ORIENTATION AND ENVIRONMENTAL INFORMATION , 1996 .
[12] R. L. Babcock,et al. Computer anxiety in young and older adults: Implications for human-computer interactions in older populations , 1997 .
[13] Detmar W. Straub,et al. Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..
[14] Robert J. Vokurka,et al. The empirical assessment of construct validity , 1998 .
[15] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[16] V. Venkatesh,et al. AGE DIFFERENCES IN TECHNOLOGY ADOPTION DECISIONS: IMPLICATIONS FOR A CHANGING WORK FORCE , 2000 .
[17] Bernard C. Y. Tan,et al. A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects , 2000, MIS Q..
[18] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[19] Paul A. Pavlou,et al. Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..
[20] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[21] David Gefen,et al. Reflections on the dimensions of trust and trustworthiness among online consumers , 2002, Data Base.
[22] Paul A. Pavlou,et al. Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..
[23] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[24] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[25] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[26] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[27] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[28] Daniel Z. Levin,et al. The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer , 2004, Manag. Sci..
[29] Mary J. Culnan,et al. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .
[30] Leo R. Vijayasarathy,et al. Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model , 2004, Inf. Manag..
[31] John Riedl,et al. E-Commerce Recommendation Applications , 2004, Data Mining and Knowledge Discovery.
[32] Viswanath Venkatesh,et al. Gender and age differences in employee decisions about new technology: an extension to the theory of planned behavior , 2005, IEEE Transactions on Engineering Management.
[33] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[34] ThaeMin Lee,et al. THE IMPACT OF PERCEPTIONS OF INTERACTIVITY ON CUSTOMER TRUST AND TRANSACTION INTENTIONS IN MOBILE COMMERCE , 2005 .
[35] Seigyoung Auh. The effects of soft and hard service attributes on loyalty: the mediating role of trust , 2005 .
[36] Honglei Li,et al. Technology acceptance model for internet banking: an invariance analysis , 2005, Inf. Manag..
[37] Amy J. Chaffin,et al. COGNITIVE LEARNING APPLIED TO OLDER ADULT LEARNERS AND TECHNOLOGY , 2005 .
[38] Robert S. H. Istepanian,et al. Ubiquitous M-Health Systems and the Convergence Towards 4G Mobile Technologies , 2006 .
[39] R. Istepanian,et al. M-Health: Emerging Mobile Health Systems , 2006 .
[40] J. J. Po-An Hsieh,et al. ScholarWorks @ Georgia State University , 2016 .
[41] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[42] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[43] Izak Benbasat,et al. The Effects of Personalizaion and Familiarity on Trust and Adoption of Recommendation Agents , 2006, MIS Q..
[44] David Gefen,et al. On the Need to Include National Culture as a Central Issue in E-Commerce Trust Beliefs , 2006, J. Glob. Inf. Manag..
[45] Izak Benbasat,et al. E-Commerce Product Recommendation Agents: Use, Characteristics, and Impact , 2007, MIS Q..
[46] Alper Ertürk,et al. Increasing organizational citizenship behaviors of Turkish academicians , 2007 .
[47] Jari Salo,et al. A conceptual model of trust in the online environment , 2007, Online Inf. Rev..
[48] Rod P. Githens,et al. Understanding interpersonal interaction in an online professional development course , 2007 .
[49] Kristopher J Preacher,et al. Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models , 2008, Behavior research methods.
[50] Keng Siau,et al. An Experimental Study on Ubiquitous commerce Adoption: Impact of Personalization and Privacy Concerns , 2008, J. Assoc. Inf. Syst..
[51] Jian-ming Wang,et al. Gender difference in knowledge of tuberculosis and associated health-care seeking behaviors: a cross-sectional study in a rural area of China , 2008, BMC public health.
[52] Deborah Compeau,et al. Assessing Between-Group Differences in Information Systems Research: A Comparison of Covariance-and Component-Based SEM , 2009, MIS Q..
[53] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[54] Ping Yu,et al. Health IT acceptance factors in long-term care facilities: A cross-sectional survey , 2009, Int. J. Medical Informatics.
[55] Kai H. Lim,et al. Web strategies to promote internet shopping: is cultural-customization needed? , 2009 .
[56] Heng Xu,et al. Exploring the role of overt vs. covert personalization strategy in privacy calculus , 2009 .
[57] Jyun-Cheng Wang,et al. Social interaction and continuance intention in online auctions: A social capital perspective , 2009, Decis. Support Syst..
[58] Gaby Odekerken-Schröder,et al. Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .
[59] Benjamin Schüz,et al. Planning bridges the intention–behaviour gap: Age makes a difference and strategy use explains why , 2010, Psychology & health.
[60] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[61] A. Haines,et al. The effectiveness of M-health technologies for improving health and health services: a systematic review protocol , 2010, BMC Research Notes.
[62] C. Advokat. What are the cognitive effects of stimulant medications? Emphasis on adults with attention-deficit/hyperactivity disorder (ADHD) , 2010, Neuroscience & Biobehavioral Reviews.
[63] Mihail Cocosila,et al. Adoption of mobile ICT for health promotion: an empirical investigation , 2010, Electron. Mark..
[64] S Akter,et al. mHealth - an Ultimate Platform to Serve the Unserved , 2010, Yearbook of Medical Informatics.
[65] Hua Wang,et al. Age differences in perceptions of online community participation among non-users: An extension of the Technology Acceptance Model , 2010, Comput. Hum. Behav..
[66] Martina Ziefle,et al. Acceptance of pervasive healthcare systems: A comparison of different implementation concepts , 2010, 2010 4th International Conference on Pervasive Computing Technologies for Healthcare.
[67] Bob Lee,et al. Age differences in constraints encountered by seniors in their use of computers and the internet , 2011, Comput. Hum. Behav..
[68] Paul A. Pavlou,et al. State of the information privacy literature: where are we now and where should we go? , 2011 .
[69] Jukka Ylitalo,et al. PLS marker variable approach to diagnosing and controlling for method variance , 2011, ICIS.
[70] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[71] Shahriar Akter,et al. Trustworthiness in mHealth information services: An assessment of a hierarchical model with mediating and moderating effects using partial least squares (PLS) , 2011, J. Assoc. Inf. Sci. Technol..
[72] Sonja Utz,et al. Internet use and online social support among same sex attracted individuals of different ages , 2011, Comput. Hum. Behav..
[73] Ing-Long Wu,et al. The adoption of mobile healthcare by hospital's professionals: An integrative perspective , 2011, Decis. Support Syst..
[74] Khaled Hassanein,et al. Protection Motivation Theory, Task-Technology Fit and the Adoption of Personal Health Records by Chronic Care Patients: The Role of Educational Interventions , 2011, AMCIS.
[75] Kallol Kumar Bagchi,et al. Exploring the role of espoused values on e-service adoption: A comparative analysis of the US and Nigerian users , 2012, Comput. Hum. Behav..
[76] Richard E. Lucas,et al. Cross-sectional age differences in personality: Evidence from nationally representative samples from Switzerland and the United States , 2012 .
[77] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[78] David C. Yen,et al. The effect of online privacy policy on consumer privacy concern and trust , 2012, Comput. Hum. Behav..
[79] James Y. L. Thong,et al. Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..
[80] Chuan-Hoo Tan,et al. Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users , 2013, MIS Q..
[81] Mika Immonen,et al. Telecare services for aging people: Assessment of critical factors influencing the adoption intention , 2013, Comput. Hum. Behav..
[82] Shahriar Akter,et al. Continuance of mHealth services at the bottom of the pyramid: the roles of service quality and trust , 2012, Electronic Markets.
[83] Xitong Guo,et al. UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELS , 2013 .
[84] Yongqiang Sun,et al. The dark side of elderly acceptance of preventive mobile health services in China , 2013, Electron. Mark..
[85] Tsipi Heart,et al. Older adults: Are they ready to adopt health-related ICT? , 2013, Int. J. Medical Informatics.
[86] Shuk Ying Ho,et al. The Effects of Web Personalization on User Attitude and Behavior: An Integration of the Elaboration Likelihood Model and Consumer Search Theory , 2014, MIS Q..
[87] Edward Shih-Tse Wang. Perceived control and gender difference on the relationship between trialability and intent to play new online games , 2014, Comput. Hum. Behav..
[88] Chun-Ming Chang,et al. Examining the role of perceived value in virtual communities continuance: its antecedents and the influence of experience , 2014, Behav. Inf. Technol..
[89] Upkar Varshney,et al. Mobile health: Four emerging themes of research , 2014, Decis. Support Syst..
[90] GuoXitong,et al. Understanding gender differences in m-health adoption: a modified theory of reasoned action model. , 2014 .
[91] Gerald C. Kane,et al. What's in IT for employees? Understanding the relationship between use and performance in enterprise social software , 2015, J. Strateg. Inf. Syst..