IT investment evaluation: why hasn't it become an organization routine?
暂无分享,去创建一个
Qing Hu | Tero Päivärinta | Petri Hallikainen | Elisabeth Frisk | Tom R. Eikebrokk | Antti Nurmi | Qing Hu | Elisabeth Frisk | A. Nurmi | T. Eikebrokk | Tero Päivärinta | Petri Hallikainen
[1] James C. Anderson,et al. STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .
[2] Ephraim R. McLean,et al. Key Issues for IT Executives , 2004, MIS Q. Executive.
[3] J. Ballantine,et al. Information systems and other capital investments: evaluation practices compared , 1999 .
[4] B. Kogut,et al. Exploring internal stickiness : Impediments to the transfer of best practice within the firm , 2007 .
[5] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[6] Wynne W. Chin,et al. Adoption intention in GSS: relative importance of beliefs , 1995, DATB.
[7] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[8] Alan G. Sawyer,et al. The use of incremental goodness of fit indices in structural equation models in marketing research , 1984 .
[9] Fred D. Davis,et al. A Model of the Antecedents of Perceived Ease of Use: Development and Test† , 1996 .
[10] Colleen J. Heffernan. Social foundations of thought and action: A social cognitive theory ,Bandura AlbertEnglewood Cliffs, New Jersey:Prentice Hall,1986, xiii +617 pp. Hardback. US$39.50. , 1988 .
[11] Frank F. Land,et al. Evaluating investments in IT , 1992, J. Inf. Technol..
[12] I. Ajzen. Attitudes, Personality and Behavior , 1988 .
[13] Qing Hu,et al. The Centrality of Awareness in the Formation of User Behavioral Intention Toward Preventive Technologies in the Context of Voluntary Use , 2005 .
[14] Chad Lin,et al. The practice of IS/IT benefits management in large Australian organizations , 2003, Inf. Manag..
[15] Deborah Compeau,et al. Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..
[16] Jerry N. Luftman. Competing in the Information Age: Strategic Alignment in Practice , 1996 .
[17] Peter E.D. Love,et al. Researching the investment of information technology in construction: An examination of evaluation practices , 2005 .
[18] K. Jöreskog,et al. Intraclass Reliability Estimates: Testing Structural Assumptions , 1974 .
[19] Marios Koufaris,et al. Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior , 2002, Inf. Syst. Res..
[20] A. Bandura. Self-efficacy mechanism in human agency. , 1982 .
[21] David F. Larcker,et al. Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .
[22] Goh Bee Hua. Applying the strategic alignment model to business and ICT strategies of Singapore's small and medium‐sized architecture, engineering and construction enterprises , 2007 .
[23] Zahir Irani,et al. Developing a frame of reference for ex-ante IT/IS investment evaluation , 2002, Eur. J. Inf. Syst..
[24] Steven Jones,et al. Understanding IS evaluation as a complex social process: a case study of a UK local authority , 2001, Eur. J. Inf. Syst..
[25] Steve Smithson,et al. Information systems evaluation in practice: a case study of organizational change , 2000, J. Inf. Technol..
[26] Zahir Irani,et al. Information systems evaluation: past, present and future , 2001, Eur. J. Inf. Syst..
[27] Qing Hu,et al. Is spyware an Internet nuisance or public menace? , 2005, CACM.
[28] Tamara Dinev,et al. Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact , 2005, Int. J. Electron. Commer..
[29] Qing Hu,et al. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..
[30] X. Koufteros. Testing a model of pull production: a paradigm for manufacturing research using structural equation modeling , 1999 .
[31] Detmar W. Straub,et al. Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..
[32] Jerry N. Luftman. Key Issues for IT Executives 2004 , 2005, MIS Q. Executive.
[33] Tom Stafford,et al. Spyware: The Ghost in the Machine , 2004, Commun. Assoc. Inf. Syst..
[34] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[35] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[36] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[37] Leslie P. Willcocks,et al. Measuring organizational IS effectiveness: an overview and update of senior management perspectives , 2002, DATB.
[38] Paul A. Pavlou,et al. Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..