An integrated model for online transactions: illuminating the black box
暂无分享,去创建一个
[1] Paul Jen-Hwa Hu,et al. Investigating healthcare professionals' decisions to accept telemedicine technology: an empirical test of competing theories , 2002, Inf. Manag..
[2] Cynthia K. Riemenschneider,et al. Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests , 1997, Inf. Syst. Res..
[3] Steven Furnell,et al. Preventative Actions for Enhancing Online Protection and Privacy , 2011, Int. J. Inf. Technol. Syst. Approach.
[4] J. Christopher Westland,et al. Lower bounds on sample size in structural equation modeling , 2010, Electron. Commer. Res. Appl..
[5] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[6] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[7] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[8] Timothy M. Gardner,et al. THE RELATIONSHIP BETWEEN HR PRACTICES AND FIRM PERFORMANCE: EXAMINING CAUSAL ORDER , 2005 .
[9] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[10] M. Culnan. Protecting Privacy Online: Is Self-Regulation Working? , 2000 .
[11] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[12] Detmar W. Straub,et al. The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..
[13] Detmar W. Straub,et al. Validating Instruments in MIS Research , 1989, MIS Q..
[14] Tamara Dinev,et al. Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..
[15] Juani Swart,et al. Understanding the people and performance link: Unlocking the black box , 2003 .
[16] Kenneth A. Bollen,et al. Structural Equations with Latent Variables , 1989 .
[17] I. Ajzen. The theory of planned behavior , 1991 .
[18] Alessandro Acquisti,et al. Nudging Privacy: The Behavioral Economics of Personal Information , 2009, IEEE Security & Privacy.
[19] Rolph E. Anderson,et al. Multivariate Data Analysis with Readings , 1979 .
[20] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[21] E. B. Andersen,et al. Modern factor analysis , 1961 .
[22] Alessandro Acquisti,et al. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.
[23] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[24] David J. Phillips. Privacy policy and PETs , 2001, New Media Soc..
[25] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[26] J. Nunnally,et al. Psychometric Theory: NY. , 1978 .
[27] Paul A. Pavlou,et al. Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..
[28] R. Vallerand. Toward A Hierarchical Model of Intrinsic and Extrinsic Motivation , 1997 .
[29] M. Hill,et al. Consumer privacy and the Internet in Europe: a view from Germany , 2003 .
[30] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[31] Detmar W. Straub,et al. Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..
[32] S. E. Kruck,et al. Protecting personal privacy on the Internet , 2002, Inf. Manag. Comput. Secur..
[33] Peter A. Todd,et al. Assessing IT usage: the role of prior experience , 1995 .
[34] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[35] Hichang Cho,et al. A multinational study on online privacy: global concerns and local responses , 2009, New Media Soc..
[36] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[37] Jakob B. Madsen. Book review: Basic Econometrics, Damodar N. Gujarati, McGraw-Hill, New York, 1995 , 1998 .
[38] L. Cronbach. Coefficient alpha and the internal structure of tests , 1951 .
[39] Vasilios Katos,et al. An Integrated Model for Online Transactuions: Methodological Issues and Challenges , 2010 .
[40] Tamara Dinev,et al. Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..
[41] Sirkka L. Jarvenpaa,et al. Consumer trust in an Internet store , 2000, Inf. Technol. Manag..
[42] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[43] Charles J. Kacmar,et al. The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..
[44] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[45] Shirley Atkinson,et al. Improving protection mechanisms by understanding online risk , 2007, Inf. Manag. Comput. Secur..
[46] Vincent S. Lai,et al. Literature derived reference models for the adoption of online shopping , 2005, Inf. Manag..
[47] Viswanath Venkatesh,et al. Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..
[48] David Gefen,et al. Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice , 2000 .
[49] H. Harman. Modern factor analysis , 1961 .