Understanding Mobile Commerce Continuance Intentions: An Empirical Analysis of Chinese Consumers
暂无分享,去创建一个
[1] Kregg Aytes,et al. Computer Security and Risky Computing Practices: A Rational Choice Perspective , 2004, J. Organ. End User Comput..
[2] Scott Mensch,et al. Information Security Activities of College Students: An Exploratory Study , 2011 .
[3] Byoungsoo Kim,et al. An empirical investigation of mobile data service continuance: Incorporating the theory of planned behavior into the expectation-confirmation model , 2010, Expert Syst. Appl..
[4] Chang Liu,et al. Mobile Data Service Demographics in Urban China , 2009, J. Comput. Inf. Syst..
[5] Jian Zhang,et al. M-Commerce in the Period of 3G , 2009, 2009 International Conference on Management and Service Science.
[6] Chun-Hsiung Liao,et al. Factors influencing the usage of 3G mobile services in Taiwan , 2007, Online Inf. Rev..
[7] Nir Kshetri,et al. China: M-Commerce in World's Largest Mobile Market , 2006 .
[8] Thompson S. H. Teo. Demographic and motivation variables associated with Internet usage activities , 2001, Internet Res..
[9] Kar Yan Tam,et al. Understanding Continued Information Technology Usage Behavior: A Comparison of Three Models in the Context of Mobile Internet , 2006, Decis. Support Syst..
[10] Mohamed Khalifa,et al. Explaining the adoption of transactional B2C mobile commerce , 2008, J. Enterp. Inf. Manag..
[11] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[12] Hua Dai,et al. Mobile commerce adoption in China and the United States: a cross-cultural study , 2009, DATB.
[13] Alain Yee-Loong Chong,et al. An empirical analysis of the determinants of 3G adoption in China , 2012, Comput. Hum. Behav..
[14] Wolffried Stucky,et al. Exploring the Critical Success Factors for Mobile Commerce , 2006, 2006 International Conference on Mobile Business.
[15] Raymond R. Panko,et al. Business Data Networks and Telecommunications , 2008 .
[16] Mohamed Khalifa,et al. Drivers for Transactional B2C M-Commerce Adoption: Extended Theory of Planned Behavior , 2008, J. Comput. Inf. Syst..
[17] Sumeet Gupta,et al. Value-based Adoption of Mobile Internet: An empirical investigation , 2007, Decis. Support Syst..
[18] Shuk Ying Ho,et al. The attraction of personalized service for users in mobile commerce: an empirical study , 2002, SECO.
[19] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[20] Jen-Her Wu,et al. What drives mobile commerce?: An empirical evaluation of the revised technology acceptance model , 2005, Inf. Manag..
[21] Upkar Varshney,et al. Mobile Commerce: Framework, Applications and Networking Support , 2002, Mob. Networks Appl..
[22] Xianggui Qu,et al. Multivariate Data Analysis , 2007, Technometrics.
[23] Henryk Sienkiewicz,et al. Quo Vadis? , 1967, American Association of Industrial Nurses journal.
[24] Тараса Шевченка,et al. Quo vadis? , 2013, Clinical chemistry.
[25] Izak Benbasat,et al. The Identity Crisis Within the IS Discipline: Defining and Communicating the Discipline's Core Properties , 2003, MIS Q..
[26] Angappa Gunasekaran,et al. A review for mobile commerce research and applications , 2007, Decis. Support Syst..
[27] S. E. Kruck,et al. Empiracal Study of Students' Computer Security Practices/Perceptions , 2007, J. Comput. Inf. Syst..
[28] Alain Yee-Loong Chong,et al. What drives Malaysian m-commerce adoption? An empirical analysis , 2009, Ind. Manag. Data Syst..
[29] Alain Yee-Loong Chong,et al. Determinants of 3G Adoption in Malaysia: A Structural Analysis , 2010, J. Comput. Inf. Syst..
[30] Anol Bhattacherjee,et al. Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..
[31] M. Rokeach. The Nature Of Human Values , 1974 .
[32] Ming-Chi Lee,et al. Explaining and predicting users' continuance intention toward e-learning: An extension of the expectation-confirmation model , 2010, Comput. Educ..
[33] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[34] Jordan Shropshire,et al. Impact of Negative Message Framing on Security Adoption , 2010, J. Comput. Inf. Syst..
[35] Kenneth C. C. Yang,et al. Exploring factors affecting the adoption of mobile commerce in Singapore , 2005, Telematics Informatics.
[36] Sheng Wu,et al. Integrating perceived playfulness into expectation-confirmation model for web portal context , 2005, Inf. Manag..
[37] Dong Hee Shin,et al. User acceptance of mobile Internet: Implication for convergence technologies , 2007, Interact. Comput..
[38] Kar Yan Tam,et al. The Effects of Post-Adoption Beliefs on the Expectation-Confirmation Model for Information Technology Continuance , 2006, Int. J. Hum. Comput. Stud..
[39] T. H. Kwon,et al. Unifying the fragmented models of information systems implementation , 1987 .
[40] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[41] Venkateshviswanath,et al. A Theoretical Extension of the Technology Acceptance Model , 2000 .
[42] Ewuuk Lomo-David,et al. Information Systems Security and Safety Measures: The Dichotomy between Students' Familiarity and Practice , 2009 .
[43] Shuk Ying Ho,et al. Users' adoption of mobile services: Preference and location personalization , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[44] Howard E. Aldrich,et al. The pervasive effects of family on entrepreneurship: toward a family embeddedness perspective , 2003 .
[45] Marios Koufaris,et al. Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior , 2002, Inf. Syst. Res..
[46] Izak Benbasat,et al. Quo vadis TAM? , 2007, J. Assoc. Inf. Syst..