An Experimental Study on Ubiquitous commerce Adoption: Impact of Personalization and Privacy Concerns
暂无分享,去创建一个
Keng Siau | Fiona Fui-Hoon Nah | Hong Sheng | K. Siau | F. Nah | Hong Sheng
[1] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[2] Keng Siau,et al. Mobile Commerce: Promises, Challenges and Research Agenda , 2001, J. Database Manag..
[3] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[4] Jiang Wu,et al. 4th-generation Wireless Infrastructures: Scenarios and Research Challenges , 2001, IEEE Wirel. Commun..
[5] Richard T. Watson,et al. The U-Constructs: Four Information Drives , 2006, Commun. Assoc. Inf. Syst..
[6] Holtjona Galanxhi-Janaqi,et al. Privacy Issues in the Era of Ubiquitous Commerce , 2006, Electron. Mark..
[7] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[8] Ray Bert,et al. Book Review: \IThe World Is Flat: A Brief History of the Twenty-First Century\N by Thomas L. Friedman. New York: Farrar, Straus and Giroux, 2005 , 2006 .
[9] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[10] Alok Gupta,et al. GIST: A Model for Design and Management of Content and Interactivity of Customer-Centric Web Sites , 2004, MIS Q..
[11] Bernard J. Jaworski,et al. E-Commerce , 2021, Strategic International Restaurant Development.
[12] R. Belk. Situational Variables and Consumer Behavior , 1975 .
[13] Andrew E. Fano,et al. The future of business services in the age of ubiquitous computing , 2002, CACM.
[14] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[15] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[16] Keng Siau,et al. Values of Silent Commerce: A Study Using Value-Focused Thinking Approach , 2005, AMCIS.
[17] George Roussos,et al. Mobile Identity Management: An Enacted View , 2003, Int. J. Electron. Commer..
[18] Stefan Figge,et al. Situation-dependent services—a challenge for mobile network operators , 2004 .
[19] Kris Ven,et al. The Impact of Ideology on the Organizational Adoption of Open Source Software , 2008, J. Database Manag..
[20] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[21] Lei-da Chen,et al. Nomadic Culture: Cultural Support for Working Anytime, Anywhere , 2005, Inf. Syst. Manag..
[22] Maxime Flament,et al. A 4 th-Generation Wireless Infrastructures : Scenarios and Research Challenges , .
[23] Martti Mäntylä,et al. Assessing Legal Challenges on the Mobile Internet , 2003, Int. J. Electron. Commer..
[24] G. Keppel,et al. Design and Analysis: A Researcher's Handbook , 1976 .
[25] Laurie J. Kirsch,et al. The Impact of Data Integration on the Costs and Benefits of Information Systems , 1992, MIS Q..
[26] Steve Sawyer,et al. Surfing the Next Wave: Design and Implementation Challenges of Ubiquitous Computing , 2004, Commun. Assoc. Inf. Syst..
[27] R. Watson,et al. U-commerce: Expanding the universe of marketing , 2002 .
[28] Alan R. Dennis,et al. Understanding Fit and Appropriation Effects in Group Support Systems via Meta-Analysis , 2001, MIS Q..
[29] John Vergo,et al. A user-centered design approach to personalization , 2000, CACM.
[30] Dongsong Zhang,et al. Delivery of Personalized and Adaptive Content to Mobile Devices: A Framework and Enabling Technology , 2003, Commun. Assoc. Inf. Syst..
[31] Rahul C. Basole. THE VALUE AND IMPACT OF MOBILE INFORMATION AND COMMUNICATION TECHNOLOGIES , 2004 .
[32] Kim Sheehan,et al. Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..
[33] Holtjona Galanxhi-Janaqi,et al. U-commerce: emerging trends and research issues , 2004, Ind. Manag. Data Syst..
[34] Thomas A. Horan,et al. Devising a Web-Based Ontology for Emerging Wireless Systems: The Case of Emergency Management Systems , 2003, AMCIS.
[35] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[36] Adam LeBrocq. Style Guide for the Journal of the Association for Information Systems , 2022 .
[37] Tamara Dinev,et al. Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact , 2005, Int. J. Electron. Commer..
[38] R. Bharat Rao,et al. Evolution of mobile location-based services , 2003, CACM.
[39] Charles D. Barrett. Understanding Attitudes and Predicting Social Behavior , 1980 .
[40] R. Keeney,et al. The Value of Internet Commerce to the Customer , 1999 .
[41] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[42] George M. Giaglis,et al. A case study in pervasive retail , 2002, WMC '02.
[43] M. Weiser,et al. Hot topics-ubiquitous computing , 1993 .
[44] Jeong Hee Hwang,et al. Context-based preference analysis method in ubiquitous commerce , 2005, International Workshop on Ubiquitous Data Management.
[45] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[46] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[47] Bruce Eckfeldt,et al. What does RFID do for the consumer? , 2005, CACM.
[48] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[49] Dale Goodhue,et al. Task-Technology Fit and Individual Performance , 1995, MIS Q..
[50] Sumit Sarkar,et al. The Role of the Management Sciences in Research on Personalization , 2003, Manag. Sci..
[51] Amit Sharma,et al. Communicating Price Information through Semantic Cues: The Moderating Effects of Situation and Discount Size , 1996 .
[52] Hock-Hai Teo,et al. Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective , 2004, ICIS.
[53] Daniel Robey,et al. Human agency in a wireless world: Patterns of technology use in nomadic computing environments , 2005, Inf. Organ..
[54] Brian Detlor,et al. Intelligent mobile crisis response systems , 2005, CACM.
[55] Mark S. Ackerman,et al. Privacy in pervasive environments: next generation labeling protocols , 2004, Personal and Ubiquitous Computing.
[56] Gediminas Adomavicius,et al. Personalization technologies: A process-oriented perspective , 2006, Wirtschaftsinf..
[57] Priscilla M. Regan,et al. Emergency Response Systems and the Creeping Legibility of People and Places , 2004, Inf. Soc..
[58] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[59] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[60] Yves Pigneur,et al. A Comparative Analysis of Published Scenarios for M-Business , 2004 .
[61] Kalle Lyytinen,et al. Research Commentary: The Next Wave of Nomadic Computing , 2002, Inf. Syst. Res..
[62] Michael D. Reilly,et al. Effects of Unexpected Situations on Behavior-Intention Differences: A Garbology Analysis , 1985 .
[63] R. Belk. An Exploratory Assessment of Situational Effects in Buyer Behavior , 1974 .
[64] Norbert A. Streitz,et al. Building disappearing computers , 2005, CACM.
[65] Rafael Accorsi,et al. Personalization in privacy-aware highly dynamic systems , 2006, CACM.
[66] Tamara Dinev,et al. Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..
[67] David Garlan,et al. Context is key , 2005, CACM.
[68] Marshall Scott Poole,et al. What Is Personalization? Perspectives on the Design and Implementation of Personalization in Information Systems , 2006, J. Organ. Comput. Electron. Commer..
[69] Xueming Luo. Trust production and privacy concerns on the Internet , 2002 .
[70] Matti Rossi,et al. The Impact of Use Situation and Mobility on the Acceptance of Mobile Ticketing Services , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[71] Richard T. Watson,et al. U-commerce: the ultimate , 2000, UBIQ.
[72] Izak Benbasat,et al. Empirical Research in Information Systems: The Practice of Relevance , 1999, MIS Q..
[73] Hangjung Zo,et al. Personalization vs. Customization: Which Is More Effective in E-Services? , 2003, AMCIS.
[74] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[75] Per Capita,et al. About the authors , 1995, Machine Vision and Applications.
[76] Gregory D. Abowd,et al. Prototypes and paratypes: designing mobile and ubiquitous computing applications , 2005, IEEE Pervasive Computing.
[77] Donald R. Cooper,et al. Business Research Methods , 1980 .
[78] Ann M. Trousdale. Who's afraid of the big, bad wolf? , 1989 .
[79] Timothy H. Greer,et al. Web Personalization: The Impact of Perceived Innovation Characteristics on the Intention to Use Personalization , 2003, J. Comput. Inf. Syst..
[80] Oliver Günther,et al. RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.
[81] Bill Anckar,et al. VALUE CREATION IN MOBILE COMMERCE: FINDINGS FROM A CONSUMER SURVEY , 2002 .
[82] Barton A. Weitz,et al. Self-Disclosure on the Web: the Impact of Privacy Policy, Reward, and Company Reputation , 2002 .
[83] Richard T. Watson,et al. U-Commerce: A Conceptual Extension of E-Commerce and M-Commerce , 2003, ICIS.
[84] Gerald Quirchmayr,et al. Through-Walls Communication for Medical Emergency Services , 2003, Int. J. Hum. Comput. Interact..
[85] Johann Cas,et al. Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.
[86] Marshall Scott Poole,et al. Perspectives on Personalization , 2003, AMCIS.
[87] Mark Weiser,et al. Some Computer Science Problems in Ubiquitous Computing , 1993 .
[88] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[89] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[90] A. Sunmade. The World is Flat: A Brief History of the Twenty-First Century , 2008 .
[91] Pertti Huuskonen,et al. Context Awareness Perspectives for Mobile Personal Media , 2005, Inf. Syst. Manag..
[92] L. Mosley,et al. The World Is Flat: A Brief History of the Twenty-First Century , 2005 .
[93] Munir Mandviwalla,et al. Integrating the Supply Chain with RFID: A Technical and Business Analysis , 2005, Commun. Assoc. Inf. Syst..
[94] Michael Shaw,et al. Managing Coordination in Emergency Response Systems with Information Technologies , 2004, AMCIS.
[95] Doug Riecken,et al. Introduction: personalized views of personalization , 2000, CACM.
[96] Marc L. Resnick,et al. Perceptions of Customer Service, Information Privacy, and Product Quality From Semiotic Design Features in an Online Web Store , 2003, Int. J. Hum. Comput. Interact..
[97] Robert C. Nickerson,et al. Wireless Telecommunications Issues: Cell Phone TV, Wireless Networks in Disaster Management, Ubiquitous Computing, and Adoption of Future Wireless Applications , 2007, Commun. Assoc. Inf. Syst..
[98] R. Teas,et al. The effects of extrinsic product cues on consumers’ perceptions of quality, sacrifice, and value , 2000 .