The Impact of Privacy Risk Harm (RH) and Risk Likelihood (RL) on IT Acceptance: An Examination of a Student Information System
暂无分享,去创建一个
Joseph A. Cazier | E. Vance Wilson | B. Dawn Medlin | E. V. Wilson | B. Medlin | J. Cazier | E. Wilson
[1] R. Sharman,et al. Social and Human Elements of Information Security: Emerging Trends and Countermeasures , 2008 .
[2] Hamid R. Nemati,et al. Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .
[3] A. Patrick,et al. Privacy and Trust in Agent-Supported Distributed Learning , 2008 .
[4] Manuel Mogollon,et al. Cryptography and Security Services: Mechanisms and Applications , 2007 .
[5] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[6] Judy Drennan,et al. Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..
[7] Neil F. Doherty,et al. Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis , 2005, Inf. Resour. Manag. J..
[8] Naresh K. Malhotra,et al. A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena , 2005, Manag. Sci..
[9] B. Schneier. Inside risks , 1997 .
[10] F. Sultan,et al. Are the Drivers and Role of Online Trust the Same for All Web Sites and Consumers?: A Large-Scale Exploratory Empirical Study , 2005 .
[11] Bruce Schneier,et al. Two-factor authentication: too little, too late , 2005, CACM.
[12] B. Dawn Medlin,et al. Technology-based security threats: taxonomy of sources, targets and a process model of alleviation , 2005, Int. J. Inf. Technol. Manag..
[13] Sangkyun Kim,et al. Security of the internet-based instant messenger: Risks and safeguards , 2005, Internet Res..
[14] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[15] Mary J. Culnan,et al. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .
[16] Chang Liu,et al. Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..
[17] Younghwa Lee,et al. The Technology Acceptance Model: Past, Present, and Future , 2003, Commun. Assoc. Inf. Syst..
[18] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[19] Julia Brande Earp,et al. Innovative web use to learn about consumer behavior and online privacy , 2003, CACM.
[20] Marcel Creemers,et al. Understanding online purchase intentions: contributions from technology and trust perspectives , 2003, Eur. J. Inf. Syst..
[21] Paul A. Pavlou,et al. Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..
[22] Paulo B. Góes,et al. Privacy Protection of Binary Confidential Data Against Deterministic, Stochastic, and Insider Threat , 2002, Manag. Sci..
[23] Anup K. Ghosh,et al. Software security and privacy risks in mobile e-commerce , 2001, CACM.
[24] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[25] Jan H. P. Eloff,et al. Electronic commerce: the information-security challenge , 2000, Inf. Manag. Comput. Secur..
[26] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[27] Charles A. Snyder,et al. Personal information privacy: implications for MIS managers , 1999, Inf. Manag..
[28] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[29] Colin J. Bennett,et al. The Distribution of Privacy Risks: Who Needs Protection? , 1998, Inf. Soc..
[30] R. Peterson. A Meta-analysis of Cronbach's Coefficient Alpha , 1994 .
[31] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[32] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .