Consumer Acceptance of RFID Technology: An Exploratory Study
暂无分享,去创建一个
[1] Annie I. Antón,et al. Examining Internet privacy policies within the context of user privacy values , 2005, IEEE Transactions on Engineering Management.
[2] David Hillier,et al. Radio frequency identification in retailing and privacy and public policy issues , 2004 .
[3] John Ingham,et al. Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..
[4] Elisa Bertino,et al. Achieving privacy in trust negotiations with an ontology-based approach , 2006, IEEE Transactions on Dependable and Secure Computing.
[5] Brian M. Jones,et al. An Examination of the Technology Acceptance Model in Uruguay and the US: A Focus on Culture , 2005 .
[6] David C. Wyld,et al. Would you like chips with that?: consumer perspectives of RFID , 2004 .
[7] Bruce Eckfeldt,et al. What does RFID do for the consumer? , 2005, CACM.
[8] Christian Hirt. Radio Frequency Identification - RFID , 2004 .
[9] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[10] Donna Weaver McCloskey,et al. Evaluating Electronic Commerce Acceptance with the Technology Acceptance Model , 2004, J. Comput. Inf. Syst..
[11] Victor R. Prybutok,et al. A consumer perspective of E-service quality , 2005, IEEE Transactions on Engineering Management.
[12] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[13] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[14] Alan Robert Peslak,et al. An Ethical Exploration of Privacy and Radio Frequency Identification , 2005 .
[15] Wynne W. Chin,et al. Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.
[16] Elena Karahanna,et al. Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..
[17] John R. Nevin,et al. The Differential Effects of Exercised and Unexercised Power Sources in a Marketing Channel , 1985 .
[18] Pin Luarn,et al. AIS Electronic Library (AISeL) , 2017 .
[19] Albert H. Segars,et al. Re-examining perceived ease of use and usefulness , 1993 .
[20] Gilbert A. Churchill. A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .
[21] Alan D. Smith,et al. Exploring radio frequency identification technology and its impact on business systems , 2005, Inf. Manag. Comput. Security.
[22] Melinda Korzaan,et al. Going with the Flow: Predicting Online Purchase Intentions , 2003, J. Comput. Inf. Syst..
[23] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[24] Yi-Shun Wang,et al. The adoption of electronic tax filing systems: an empirical study , 2003, Gov. Inf. Q..
[25] Victor R. Prybutok,et al. An empirical study of online shopping: a service perspective , 2004, Int. J. Serv. Technol. Manag..
[26] Vallabh Sambamurthy,et al. Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment , 2000, Inf. Syst. Res..
[27] Detmar W. Straub,et al. Testing the technology acceptance model across cultures: A three country study , 1997, Inf. Manag..
[28] Anthony R. Hendrickson,et al. Using Davis's Perceived Usefulness and Ease-of-use Instruments for Decision Making: A Confirmatory and Multigroup Invariance Analysis , 1998 .
[29] C. Kluckhohn. 2. VALUES AND VALUE-ORIENTATIONS IN THE THEORY OF ACTION: AN EXPLORATION IN DEFINITION AND CLASSIFICATION , 1951 .
[30] A. Burns,et al. The antecedents of preventive health care behavior: An empirical study , 1998 .
[31] Andrew Whinston,et al. Frontiers of Electronic Commerce , 1996 .
[32] Peter A. Todd,et al. Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication , 1992, MIS Q..
[33] Victor R. Prybutok,et al. The Role of Impulsiveness in a TAM-Based Online Purchasing Behavior , 2006, Inf. Resour. Manag. J..
[34] Roy Want,et al. RFID. A key to automating everything. , 2004, Scientific American.
[35] Peter A. Todd,et al. Assessing IT usage: the role of prior experience , 1995 .
[36] Lei-da Chen,et al. Enticing online consumers: an extended technology acceptance perspective , 2002, Inf. Manag..
[37] G. Hofstede,et al. Culture′s Consequences: International Differences in Work-Related Values , 1980 .
[38] Victor R. Prybutok,et al. TAM: The Moderating Effect of Gender on Online Shopping , 2003 .
[39] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[40] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[41] Wynne W. Chin,et al. On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution , 1995 .
[42] I. Ajzen. The theory of planned behavior , 1991 .