Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users
暂无分享,去创建一个
[1] Eric T. G. Wang,et al. Understanding customers' repeat purchase intentions in B2C e‐commerce: the roles of utilitarian value, hedonic value and perceived risk , 2014, Inf. Syst. J..
[2] Qing Hu,et al. User behaviour towards protective information technologies: the role of national cultural differences , 2009, Inf. Syst. J..
[3] Mike Z. Yao,et al. Predicting Self-Protections of Online Privacy , 2008, Cyberpsychology Behav. Soc. Netw..
[4] S. Finney. Nonnormal and categorical data in structural equation modeling , 2013 .
[5] Ross J. Anderson,et al. The Economics of Online Crime , 2009 .
[6] Yong-Hui Li,et al. Applying Theory of Perceived Risk and Technology Acceptance Model in the Online Shopping Channel , 2009 .
[7] Jonathan Jackson,et al. Revisiting Risk Sensitivity in the Fear of Crime , 2011 .
[8] Paul A. Pavlou,et al. Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..
[9] Rudolf R. Sinkovics,et al. The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .
[10] Tyler Moore,et al. How do consumers react to cybercrime? , 2012, 2012 eCrime Researchers Summit.
[11] Dong-Hee Shin,et al. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..
[12] Xianggui Qu,et al. Multivariate Data Analysis , 2007, Technometrics.
[13] Ohbyung Kwon,et al. An empirical study of the factors affecting social network service use , 2010, Comput. Hum. Behav..
[14] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[15] B. Muthén,et al. Robust inference using weighted least squares and quadratic estimating equations in latent variable modeling with categorical and continuous outcomes , 1997 .
[16] L. Roberts,et al. Applying the Theory of Planned Behaviour to predicting online safety behaviour , 2013 .
[17] Erik Brynjolfsson,et al. The Contribution of Information Technology to Consumer Welfare , 1996, Inf. Syst. Res..
[18] María-del-Carmen Alarcón-del-Amo,et al. Adoption of social networking sites by Italian , 2013, Information Systems and e-Business Management.
[19] Vincent S. Lai,et al. Literature derived reference models for the adoption of online shopping , 2005, Inf. Manag..
[20] Yongbing Jiao,et al. A Study of the Impact of Social Media Characteristics on Customer Adoption Intention of Social Media , 2013 .
[21] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[22] Anthony D. Miyazaki,et al. Reducing online privacy risk to facilitate e‐service adoption: the influence of perceived ease of use and corporate credibility , 2010 .
[23] Kevin Grant,et al. Big TAM in Oman: Exploring the promise of on-line banking, its adoption by customers and the challenges of banking in Oman , 2012, Int. J. Inf. Manag..
[24] Wesley G. Skogan,et al. The Impact of Victimization on Fear , 1987 .
[25] S. Tan. Strategies for reducing consumers’ risk aversion in Internet shopping , 1999 .
[26] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[27] W. H. Rodgers. Consumer behavior as risk taking; a new model and new hypotheses. , 1969 .
[28] Khaled M. S. Faqih,et al. Integrating perceived risk and trust with technology acceptance model: An empirical assessment of customers' acceptance of online shopping in Jordan , 2011, 2011 International Conference on Research and Innovation in Information Systems.
[29] Tom R. Tyler,et al. Assessing the Risk of Crime Victimization: The Integration of Personal Victimization Experience and Socially Transmitted Information , 1984 .
[30] Younghwa Lee,et al. Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..
[31] Princely Ifinedo,et al. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..
[32] Qing Hu,et al. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..
[33] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[34] Daniel Battu,et al. Measuring the Information Society (11 October 2012) - ITU , 2016 .
[35] A. Wåhlberg,et al. Risk perception and the media , 2000 .
[36] Tyler Moore,et al. Measuring the Cost of Cybercrime , 2012, WEIS.
[37] Rolph E. Anderson,et al. Multivariate Data Analysis (7th ed. , 2009 .
[38] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[39] Marijn Scholte,et al. Fear of Crime and Feelings of Unsafety in European Countries: Macro and Micro Explanations in Cross-National Perspective , 2013 .
[40] K. Ferraro,et al. The Measurement of Fear of Crime , 1987 .
[41] Hsiu-Fen Lin,et al. Understanding Behavioral Intention to Participate in Virtual Communities , 2006, Cyberpsychology Behav. Soc. Netw..
[42] Erik Brynjolfsson,et al. Consumer Surplus in the Digital Economy: Estimating the Value of Increased Product Variety at Online Booksellers , 2003, Manag. Sci..
[43] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[44] Charles J. Kacmar,et al. The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..
[45] Kenneth Saban,et al. A Critical Look at the Impact of Cybercrime on Consumer Internet Behavior , 2002 .
[46] Dong-Hee Shin,et al. Applying the Technology Acceptance Model and Flow Theory to Cyworld User Behavior: Implication of the Web2.0 User Acceptance , 2008, Cyberpsychology Behav. Soc. Netw..
[47] T. C. Edwin Cheng,et al. Adoption of internet banking: An empirical study in Hong Kong , 2006, Decis. Support Syst..
[48] Tobias Kretschmer,et al. ICT and productivity: conclusions from the empirical literature , 2013, Inf. Econ. Policy.
[49] B. Byrne,et al. Testing for the equivalence of factor covariance and mean structures: The issue of partial measurement invariance. , 1989 .
[50] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[51] Sirkka L. Jarvenpaa,et al. Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..
[52] Edmund F. McGarrell,et al. Neighborhood disorder, integration, and the fear of crime , 1997 .
[53] Cormac Herley,et al. Sex, Lies and Cyber-Crime Surveys , 2011, WEIS.
[54] Laura M. Stapleton,et al. An Assessment of Practical Solutions for Structural Equation Modeling with Complex Sample Data , 2006 .
[55] Charles D. Barrett. Understanding Attitudes and Predicting Social Behavior , 1980 .
[56] Lina Zhou,et al. ONLINE SHOPPING ACCEPTANCE MODEL — A CRITICAL SURVEY OF CONSUMER FACTORS IN ONLINE SHOPPING , 2007 .
[57] Ming-Chi Lee,et al. Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit , 2009, Electron. Commer. Res. Appl..
[58] A. Soares,et al. Examining the Technology Acceptance Model in the Adoption of Social Ne tworks , 2011 .
[59] Nils Urbach,et al. Structural Equation Modeling in Information Systems Research Using Partial Least Squares , 2010 .
[60] C. Keane. Victimization and fear: Assessing the role of offender and offence , 1995 .
[61] Ingoo Han,et al. Effect of trust on customer acceptance of Internet banking , 2002, Electron. Commer. Res. Appl..
[62] Marc Gertz,et al. FEAR, TV NEWS, AND THE REALITY OF CRIME* , 2000 .
[63] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[64] Tiago Oliveira,et al. Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application , 2014, Int. J. Inf. Manag..
[65] Roger E. Millsap,et al. Assessing Factorial Invariance in Ordered-Categorical Measures , 2004 .
[66] H. Zandhessami,et al. Determinants of user acceptance of internet banking: An empirical study , 2014 .
[67] George H. Polychronopoulos,et al. An extension of TAM model with IDT and security/privacy risk in the adoption of internet banking services in Greece , 2012 .
[68] Tihomir Asparouhov,et al. Sampling Weights in Latent Variable Modeling , 2005 .
[69] Izak Benbasat,et al. Integrating Diffusion of Innovations and Theory of Reasoned Action models to predict utilization of information technology by end-users , 1996 .
[70] David C. May,et al. AN EMPIRICAL ASSESSMENT OF THE “THREAT OF VICTIMIZATION:” CONSIDERING FEAR OF CRIME, PERCEIVED RISK, AVOIDANCE, AND DEFENSIVE BEHAVIORS , 2007 .
[71] A. Liska,et al. Fear of Crime and Constrained Behavior Specifying and Estimating a Reciprocal Effects Model , 1988 .
[72] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[73] Linda Heath,et al. Mass Media and Fear of Crime , 1996 .
[74] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[75] Hamed Qahri Saremi,et al. Factors Affecting Internet Banking Pre-usage Expectation Formation , 2013, 2013 46th Hawaii International Conference on System Sciences.
[76] Javier Huerta Bravo,et al. DIGITAL AGENDA FOR EUROPE , 2011 .
[77] I. Ajzen. The theory of planned behavior , 1991 .
[78] Miriam J. Metzger. Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..
[79] Yair Amichai-Hamburger,et al. The impact of the Internet on the social lives of users: A representative sample from 13 countries , 2011, Comput. Hum. Behav..
[80] Alan D. Smith,et al. Cybercriminal impacts on online business and consumer confidence , 2004, Online Inf. Rev..
[81] M. S. Cunningham. The Major Dimensions of Perceived Risk , 1967 .
[82] A. Liska,et al. Feeling Safe by Comparison: Crime in the Newspapers , 1990 .
[83] James C. Anderson,et al. STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .
[84] Ingoo Han,et al. E of trust on customer acceptance of Internet banking , 2002 .
[85] John Ingham,et al. Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..
[86] C. Hale,et al. Fear of Crime: A Review of the Literature1 , 1996 .
[87] Phillip W. Braddy,et al. Power and sensitivity of alternative fit indices in tests of measurement invariance. , 2008, The Journal of applied psychology.
[88] Paul Hunton,et al. The growing phenomenon of crime and the internet: A cybercrime execution and analysis model , 2009, Comput. Law Secur. Rev..
[89] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[90] Payam Hanafizadeh,et al. A systematic review of Internet banking adoption , 2014, Telematics Informatics.
[91] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[92] Marianne Junger,et al. Trends in violent crime: a comparison between police statistics and victimization surveys , 2002 .
[93] Allison T. Chappell,et al. Fear of Crime Revisited: Examining the Direct and Indirect Effects of Disorder, Risk Perception, and Social Capital , 2011 .
[94] Gordon R. Foxall,et al. Technology acceptance: a meta‐analysis of the TAM: Part 1 , 2007 .
[95] Hsi-Peng Lu,et al. Why people use social networking sites: An empirical study integrating network externalities and motivation theory , 2011, Comput. Hum. Behav..
[96] R. Sickles,et al. An International Comparison of Technology Adoption and Efficiency: A Dynamic Panel Model , 1999 .
[97] M. Marmot,et al. Association between fear of crime and mental health and physical functioning. , 2007, American journal of public health.
[98] D. Straub,et al. A CRITICAL LOOK AT THE USE OF PLS-SEM IN MISQ , 2012 .