The Role of Privacy Risk in IT Acceptance: An Empirical Study
暂无分享,去创建一个
[1] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[2] Kenneth A. Bollen,et al. Structural Equations with Latent Variables , 1989 .
[3] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[4] Anup K. Ghosh,et al. Software security and privacy risks in mobile e-commerce , 2001, CACM.
[5] Mary J. Culnan,et al. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .
[6] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[7] Sangkyun Kim,et al. Security of the internet-based instant messenger: Risks and safeguards , 2005, Internet Res..
[8] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[9] Jan H. P. Eloff,et al. Electronic commerce: the information-security challenge , 2000, Inf. Manag. Comput. Secur..
[10] Judy Drennan,et al. Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..
[11] R. Peterson. A Meta-analysis of Cronbach's Coefficient Alpha , 1994 .
[12] George R. Milne,et al. Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .
[13] Younghwa Lee,et al. The Technology Acceptance Model: Past, Present, and Future , 2003, Commun. Assoc. Inf. Syst..
[14] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[15] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[16] Naresh K. Malhotra,et al. A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena , 2005, Manag. Sci..
[17] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[18] E. Vance Wilson,et al. Predicting Continuing Acceptance of IT in Conditions of Sporadic Use , 2005, AMCIS.
[19] Charles D. Barrett. Understanding Attitudes and Predicting Social Behavior , 1980 .
[20] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[21] Robert K. Gable,et al. Instrument Development in the Affective Domain , 1986 .
[22] VenkateshViswanath. Determinants of Perceived Ease of Use , 2000 .
[23] E. Kelloway. Using LISREL for Structural Equation Modeling: A Researcher′s Guide , 1998 .
[24] B. Dawn Medlin,et al. Technology-based security threats: taxonomy of sources, targets and a process model of alleviation , 2005, Int. J. Inf. Technol. Manag..