Motivating information system engineers' acceptance of Privacy by Design in China: An extended UTAUT model
暂无分享,去创建一个
Nengmin Wang | Bin Jiang | Fei Bu | Qi Jiang | Nengmin Wang | Bin Jiang | Qiang Jiang | Fei Bu
[1] H. Kaur,et al. Impact of advertising strategies on the cognitive and behavioral component of attitude of women consumers , 2017 .
[2] Andrew Schwarz,et al. Examining the Impact and Detection of the "Urban Legend" of Common Method Bias , 2017, DATB.
[3] Mazuri Abd. Ghani,et al. Investigating the role of unified theory of acceptance and use of technology (UTAUT) in internet banking adoption context , 2018 .
[4] A. Tarhini,et al. Factors affecting the adoption of e-learning systems in Qatar and USA: Extending the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) , 2017, Educational Technology Research and Development.
[5] I. Ajzen,et al. Accessibility and stability of predictors in the theory of planned behavior. , 1992 .
[6] K. Faqih. An empirical analysis of factors predicting the behavioral intention to adopt Internet shopping technology among non-shoppers in a developing country context: Does gender matter? , 2016 .
[7] Chi-hoon Song,et al. Acceptance of public cloud storage services in South Korea: A multi-group analysis , 2020, Int. J. Inf. Manag..
[8] Ronny Scherer,et al. The technology acceptance model (TAM): A meta-analytic structural equation modeling approach to explaining teachers' adoption of digital technology in education , 2019, Comput. Educ..
[9] Nripendra P. Rana,et al. A meta-analysis based modified unified theory of acceptance and use of technology (meta-UTAUT): a review of emerging literature. , 2020, Current opinion in psychology.
[10] Sung-Joon Yoon,et al. Predicting the use of online information services based on a modified UTAUT model , 2014, Behav. Inf. Technol..
[11] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[12] Yogesh Kumar Dwivedi,et al. RFID systems in libraries: An empirical examination of factors affecting system use and user satisfaction , 2013, Int. J. Inf. Manag..
[13] Christer Carlsson,et al. Adoption of Mobile Devices/Services — Searching for Answers with the UTAUT , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[14] Nancy Dickie,et al. Privacy by design prevents data headaches later , 2017 .
[15] John Hulland,et al. Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .
[16] S. Castro,et al. Acceptance of Mobile Health Applications: Examining Key Determinants and Moderators , 2019, Front. Psychol..
[17] W. Reinartz,et al. An Empirical Comparison of the Efficacy of Covariance-Based and Variance-Based SEM , 2009 .
[18] D. Mackinnon,et al. Equivalence of the Mediation, Confounding and Suppression Effect , 2000, Prevention Science.
[19] Archan Misra,et al. Is Privacy Regulation Slowing Down Research on Pervasive Computing? , 2020, Computer.
[20] S. Wold,et al. PLS-regression: a basic tool of chemometrics , 2001 .
[21] S. Haider,et al. Effect of intervention on employees' intentions to use environmentally sustainable work practices: A field experiment. , 2019, Journal of environmental management.
[22] R. Peterson. A Meta-analysis of Cronbach's Coefficient Alpha , 1994 .
[23] Botjan umak,et al. The acceptance and use of interactive whiteboards among teachers , 2016 .
[24] Yang Zhao,et al. What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age , 2017, Int. J. Inf. Manag..
[25] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[26] Peter Schaar,et al. Privacy by Design , 2010 .
[27] Huigang Liang,et al. "Privacy by Design" implementation: Information system engineers' perspective , 2020, Int. J. Inf. Manag..
[28] Yogesh Kumar Dwivedi,et al. Exploring consumer adoption of proximity mobile payments , 2014, Journal of Strategic Marketing.
[29] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[30] David Wright,et al. A Strategy for Operationalizing Privacy by Design , 2014, Inf. Soc..
[31] Francisco J. García-Peñalvo,et al. Informal tools in formal contexts: Development of a model to assess the acceptance of mobile technologies among teachers , 2016, Comput. Hum. Behav..
[32] Charles Z. Liu,et al. Method Effects in IS Survey Research: An Assessment and Recommendations , 2007, Commun. Assoc. Inf. Syst..
[33] A. Safari,et al. Multiple pathways linking environmental knowledge and awareness to employees’ green behavior , 2018 .
[34] Juin-Ming Tsai,et al. Acceptance and resistance of telehealth: The perspective of dual-factor concepts in technology adoption , 2019, Int. J. Inf. Manag..
[35] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[36] M. Lindell,et al. Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.
[37] Tiago Oliveira,et al. Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context , 2013, Decis. Support Syst..
[38] A. Cavoukian,et al. Privacy by Design: essential for organizational accountability and strong business practices , 2010 .
[39] Yogesh Kumar Dwivedi,et al. The unified theory of acceptance and use of technology (UTAUT): a literature review , 2015, J. Enterp. Inf. Manag..
[40] Marko Sarstedt,et al. Goodness-of-fit indices for partial least squares path modeling , 2013, Comput. Stat..
[41] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[42] Blair H. Sheppard,et al. The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research , 1988 .
[43] Yogesh Kumar Dwivedi,et al. Adoption of online public grievance redressal system in India: Toward developing a unified view , 2016, Comput. Hum. Behav..
[44] Ahmet Ayaz,et al. An analysis on the unified theory of acceptance and use of technology theory (UTAUT): Acceptance of electronic document management system (EDMS) , 2020 .
[45] Ronald Leenes,et al. Privacy regulation cannot be hardcoded. A critical comment on the ‘privacy by design’ provision in data-protection law , 2014 .
[46] Johan Egebark,et al. Liking what others “Like”: using Facebook to identify determinants of conformity , 2018 .
[47] Marko Sarstedt,et al. Mirror, mirror on the wall: a comparative evaluation of composite-based structural equation modeling methods , 2017, Journal of the Academy of Marketing Science.
[48] Ann Cavoukian,et al. Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D , 2010 .
[49] Avelie Stuart,et al. United in Diversity, Divided in Adversity? Support for Right-Wing Eurosceptic Parties in the Face of Threat Differs Across Nations , 2019, Front. Psychol..
[50] Adel Yazdanmehr,et al. Peers matter: The moderating role of social influence on information security policy compliance , 2020, Inf. Syst. J..
[51] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[52] Ann Cavoukian,et al. Privacy by Design [Leading Edge] , 2012, IEEE Technol. Soc. Mag..
[53] P. Hustinx. Privacy by design: delivering the promises , 2010 .
[54] Mun Y. Yi,et al. Understanding information technology acceptance by individual professionals: Toward an integrative view , 2006, Inf. Manag..
[55] David A. Hoffman,et al. Remote home health care technologies: how to ensure privacy? Build it in: Privacy by Design , 2010 .
[56] Nripendra P. Rana,et al. Understanding consumer adoption of mobile payment in India: Extending Meta-UTAUT model with personal innovativeness, anxiety, trust, and grievance redressal , 2020, Int. J. Inf. Manag..
[57] Flora Stormer,et al. Acting at Work , 2008 .
[58] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[59] Nalin Asanka Gamagedara Arachchilage,et al. Why developers cannot embed privacy into software systems?: An empirical investigation , 2018, EASE.
[60] Wang Hu,et al. Factors influencing the adoption of mHealth services in a developing country: A patient-centric study , 2020, Int. J. Inf. Manag..
[61] M. Sarstedt,et al. A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .
[62] R. Bagozzi,et al. On the evaluation of structural equation models , 1988 .
[63] Jaap-Henk Hoepman,et al. A Critical Analysis of Privacy Design Strategies , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[64] Viswanath Venkatesh,et al. Going beyond intention: Integrating behavioral expectation into the unified theory of acceptance and use of technology , 2017, J. Assoc. Inf. Sci. Technol..
[65] V. Otter,et al. Alley cropping systems as Ecological Focus Areas: A PLS-analysis of German farmers’ acceptance behaviour , 2021 .
[66] Yu-Chung Taso,et al. The impact of problem awareness and biospheric values on the intention to use a smart meter , 2020 .
[67] M. Majid,et al. The Bandwagon Effect and Consumption of Fashion Goods: A Case of Young Consumers of Pakistan , 2020, Scholedge International Journal of Management & Development ISSN 2394-3378.
[68] Mahmoud Abdelrahman,et al. Acceptance of autonomous delivery vehicles for last-mile delivery in Germany – Extending UTAUT2 with risk perceptions , 2020, Transportation Research Part C: Emerging Technologies.
[69] Habibur Rahman,et al. Investigating factors influencing the physicians' adoption of electronic health record (EHR) in healthcare system of Bangladesh: An empirical study , 2019, Int. J. Inf. Manag..
[70] Ann Cavoukian,et al. Advances in Biometric Encryption: Taking Privacy by Design from Academic Research to Deployment , 2012 .
[71] Eran Toch,et al. Privacy by designers: software developers’ privacy mindset , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[72] Marko Sarstedt,et al. PLS-SEM: Indeed a Silver Bullet , 2011 .
[73] S. Bamberg,et al. Twenty years after Hines, Hungerford, and Tomera: A new meta-analysis of psycho-social determinants of pro-environmental behaviour , 2007 .
[74] Juan Sánchez-Fernández,et al. Generalising user behaviour in online travel sites through the Travel 2.0 website acceptance model , 2012, Online Inf. Rev..
[75] Ann Cavoukian,et al. Start with Privacy by Design in All Big Data Applications , 2018 .
[76] Ali Tarhini,et al. Impact of individualism and collectivism over the individual's technology acceptance behaviour: A multi-group analysis between Pakistan and Turkey , 2015, J. Enterp. Inf. Manag..
[77] Jukka Ylitalo,et al. PLS marker variable approach to diagnosing and controlling for method variance , 2011, ICIS.
[78] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[79] B. Wee,et al. Factors influencing the acceptance and use of a bicycle sharing system: Applying an extended Unified Theory of Acceptance and Use of Technology (UTAUT) , 2020, Case Studies on Transport Policy.
[80] Suneel Pandey,et al. Understanding public knowledge and awareness on e-waste in an urban setting in India , 2014 .
[81] A. Burton-Jones. Minimizing Method Bias Through Programmatic Research , 2009 .
[82] Tao Zhou,et al. Integrating TTF and UTAUT to explain mobile banking user adoption , 2010, Comput. Hum. Behav..
[83] Sejin Ha,et al. Understanding Consumer Recycling Behavior: Combining the Theory of Planned Behavior and the Norm Activation Model , 2014 .
[84] Elfindah Princes,et al. Taking Advantage of Social Conformity in Entrepreneurship , 2020, GATR Journal of Management and Marketing Review.
[85] Yogesh Kumar Dwivedi,et al. An empirical validation of a unified model of electronic government adoption (UMEGA) , 2017, Gov. Inf. Q..
[86] Marc Langheinrich,et al. Engineering Privacy by Design: Are engineers ready to live up to the challenge? , 2018, Inf. Soc..
[87] Yogesh Kumar Dwivedi,et al. Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model , 2017, Information Systems Frontiers.
[88] Jalayer Khalilzadeh,et al. Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry , 2017, Comput. Hum. Behav..
[89] Michel Tenenhaus,et al. PLS path modeling , 2005, Comput. Stat. Data Anal..
[90] Emma L. Slade,et al. Examining antecedents of consumers’ pro-environmental behaviours: TPB extended with materialism and innovativeness , 2021 .
[91] I. Ajzen,et al. Attitude-behavior relations: A theoretical analysis and review of empirical research. , 1977 .
[92] Viswanath Venkatesh,et al. Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead , 2016, J. Assoc. Inf. Syst..
[93] Iryna Pentina,et al. Mobile payments adoption by US consumers: an extended TAM , 2017 .
[94] Eleni Dermentzi,et al. UK public’s intention to engage with academia via online technologies , 2017, Behav. Inf. Technol..
[95] Nizar Souiden,et al. The interplay of counter-conformity motivation, social influence, and trust in customers' intention to adopt Internet banking services: The case of an emerging country , 2016 .
[96] R. Peterson. Constructing Effective Questionnaires , 1999 .
[97] Sanjay Misra,et al. Acceptance and Use of E-Learning Based on Cloud Computing: The Role of Consumer Innovativeness , 2014, ICCSA.
[98] Vitaliy Mezhuyev,et al. Towards a conceptual model for examining the impact of knowledge management factors on mobile learning acceptance , 2020 .
[99] Cengiz Acarturk,et al. The use and acceptance of ICT by senior citizens: a comparison of technology acceptance model (TAM) for elderly and young adults , 2018, Universal Access in the Information Society.
[100] Marc Langheinrich,et al. Inside the Organization: Why Privacy and Security Engineering Is a Challenge for Engineers , 2018, Proceedings of the IEEE.
[101] Sarah Spiekermann,et al. The challenges of privacy by design , 2012, Commun. ACM.
[102] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[103] Tiago Oliveira,et al. International Journal of Information Management , 2014 .
[104] Yogesh Kumar Dwivedi,et al. A generalised adoption model for services: A cross-country comparison of mobile health (m-health) , 2016, Gov. Inf. Q..
[105] Anna Romanou,et al. The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise , 2017, Comput. Law Secur. Rev..
[106] I. Ajzen. The theory of planned behavior , 1991 .
[107] Yogesh Kumar Dwivedi,et al. Citizens’ adoption of an electronic government system: towards a unified view , 2015, Information Systems Frontiers.
[108] Shirley Taylor,et al. Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions , 1995 .
[109] M. Ronaghi,et al. A contextualized study of the usage of the Internet of things (IoTs) in smart farming in a typical Middle Eastern country within the context of Unified Theory of Acceptance and Use of Technology model (UTAUT) , 2020 .
[110] Sevda Helpap,et al. Employees’ emotions in change: advancing the sensemaking approach , 2016 .