Understanding Consumers' Attitudes Toward Controversial Information Technologies: A Contextualization Approach
暂无分享,去创建一个
[1] Detmar W. Straub,et al. Validating Instruments in MIS Research , 1989, MIS Q..
[2] Gurpreet Dhillon,et al. A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..
[3] S. Schwartz. Universals in the Content and Structure of Values: Theoretical Advances and Empirical Tests in 20 Countries , 1992 .
[4] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[5] Gregory N. Connolly,et al. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers , 2014, J. Am. Medical Informatics Assoc..
[6] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[7] Richard Baskerville,et al. Generalizing Generalizability in Information Systems Research , 2003, Inf. Syst. Res..
[8] G. Johns. The Essential Impact of Context on Organizational Behavior , 2006 .
[9] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[10] Viswanath Venkatesh,et al. Model of Adoption and Technology in Households: A Baseline Model Test and Extension Incorporating Household Life Cycle , 2005, MIS Q..
[11] Milena M. Head,et al. Computer use by older adults: A multi-disciplinary review , 2010, Comput. Hum. Behav..
[12] Erik Rolland,et al. Knowledge-sharing in virtual communities: familiarity, anonymity and self-determination theory , 2012, Behav. Inf. Technol..
[13] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[14] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[15] J. R. Landis,et al. The measurement of observer agreement for categorical data. , 1977, Biometrics.
[16] M. Hui,et al. The Ecological Validity of Photographic Slides and Videotapes in Simulating the Service Setting , 1992 .
[17] Shumaila Y. Yousafzai,et al. A proposed model of e-trust for electronic banking , 2003 .
[18] Irina Sakharova. Payment card fraud: Challenges and solutions , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.
[19] E. Straub. Understanding Technology Adoption: Theory and Future Directions for Informal Learning , 2009 .
[20] M. Herie,et al. Knowledge diffusion in social work: a new approach to bridging the gap. , 2002, Social work.
[21] C. Morosan. Customers' Adoption of Biometric Systems in Restaurants: An Extension of the Technology Acceptance Model , 2011 .
[22] Ann Majchrzak,et al. A Longitudinal Study of Adjustment to Technological Change: From Mass To Computer-Automated Batch Production , 1988 .
[23] J. P. Peter,et al. A Comparative Analysis of Three Consumer Decision Strategies , 1975 .
[24] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[25] Harsh Kupwade Patil,et al. Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.
[26] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[27] Milena M. Head,et al. Manipulating perceived social presence through the web interface and its impact on attitude towards online shopping , 2007, Int. J. Hum. Comput. Stud..
[28] C. Morosan. Theoretical and Empirical Considerations of Guests’ Perceptions of Biometric Systems in Hotels , 2012 .
[29] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[30] L. Bredahl. Determinants of Consumer Attitudes and Purchase Intentions With Regard to Genetically Modified Food – Results of a Cross-National Survey , 2001 .
[31] Annie I. Antón,et al. Towards understanding user perceptions of authentication technologies , 2007, WPES '07.
[32] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[33] Paul Norman,et al. Predicting adherence to eye patching in children with amblyopia: an application of protection motivation theory. , 2003, British journal of health psychology.
[34] Tiago Oliveira,et al. Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context , 2013, Decis. Support Syst..
[35] Richard Clodfelter. Biometric technology in retailing: Will consumers accept fingerprint authentication? , 2010 .
[36] Y. Fried,et al. Location, location, location: contextualizing organizational research* , 2001 .
[37] S. Fournier,et al. Paradoxes of Technology: Consumer Cognizance, Emotions, and Coping Strategies , 1998 .
[38] John Ennis,et al. Swapping PINs for palms – the potential of biometric technology in retail banking , 2012 .
[39] Vincenzo Esposito Vinzi,et al. PLS Path Modeling: From Foundations to Recent Developments and Open Issues for Model Assessment and Improvement , 2010 .
[40] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[41] Wanda J. Orlikowski,et al. Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..
[42] Michel Tenenhaus,et al. PLS path modeling , 2005, Comput. Stat. Data Anal..
[43] Louis M. Gomez,et al. Learning to Use a Text Editor: Some Learner Characteristics that Predict Success , 1987, SGCH.
[44] Eduardo Torres,et al. The influence of corporate image on consumer trust: A comparative analysis in traditional versus internet banking , 2005, Internet Res..
[45] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[46] Geoffrey S. Hubona,et al. Cultural Impacts on Acceptance and Adoption of Information Technology in a Developing Country , 2010, J. Glob. Inf. Manag..
[47] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[48] Vincenzo Russo,et al. Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..
[49] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[50] Paul A. Pavlou,et al. Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..
[51] Mohammad Alamgir Hossain. Exploring the Perceived Measures of Privacy: RFID in Public Applications , 2014, Australas. J. Inf. Syst..
[52] Sookeun Byun,et al. Exploring perceptions toward biometric technology in service encounters: a comparison of current users and potential adopters , 2013, Behav. Inf. Technol..
[53] Reza Barkhi,et al. Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..
[54] D. Whetten. An Examination of the Interface between Context and Theory Applied to the Study of Chinese Organizations , 2009, Management and Organization Review.
[55] Rosalie L. Tung,et al. Share of wallet in retail banking : a comparison of Caucasians in Canada and Australia vis-à-vis Chinese in China and overseas Chinese , 2012 .
[56] Cristian Morosan,et al. Understanding the Antecedents of Perceived Value of Registered Traveler Biometric Systems , 2012 .
[57] Carlos Flavián,et al. Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..
[58] Vinay Kanetkar,et al. Toward a measure of service convenience: multiple‐item scale development and empirical test , 2008 .
[59] Gordon C. Bruner,et al. Toward a unified theory of consumer acceptance technology , 2007 .
[60] Manon Arcand,et al. The impact of reading a web site's privacy statement on perceived control over privacy and perceived trust , 2007, Online Inf. Rev..
[61] Wynne W. Chin. How to Write Up and Report PLS Analyses , 2010 .
[62] Yogesh Kumar Dwivedi,et al. What improves citizens' privacy perceptions toward RFID technology? A cross-country investigation using mixed method approach , 2014, Int. J. Inf. Manag..
[63] Cristian Morosan,et al. Voluntary Steps toward Air Travel Security , 2012 .
[64] R. Oliver. A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions , 1980 .
[65] Jiang Wu,et al. 4th-generation Wireless Infrastructures: Scenarios and Research Challenges , 2001, IEEE Wirel. Commun..
[66] J. Lassen,et al. Societal aspects of genetically modified foods. , 2004, Food and chemical toxicology : an international journal published for the British Industrial Biological Research Association.