End-Users’ Acceptance of Biometrics Authentication to Secure E-Commerce within the Context of Saudi Culture: Applying the UTAUT Model

[1]  Fred D. Davis A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .

[2]  Rami Qahwaji,et al.  The Effects of Gender Differences in the Acceptance of Biometrics Authentication Systems within Online Transaction , 2009, 2009 International Conference on CyberWorlds.

[3]  Walfried M. Lassar,et al.  The relationship between consumer innovativeness, personal characteristics, and online banking adoption , 2005 .

[4]  Gina Green,et al.  Gender Differences in Perceptions and Use of Communication Technologies: A Diffusion of Innovation Approach , 2005, Inf. Resour. Manag. J..

[5]  Chorng-Shyong Ong,et al.  Gender differences in perceptions and relationships among dominants of e-learning acceptance , 2006, Comput. Hum. Behav..

[6]  Paul H. P. Yeow,et al.  User acceptance of Malaysian government multipurpose smartcard applications , 2009, Gov. Inf. Q..

[7]  Magid Igbaria,et al.  Computer anxiety and attitudes towards microcomputer use , 1990 .

[8]  Yi-Shun Wang,et al.  DETERMINANTS OF USER ACCEPTANCE OF INTERNET BANKING: AN EMPIRICAL STUDY , 2003 .

[9]  Reza Barkhi,et al.  Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..

[10]  Fred D. Davis,et al.  A Model of the Antecedents of Perceived Ease of Use: Development and Test† , 1996 .

[11]  Chris W. Clegg,et al.  Explaining intranet use with the technology acceptance model , 2001, J. Inf. Technol..

[12]  Young-Gul Kim,et al.  Extending the TAM for a World-Wide-Web context , 2000, Inf. Manag..

[13]  Chorng-Shyong Ong,et al.  Factors affecting engineers' acceptance of asynchronous e-learning systems in high-tech companies , 2004, Inf. Manag..

[14]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[15]  Julian Ming-Sung Cheng,et al.  Consumer acceptance of the internet as a channel of distribution in Taiwan—a channel function perspective , 2006 .

[16]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.

[17]  Robert M. Davison,et al.  GSS for presentation support , 2000, CACM.

[18]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[19]  Izak Benbasat,et al.  Research Report: Empirical Test of an EDI Adoption Model , 2001, Inf. Syst. Res..

[20]  Ashesh Mukherjee,et al.  The Effect of Novel Attributes on Product Evaluation : Explaining Consumer Resistance to Technological Innovation , 2001 .

[21]  Anil K. Jain Biometric Recognition: How Do I Know Who You Are? , 2005, SCIA.

[22]  Dennis F. Galletta,et al.  Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[23]  Andrew D. Gershoff,et al.  Meaningless Differentiation Revisited , 1997 .

[24]  Magid Igbaria,et al.  Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model , 1997, MIS Q..

[25]  Fred D. Davis User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts , 1993, Int. J. Man Mach. Stud..

[26]  Jijie Wang,et al.  Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT , 2007, Inf. Manag..

[27]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[28]  Michael G. Morris,et al.  User Acceptance of Information Technology: Theories and Models , 1996 .

[29]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[30]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[31]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[32]  Said S. Al-Gahtani,et al.  Computer Technology Acceptance Success Factors in Saudi Arabia: An Exploratory Study , 2004 .

[33]  Ritu Agarwal,et al.  The Role of Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technologies , 1997 .

[34]  Faith-Michael E. Uzoka,et al.  Empirical analysis of biometric technology adoption and acceptance in Botswana , 2009, J. Syst. Softw..

[35]  Viswanath Venkatesh,et al.  Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..

[36]  Emilio Mordini,et al.  Ethical and social implications of biometric identification technology. , 2007, Annali dell'Istituto superiore di sanita.

[37]  Detmar W. Straub,et al.  Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..

[38]  Xinran Y. Lehto,et al.  Adoption of Mobile Technologies for Chinese Consumers , 2007 .

[39]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[40]  I. Simonson,et al.  The Effect of New Product Features on Brand Choice , 1996 .

[41]  Suha AlAwadhi,et al.  The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[42]  K. Ruyter,et al.  What drives consumers to shop online? A literature review , 2004 .

[43]  Harold Thimbleby,et al.  Validating the unified theory of acceptance and use of technology (UTAUT) tool cross-culturally , 2007 .

[44]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[45]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[46]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[47]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[48]  Detmar W. Straub,et al.  Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..

[49]  Bernard C. Y. Tan,et al.  Dimensions of national culture and corporate adoption of IT infrastructure , 2001, IEEE Trans. Engineering Management.

[50]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[51]  Yan Xu,et al.  An Enhanced Technology Acceptance Model for Web-Based Learning , 2004, J. Inf. Syst. Educ..

[52]  William B. Gudykunst,et al.  Culture’s Consequences: Comparing Values, Behaviors, Institutions, and Organizations Across Nations [2nd edition]: Geert Hofstede , 2005 .

[53]  Wynne W. Chin,et al.  Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.

[54]  B. Clegg,et al.  An investigation into the acceptance of online banking in Saudi Arabia , 2009 .

[55]  Fred D. Davis,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .