Computer security self-efficacy effect: An extention of Technology-to-Performance chain model
暂无分享,去创建一个
Najwa Hayaati Mohd Alwi | Madihah Mohd Saudi | M. Al-Shawabkeh | M. Al-Shawabkeh | Madihah Mohd Saudi | Najwa Hayaati MOHD ALWI
[1] Joseph A. Cazier,et al. E-business differentiation through value-based trust , 2006, Inf. Manag..
[2] Kate E. Stewart,et al. The Diffusion of Online Banking , 2003 .
[3] Gerold Riempp,et al. The State of Research on Information Systems Success , 2009, Bus. Inf. Syst. Eng..
[4] Brian T. Pentland,et al. USE AND PRODUCTIVITY IN PERSONAL COMPUTING: AN EMPIRICAL TEST , 1989 .
[5] Younghwa Lee,et al. Investigating factors affecting the adoption of anti-spyware systems , 2005, CACM.
[6] Siu-cheung Chan,et al. Understanding Internet Banking Adoption and Use Behavior: A Hong Kong Perspective , 2004, J. Glob. Inf. Manag..
[7] Xiaoni Zhang,et al. What do consumers really know about spyware? , 2005, CACM.
[8] Diane M. Strong,et al. Extending task technology fit with computer self-efficacy , 2006, DATB.
[9] David A. Wagner,et al. Analyzing internet voting security , 2004, CACM.
[10] Hanudin Amin. Journal of Internet Banking and Commerce Internet Banking Adoption among Young Intellectuals , 2022 .
[11] P. Hewer,et al. Consumer attitude and the usage and adoption of home‐based banking in the United Kingdom , 2002 .
[12] Madihah Mohd Saudi,et al. Efficient STAKCERT KDD Processes in Worm Detection , 2011 .
[13] Mark Keil,et al. Usefulness and ease of use: field study evidence regarding task considerations , 1995, Decis. Support Syst..
[14] Ephraim R. McLean,et al. The DeLone and McLean Model of Information Systems Success: A Ten-Year Update , 2003, J. Manag. Inf. Syst..
[15] Ephraim R. McLean,et al. Information Systems Success: The Quest for the Dependent Variable , 1992, Inf. Syst. Res..
[16] Jan Guynes Clark,et al. Why there aren't more information security research studies , 2004, Inf. Manag..
[17] Kenneth Jones. Classroom response systems: Using task technology fit to explore impact potential , 2010 .
[18] Amit Sachan,et al. Competing in the Age of Information Technology in a Developing Economy: Experiences of an Indian Bank , 2006, J. Cases Inf. Technol..
[19] Dale Goodhue,et al. Supporting users of corporate data : the effect of I/S policy choices , 1988 .
[20] A. Bandura,et al. Mechanisms governing empowerment effects: a self-efficacy analysis. , 1990, Journal of personality and social psychology.
[21] Gi Mun Kim,et al. Understanding dynamics between initial trust and usage intentions of mobile banking , 2009, Inf. Syst. J..
[22] Richard D. Johnson,et al. The Multilevel and Multifaceted Character of Computer Self-Efficacy: Toward Clarification of the Construct and an Integrative Framework for Research , 1998, Inf. Syst. Res..
[23] Deborah Compeau,et al. Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..
[24] Sheng Wu,et al. The Impact of Self-Monitoring on Theory of Planned Behavior:Study of Web Portal Usage , 2007 .
[25] A. Bandura,et al. Social foundation of thoughts and actions: A social cognitive theory , 1986 .
[26] Young U. Ryu,et al. Self-efficacy in information security: Its influence on end users' information security practice behavior , 2009, Comput. Secur..
[27] A. Bandura. Social cognitive theory: an agentic perspective. , 1999, Annual review of psychology.
[28] H. Zandhessami,et al. Determinants of user acceptance of internet banking: An empirical study , 2014 .
[29] Blake Ives,et al. The measurement of user information satisfaction , 1983, CACM.
[30] A. Bandura,et al. Social learning and personality development , 1964 .
[31] Diane M. Strong,et al. Extending the technology acceptance model with task-technology fit constructs , 1999, Inf. Manag..
[32] William Wresch,et al. Managerial Strategies Used to Overcome Technological Hurdles: A Review of E-Commerce Efforts Used by Innovative Caribbean Managers , 2006, J. Glob. Inf. Manag..
[33] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[34] A. Bandura,et al. Self-regulatory mechanisms governing the impact of social comparison on complex decision making. , 1991 .
[35] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[36] Viswanath Venkatesh,et al. Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration Research , 2010, J. Manag. Inf. Syst..
[37] Detmar W. Straub,et al. The measurement of the impacts of the IIC on the end‐users: The survey , 1997 .
[38] Mohamad Noorman Masrek,et al. Measuring campus portal effectiveness and the contributing factors , 2007 .
[39] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[40] Diane M. Strong,et al. The Effect of Task and Tool Experience on Maintenance CASE Tool Usage , 2003, Inf. Resour. Manag. J..
[41] JinKyu Lee,et al. Secure knowledge management and the semantic web , 2005, CACM.
[42] Richard A. M. Schilhavy,et al. A Research Framework for Information Systems Security , 2006 .
[43] L. R. Chao,et al. An integrated system theory of information security management , 2003, Inf. Manag. Comput. Secur..
[44] Paul A. Pavlou,et al. Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..
[45] Mario Piattini,et al. An Applicable Data Quality Model for Web Portal Data Consumers , 2008, World Wide Web.
[46] Madihah Mohd Saudi,et al. A new model for worm detection and response : development and evaluation of a new model based on knowledge discovery and data mining techniques to detect and respond to worm infection by integrating incident response, security metrics and apoptosis , 2011 .
[47] N. Miller,et al. Social Learning and Imitation , 1942 .
[48] Dale L. Goodhue,et al. User evaluations of MIS success: what are we really measuring? , 1992, Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences.
[49] Lei Bao,et al. Testing a new voting machine question methodology , 2008 .
[50] Deborah Compeau,et al. Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..
[51] A. Bandura. Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.
[52] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[53] V. Zeithaml,et al. E-S-QUAL A Multiple-Item Scale for Assessing Electronic Service Quality , 2004 .
[54] Diane M. Strong,et al. Assessing software maintenance tool utilization using task-technology fit and fitness-for-use models , 1998, J. Softw. Maintenance Res. Pract..
[55] M. Smith. Computer security-threats, vulnerabilities and countermeasures , 1989 .
[56] Dale Goodhue,et al. Task-Technology Fit and Individual Performance , 1995, MIS Q..
[57] Subhash Sharma,et al. Resistance to technological innovations: An examination of the role of self-efficacy and performance satisfaction , 1991 .
[58] Diane M. Strong,et al. Supporting software maintenance with software engineering tools: A Computed task-technology fit analysis , 1998, J. Syst. Softw..
[59] Gerold Riempp,et al. Development and validation of a model for assessing the success of employee portals , 2009, ECIS.
[60] Honglei Li,et al. Technology acceptance model for internet banking: an invariance analysis , 2005, Inf. Manag..
[61] Dale L. Goodhue,et al. The model underlying the measurement of the impacts of the IIC on the end‐users , 1997 .
[62] Viswanath Venkatesh,et al. User Acceptance Enablers in Individual Decision Making About Technology: Toward an Integrated Model , 2002, Decis. Sci..
[63] Dale Goodhue,et al. Understanding user evaluations of information systems , 1995 .
[64] Viswanath Venkatesh,et al. Adoption of Collaboration Technologies: Integrating Technology Acceptance and Collaboration Technology Research , 2008 .
[65] Sammy W. Pearson,et al. Development of a Tool for Measuring and Analyzing Computer User Satisfaction , 1983 .
[66] Dale L. Goodhue,et al. Development and Measurement Validity of a Task-Technology Fit Instrument for User Evaluations of Inf , 1998 .
[67] Wanda J. Orlikowski,et al. Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..