Initial Development of a Learners ’ Ratified Acceptance of Multibiometrics Intentions Model ( RAMIM )
暂无分享,去创建一个
[1] Yair Levy,et al. Towards a framework of biometrics exam authentication in e-learning environments , 2007 .
[2] Fred D. Davis. A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .
[3] Nicole A. Buzzetto-More. Student Perceptions of Various E-Learning Components , 2008 .
[4] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[5] David J. Paper,et al. User Acceptance of Voice Recognition Technology: An Empirical Extension of the Technology Acceptance Model , 2007, J. Organ. End User Comput..
[6] John D. Woodward,et al. Biometrics: privacy's foe or privacy's friend? , 1997, Proc. IEEE.
[7] Khalil El-Khatib,et al. Privacy and Security in E-Learning , 2003, Int. J. Distance Educ. Technol..
[8] Lori N. K. Leonard,et al. An Empirical Validation of Perceived Importance and Behavior Intention in IT Ethics , 2005 .
[9] Liora Pedhazur Schmelkin,et al. Faculty Perceptions of Academic Dishonesty: A Multidimensional Scaling Analysis , 2003 .
[10] Gaby Odekerken-Schröder,et al. Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .
[11] Yair Levy,et al. Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University , 2006, J. Cases Inf. Technol..
[12] Marlyn Kemper Littman. Guidelines for Network Security in the Learning Environment. , 1996 .
[13] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[14] Denise Nitterhouse,et al. Plagiarism – Not Just an ``Academic'' Problem , 2003 .
[15] Steve Wheeler. Connected Minds, Emerging Cultures: Cybercultures in Online Learning , 2008 .
[16] Detmar W. Straub,et al. Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..
[17] Arun Ross,et al. Multibiometric systems , 2004, CACM.
[18] Deborah Compeau,et al. Intentions to Use Information Technologies: An Integrative Model , 2006, J. Organ. End User Comput..
[19] Jane E. West. Increasing access to higher education for students with disabilities and strengthening the preparation of professionals who instruct them: The Higher Education Opportunity Act of 2008 , 2009 .
[20] Terry W. Loe,et al. The Impact of Ethics Code Familiarity on Manager Behavior , 2001 .
[21] Hassan M. Selim,et al. Critical success factors for e-learning acceptance: Confirmatory factor models , 2007, Comput. Educ..
[22] Jingguo Wang,et al. Research Note - A Value-at-Risk Approach to Information Security Investment , 2008, Inf. Syst. Res..
[23] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[24] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[25] Steven Furnell,et al. Advanced user authentication for mobile devices , 2007, Comput. Secur..
[26] Roxane L. Dufrene,et al. The Ethical Decision-Making Scale-Revised , 2004 .
[27] Craig V. VanSandt,et al. An Examination of the Relationship Between Ethical Work Climate and Moral Awareness , 2006 .
[28] Wayne Bedford,et al. Implementing Technology to Prevent Online Cheating: A Case Study at a Small Southern Regional University (SSRU) , 2009 .
[29] Jay F. Nunamaker,et al. Can e-learning replace classroom learning? , 2004, CACM.
[30] Fernando L. Podio,et al. Biometric Authentication Technology: From the Movies to Your Desktop , 2001 .
[31] Charles D. Barrett. Understanding Attitudes and Predicting Social Behavior , 1980 .
[32] Yoram Eshet-Alkalai,et al. Does the medium affect the message? The influence of text representation format on critical thinking , 2007 .
[33] Joobin Choobineh,et al. Enterprise information security strategies , 2008, Comput. Secur..
[34] Alexander P. Pons. Biometric marketing: targeting the online consumer , 2006, CACM.
[35] John Ingham,et al. Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..
[36] Detmar W. Straub,et al. Validation in Information Systems Research: A State-of-the-Art Assessment , 2001, MIS Q..
[37] Philip Barker,et al. Assessing the Value of E‐Learning Systems , 2006 .
[38] Kristen M. Kennedy,et al. Academic dishonesty and distance learning: Student and faculty views. , 2000 .
[39] Mohammed Y. A. Rawwas,et al. Academic Dishonesty: A Cross-Cultural Comparison of U.S. and Chinese Marketing Students , 2004 .
[40] Chih-Lung Lin,et al. Palmprint verification using hierarchical decomposition , 2005, Pattern Recognit..
[41] Terry W. Loe,et al. Ethics Code Familiarity and Usefulness: Views on Idealist and Relativist Managers Under Varying Conditions of Turbulence , 2003 .
[42] Carla E. Brodley,et al. User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.
[43] Jeffrey L. Bailie,et al. Online Learner Authentication: Verifying the Identity of Online Users , 2009 .
[44] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[45] Julie Thorpe,et al. On predictive models and user-drawn graphical passwords , 2008, TSEC.
[46] Bruce W. Char,et al. Academic dishonesty in a high-tech environment , 2003, SIGCSE.
[47] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[48] Craig A. Mertler,et al. Advanced and multivariate statistical methods: Practical application and interpretation: Sixth edition , 2001 .
[49] R. Coughlan,et al. Codes, Values and Justifications in the Ethical Decision-Making Process , 2005 .
[50] Raafat George Saadé,et al. The impact of cognitive absorption on perceived usefulness and perceived ease of use in on-line learning: an extension of the technology acceptance model , 2005, Inf. Manag..
[51] Michelle M. Ramim,et al. An examination of factors associated with students' ethical decision making in post-secondary e-learning programs , 2007 .
[52] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[53] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[54] Anindya Ghose,et al. The Economic Incentives for Sharing Security Information , 2004, Inf. Syst. Res..
[55] Eric W. T. Ngai,et al. Empirical examination of the adoption of WebCT using TAM , 2007, Comput. Educ..
[56] Steven Furnell,et al. Authentication and Supervision: A Survey of User Attitudes , 2000, Comput. Secur..
[57] Michael G. Strintzis,et al. A 3D face and hand biometric system for robust user-friendly authentication , 2007, Pattern Recognit. Lett..
[58] Marlyn K. Littman. Security in the Telelearning Environment: Part I: Cyberinvasions and Countermeasures. , 1997 .
[59] Nitza Geri,et al. Is There a Value Paradox of E-Learning in MBA Programs? , 2007 .
[60] J. Moor. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[61] Yair Levy,et al. An empirical development of critical value factors (CVF) of online learning activities: An application of activity theory and cognitive value theory , 2008, Comput. Educ..
[62] Armin Liebl,et al. Authentication in distributed systems: a bibliography , 1993, OPSR.
[63] David R. Firth,et al. Communications of the Association for Information Systems , 2011 .
[64] Liz Riley,et al. E-Learning and Constructivism: From Theory to Application , 2009 .
[65] Huseyin Cavusoglu,et al. The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..
[66] Yair Levy,et al. An Empirical Study of Computer Self-Efficacy and the Technology Acceptance Model in the Military: A Case of a U.S. Navy Combat Information System , 2009, J. Organ. End User Comput..
[67] Elmarie Kritzinger. Information Security in an E-learning Environment , 2006, Education for the 21st Century.
[68] Quey-Jen Yeh,et al. Threats and countermeasures for information system security: A cross-industry study , 2007, Inf. Manag..
[69] Hassan M. Selim,et al. An empirical investigation of student acceptance of course websites , 2003, Comput. Educ..
[70] Timothy Paul Cronan,et al. How men and women view ethics , 1998, CACM.
[71] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[72] Elmarie Kritzinger,et al. E-learning: Incorporating Information Security Governance , 2006 .
[73] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[74] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[75] C.A. Dorantes,et al. Ethical Decision-Making in an IT Context: The Roles of Personal Moral Philosophies and Moral Intensity , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[76] Andrea F. Abate,et al. 2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..
[77] Rossouw von Solms,et al. Information security requirements - Interpreting the legal aspects , 2008, Comput. Secur..
[78] Reza Barkhi,et al. Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..
[79] Steven Furnell,et al. A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head , 2007, Comput. Secur..
[80] Donald L. Mccabe,et al. Ten (Updated) Principles of Academic Integrity: How Faculty Can Foster Student Honesty , 2004 .
[81] Nicolas Christin,et al. Undercover: authentication usable in front of prying eyes , 2008, CHI.
[82] Kenji Takahashi,et al. Authentication using multiple communication channels , 2005, DIM '05.
[83] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[84] Juhani Heikka,et al. Do secure information system design methods provide adequate modeling support? , 2008, Inf. Softw. Technol..
[85] Richard P. Bagozzi,et al. The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift , 2007, J. Assoc. Inf. Syst..
[86] Anil K. Jain,et al. Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[87] L. Ferrell,et al. A Review of Empirical Studies Assessing Ethical Decision Making in Business , 2000 .
[88] Camille F. Rogers,et al. Faculty perceptions about e-cheating during online testing , 2006 .
[89] ProTon Europe,et al. Ethics and technology : ethical issues in an age of information and communication technology , 2007 .