Member use of social networking sites - an empirical examination
暂无分享,去创建一个
[1] Wynne W. Chin,et al. Intention does not always Matter: The Contingent Role of Habit in IT Usage Behaviour , 2001, ECIS.
[2] Sridhar Narasimhan,et al. Effects of Relational Factors and Channel Climate on EDI Usage in the Customer-Supplier Relationship , 2005, J. Manag. Inf. Syst..
[3] Young-Gul Kim,et al. Extending the TAM for a World-Wide-Web context , 2000, Inf. Manag..
[4] K. Jöreskog,et al. Intraclass Reliability Estimates: Testing Structural Assumptions , 1974 .
[5] C. Steinfield,et al. A Social Information Processing Model of Media Use in Organizations , 1987 .
[6] Hock Chuan Chan,et al. Understanding Users' Continuance of Facebook: The Role of General and Specific Computer Self-Efficacy , 2008, ICIS.
[7] E. Foa,et al. Societal Structures of the Mind , 1974 .
[8] A. Gouldner. THE NORM OF RECIPROCITY: A PRELIMINARY STATEMENT * , 1960 .
[9] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[10] Donghua Tao,et al. Intention to Use and Actual Use of Electronic Information Resources: Further Exploring Technology Acceptance Model (TAM) , 2009, AMIA.
[11] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[12] P. Blau. Exchange and Power in Social Life , 1964 .
[13] Younghwa Lee,et al. Avatar e-mail versus traditional e-mail: Perceptual difference and media selection difference , 2009, Decis. Support Syst..
[14] R. H. Willis,et al. Social Exchange: Advances In Theory And Research , 1981 .
[15] Hans van der Heijden,et al. User Acceptance of Hedonic Information Systems , 2004, MIS Q..
[16] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[17] Chang Liu,et al. Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..
[18] P. Hackl,et al. Robustness of partial least-squares method for estimating latent variable quality structures , 1999 .
[19] Milena M. Head,et al. The Impact of Infusing Social Presence in the Web Interface: An Investigation Across Product Types , 2005, Int. J. Electron. Commer..
[20] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[21] Xiaolong Zhang,et al. Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding , 2010, AMCIS.
[22] Christian Wagner,et al. Weblogging: A study of social computing and its impact on organizations , 2008, Decis. Support Syst..
[23] Deb Sledgianowski,et al. Social Network Sites: Antecedents of User Adoption and Usage , 2008, AMCIS.
[24] Richard,et al. Extrinsic and Intrinsic Motivation to Use Computers in the Workplace , 2022 .
[25] Tom L. Roberts,et al. Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..
[26] Amany R. Elbanna. From intention to use to actual rejection: the journey of an e-procurement system , 2010, J. Enterp. Inf. Manag..
[27] Thompson S. H. Teo,et al. Intrinsic and extrinsic motivation in Internet usage , 1999 .
[28] Atreyi Kankanhalli,et al. Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation , 2005, MIS Q..
[29] Yi Zhao,et al. Effects of System Characteristics on Users' Self-Disclosure in Social Networking Sites , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[30] Traci Carte,et al. In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..
[31] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[32] Tao Hu,et al. Why People Continue to Use Social Networking Services: Developing a Comprehensive Model , 2008, ICIS.
[33] Nassim Belbaly,et al. Understanding Developers’ Motives in Open Source Projects: A Multi-Theoretical Framework , 2010, Commun. Assoc. Inf. Syst..
[34] H. Markus,et al. Possible Selves , 2001 .
[35] Sooyeon Kim,et al. A Study on the Factors Influencing the Intention of Blog Usage , 2009, PACIS.
[36] Amy L. Pablo,et al. Reconceptualizing the Determinants of Risk Behavior , 1992 .
[37] Izak Benbasat,et al. Para-social presence: a re-conceptualization of 'social presence' to capture the relationship between a Web site and her visitors , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[38] Bernardo A. Huberman,et al. Rhythms of social interaction: messaging within a massive online network , 2006, ArXiv.
[39] Khaled Hassanein,et al. The Impact of Infusing Social Presence in the Web Interface : An Investigation Across Different Products ” , 2006 .
[40] Danah Boyd,et al. Friendster and publicly articulated social networking , 2004, CHI EA '04.
[41] Natasha F. Veltri,et al. The Role of National Culture Differences in User Adoption of Social Netowrking , 2009 .
[42] Matthew Lombard,et al. At the Heart of It All: The Concept of Presence , 2006 .
[43] P. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003 .
[44] Jessie Pallud,et al. Crisis Response and IT Use Literature Review and Suggestions for Future Research , 2009, AMCIS.
[45] Matthew K. O. Lee,et al. A theoretical model of intentional social action in online social networks , 2010, Decis. Support Syst..
[46] R. Cropanzano,et al. Social Exchange Theory: An Interdisciplinary Review , 2005 .
[47] P. Costa,et al. NEO inventories for the NEO Personality Inventory-3 (NEO-PI-3), NEO Five-Factor Inventory-3 (NEO-FFI-3), NEO Personality Inventory-Revised (NEO PI-R) : professional manual , 2010 .
[48] 이훈,et al. 지각된 유용성(Perceived Usefulness)의 영향분석 , 2004 .
[49] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[50] Dianne Cyr,et al. The role of social presence in establishing loyalty in e-Service environments , 2007, Interact. Comput..
[51] Andrew B. Whinston. Opportunities and Challenges in Analysis of Social Netowrks , 2009, AMCIS.
[52] Dan Jong Kim,et al. Customer self-service systems: The effects of perceived Web quality with service contents on enjoyment, anxiety, and e-trust , 2007, Decis. Support Syst..
[53] Paul A. Pavlou,et al. Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..
[54] Ting-Peng Liang,et al. Can Social Exchange Theory Explain Individual Knowledge-Sharing Behavior? A Meta-Analysis , 2008, ICIS.
[55] Cliff Lampe,et al. A familiar face(book): profile elements as signals in an online social network , 2007, CHI.
[56] Jennifer Glenar Fisher. Implications of electronic mail policies for fairness and invasion of privacy : a field experiment , 2002 .
[57] Deb Sledgianowski,et al. Using Social Network Sites: The Effects of Playfulness, Critical Mass and Trust in a Hedonic Context , 2009, J. Comput. Inf. Syst..
[58] Hsiu-Lan Wu,et al. Utilitarian and Hedonic Values of Social Network Services , 2009, AMCIS.
[59] Mark Keil,et al. Usefulness and ease of use: field study evidence regarding task considerations , 1995, Decis. Support Syst..
[60] Matthew K. O. Lee,et al. Understanding the role of gender in bloggers' switching behavior , 2009, Decis. Support Syst..
[61] Starr Roxanne Hiltz,et al. Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.
[62] CyrDianne,et al. The role of social presence in establishing loyalty in e-Service environments , 2007 .
[63] Sirkka L. Jarvenpaa,et al. Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers , 2000, IEEE Trans. Syst. Man Cybern. Part A.
[64] Alice E. Marwick. 'I’m a Lot More Interesting than a Friendster Profile': Identity Presentation, Authenticity and Power in Social Networking Services , 2005 .
[65] Fred D. Davis,et al. Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .
[66] Neil Conway,et al. The employment relationship through the lens of social exchange , 2004 .
[67] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[68] Peter A. Rosen,et al. The Impact of the Big Five Personality Traits on the Acceptance of Social Networking Website , 2008, AMCIS.
[69] R. Sabatelli. The Social Psychology of Groups , 2000 .
[70] Moez Limayem,et al. How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance , 2007, MIS Q..
[71] Mary-Anne Williams,et al. Privacy in Social Networks: a Comparative Study , 2009, PACIS.
[72] Robert P. Bostrom,et al. Mis problems and failures: a socio-technical perspective , 1977 .
[73] Aaron Smith,et al. Social Media & Mobile Internet Use among Teens and Young Adults. Millennials. , 2010 .
[74] Fred D. Davis. User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts , 1993, Int. J. Man Mach. Stud..
[75] Magid Igbaria,et al. A Motivational Model of Microcomputer Usage , 1996, J. Manag. Inf. Syst..
[76] Gilbert A. Churchill. A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .
[77] Natasha F. Veltri,et al. AIS Electronic Library (AISeL) , 2022 .
[78] Linda D. Molm. Coercive power in social exchange , 1997 .
[79] Juhani Iivari,et al. Why do individuals use computer technology? A Finnish case study , 1995, Inf. Manag..
[80] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[81] Rui Chen,et al. Visual e-mail authentication and identification services: An investigation of the effects on e-mail use , 2009, Decis. Support Syst..
[82] HeijdenHans. User acceptance of hedonic information systems , 2004 .
[83] Ingoo Han,et al. The impact of Web quality and playfulness on user acceptance of online retailing , 2007, Inf. Manag..
[84] Minhong Wang,et al. Integrating organizational, social, and individual perspectives in Web 2.0-based workplace e-learning , 2011, Inf. Syst. Frontiers.
[85] P. Costa,et al. Revised NEO Personality Inventory (NEO-PI-R) and NEO-Five-Factor Inventory (NEO-FFI) , 1992 .
[86] Ca Jose,et al. Lampe, Cliff, Ellison, Nicole, and Steinfeld, Charles. . Face(book): Profile Elements as Signals in an Online Social Network. , 2007, CHI 2007.
[87] David Gefen,et al. Implementation Team Responsiveness and User Evaluation of Customer Relationship Management: A Quasi-Experimental Design Study of Social Exchange Theory , 2002, J. Manag. Inf. Syst..
[88] Malcolm Munro,et al. Assessing User Competence: Conceptualization and Measurement , 2000, Inf. Syst. Res..
[89] F. Bookstein,et al. Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory , 1982 .
[90] Robert A. Baron,et al. INJUSTICE AND ORGANIZATIONAL CONFLICT: THE MODERATING EFFECT OF POWER RESTORATION , 1991 .
[91] Elena Kolesnikova,et al. "It Won't Happen To Me!": Self-Disclosure in Online Social Networks , 2009, AMCIS.
[92] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[93] Eugene F. Stone. Research methods in organizational behavior , 1978 .
[94] Steven Durlauf,et al. Social Capital , 2004 .
[95] D. Sandy Staples,et al. A Self-Efficacy Theory Explanation for the Management of Remote Workers in Virtual Organizations , 1999, J. Comput. Mediat. Commun..
[96] Li Qin,et al. The Effects of Privacy Concern and Social Influence on User Acceptance of Online Social Networks , 2009, AMCIS.
[97] David Gefen,et al. Managing User Trust in B2C e-Services , 2003 .
[98] N. Ellison,et al. Social capital, self-esteem, and use of online social network sites: A longitudinal analysis , 2008 .
[99] A. Kaplan,et al. A Beginner's Guide to Partial Least Squares Analysis , 2004 .
[100] Anthony M. Cresswell,et al. Advances in multi-agency disaster management: Key elements in disaster research , 2010, Inf. Syst. Frontiers.
[101] S. M. Arnsten. Intrinsic motivation. , 1990, The American journal of occupational therapy : official publication of the American Occupational Therapy Association.
[102] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[103] Oliver Günther,et al. Investigating the Value of Privacy in Online Social Networks: Conjoint Analysis , 2009, ICIS.
[104] Youngjin Yoo,et al. Media and Group Cohesion: Relative Influences on Social Presence, Task Participation, and Group Consensus , 2001, MIS Q..