-
1
-
-
0036015953
-
Assessing a firm's web presence: a heuristic evaluation procedure for the measurement of usability
-
Agarwal R., and Venkatesh V. Assessing a firm's web presence: a heuristic evaluation procedure for the measurement of usability. Information Systems Research 13 2 (2002) 168-188
-
(2002)
Information Systems Research
, vol.13
, Issue.2
, pp. 168-188
-
-
Agarwal, R.1
Venkatesh, V.2
-
3
-
-
56049123977
-
-
AOL/NCSA, Online Safety Study, 2004, last accessed on, at: http://www.staysafeonline.info/news/safety_study_v04.pdf.
-
AOL/NCSA, Online Safety Study, 2004, last accessed on, at: http://www.staysafeonline.info/news/safety_study_v04.pdf.
-
-
-
-
5
-
-
84867973432
-
Trustworthiness in electronic commerce: the role of privacy, security, and site attributes
-
Belanger F., Hiller J.S., and Smith W.J. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11 (2002) 245-270
-
(2002)
Journal of Strategic Information Systems
, vol.11
, pp. 245-270
-
-
Belanger, F.1
Hiller, J.S.2
Smith, W.J.3
-
9
-
-
56049092639
-
-
CERT/CC, 2004 E-Crime Watch Survey: Summary of Findings, CSO Magazine and Computer Emergency Response Team/Coordination Center, Carnegie Mellon Software Engineering Institute, 2004.
-
CERT/CC, 2004 E-Crime Watch Survey: Summary of Findings, CSO Magazine and Computer Emergency Response Team/Coordination Center, Carnegie Mellon Software Engineering Institute, 2004.
-
-
-
-
10
-
-
33750478684
-
Adoption of Internet banking: an empirical study in Hong Kong
-
Cheng T.C.E., Lam D.Y.C., and Yeung A.C.L. Adoption of Internet banking: an empirical study in Hong Kong. Decision Support Systems 42 3 (2006) 1558-1572
-
(2006)
Decision Support Systems
, vol.42
, Issue.3
, pp. 1558-1572
-
-
Cheng, T.C.E.1
Lam, D.Y.C.2
Yeung, A.C.L.3
-
11
-
-
0000004470
-
Social cognitive theory and individual reactions to computing technology: a longitudinal study
-
Compeau D. Social cognitive theory and individual reactions to computing technology: a longitudinal study. MIS Quarterly 23 2 (1999) 145-158
-
(1999)
MIS Quarterly
, vol.23
, Issue.2
, pp. 145-158
-
-
Compeau, D.1
-
12
-
-
0001501223
-
"How did they get my name?": an exploratory investigation of consumer attitudes toward secondary information use
-
Culnan M.J. "How did they get my name?": an exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17 3 (1993) 341
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341
-
-
Culnan, M.J.1
-
13
-
-
0033464665
-
Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation
-
Culnan M.J., and Armstrong P.K. Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science 10 1 (1999)
-
(1999)
Organization Science
, vol.10
, Issue.1
-
-
Culnan, M.J.1
Armstrong, P.K.2
-
14
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13 3 (1989) 319-339
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-339
-
-
Davis, F.D.1
-
16
-
-
1642443437
-
Hacking begins at home: are company networks at risk from home computers?
-
Furnell S.M. Hacking begins at home: are company networks at risk from home computers?. Computer Fraud & Security 1 (2004) 4-7
-
(2004)
Computer Fraud & Security
, Issue.1
, pp. 4-7
-
-
Furnell, S.M.1
-
17
-
-
0000201126
-
Variables affecting perception of invasion of privacy in personnel selection situation
-
Fusilier M.R., and Hoyer W.D. Variables affecting perception of invasion of privacy in personnel selection situation. Journal of Applied Psychology 65 5 (1980) 623
-
(1980)
Journal of Applied Psychology
, vol.65
, Issue.5
, pp. 623
-
-
Fusilier, M.R.1
Hoyer, W.D.2
-
18
-
-
0000426285
-
Privacy: recognition of a consumer right
-
Goodwin C. Privacy: recognition of a consumer right. Journal of Public Policy & Marketing 10 1 (1991) 149-166
-
(1991)
Journal of Public Policy & Marketing
, vol.10
, Issue.1
, pp. 149-166
-
-
Goodwin, C.1
-
23
-
-
36249020892
-
A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents
-
Kim D.J., Ferrin D.L., and Rao H.R. A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems 44 2 (2008) 544-564
-
(2008)
Decision Support Systems
, vol.44
, Issue.2
, pp. 544-564
-
-
Kim, D.J.1
Ferrin, D.L.2
Rao, H.R.3
-
24
-
-
0036015968
-
Applying the technology acceptance model and flow theory to online consumer behavior
-
Koufaris M. Applying the technology acceptance model and flow theory to online consumer behavior. Information Systems Research 13 2 (2002) 205-223
-
(2002)
Information Systems Research
, vol.13
, Issue.2
, pp. 205-223
-
-
Koufaris, M.1
-
25
-
-
34547692964
-
Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: an exploratory study of government-citizens online interactions in a turbulent environment
-
Lee J., and Rao H.R. Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: an exploratory study of government-citizens online interactions in a turbulent environment. Decision Support Systems 43 4 (2007) 1431-1449
-
(2007)
Decision Support Systems
, vol.43
, Issue.4
, pp. 1431-1449
-
-
Lee, J.1
Rao, H.R.2
-
26
-
-
4544359599
-
Beyond concern: a privacy-trust-behavioral intention model of electronic commerce
-
Liua C., Marchewkaa J.T., Lub J., and Yub C.-S. Beyond concern: a privacy-trust-behavioral intention model of electronic commerce. Information & Management 42 1 (2004) 127-142
-
(2004)
Information & Management
, vol.42
, Issue.1
, pp. 127-142
-
-
Liua, C.1
Marchewkaa, J.T.2
Lub, J.3
Yub, C.-S.4
-
27
-
-
55249097295
-
Four ethical issues of the information age
-
Mason R.O. Four ethical issues of the information age. MIS Quarterly 10 1 (1986) 5-12
-
(1986)
MIS Quarterly
, vol.10
, Issue.1
, pp. 5-12
-
-
Mason, R.O.1
-
29
-
-
0000981743
-
Information privacy: measuring individuals' concerns about organizational practices
-
Smith H.J., Milberg S.J., and Burke S.J. Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly 20 2 (1996) 167
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167
-
-
Smith, H.J.1
Milberg, S.J.2
Burke, S.J.3
-
30
-
-
0036004583
-
An empirical examination of the concern for information privacy instrument
-
Stewart K.A., and Segars A.H. An empirical examination of the concern for information privacy instrument. Information Systems Research 13 1 (2002) 36-49
-
(2002)
Information Systems Research
, vol.13
, Issue.1
, pp. 36-49
-
-
Stewart, K.A.1
Segars, A.H.2
-
31
-
-
56049098628
-
-
B. Tedeschi, Poll Says Identity Theft Concerns Rose after High-Profile Breaches, in: The New York Times, New York, 2005.
-
B. Tedeschi, Poll Says Identity Theft Concerns Rose after High-Profile Breaches, in: The New York Times, New York, 2005.
-
-
-
-
32
-
-
1042268474
-
An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy
-
Thatcher J.B., and Perrewé P.L. An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly 26 4 (2002) 381-396
-
(2002)
MIS Quarterly
, vol.26
, Issue.4
, pp. 381-396
-
-
Thatcher, J.B.1
Perrewé, P.L.2
-
33
-
-
0037412301
-
Privacy on the web: an examination of user concerns, technology, and implications for business organizations and individuals
-
Turner E.C., and Dasgupta S. Privacy on the web: an examination of user concerns, technology, and implications for business organizations and individuals. Information Systems Management 20 1 (2003) 8-18
-
(2003)
Information Systems Management
, vol.20
, Issue.1
, pp. 8-18
-
-
Turner, E.C.1
Dasgupta, S.2
-
34
-
-
9744271731
-
User acceptance of hedonic information systems
-
van der Heijden H. User acceptance of hedonic information systems. MIS Quarterly 28 4 (2004) 695-704
-
(2004)
MIS Quarterly
, vol.28
, Issue.4
, pp. 695-704
-
-
van der Heijden, H.1
-
35
-
-
0033872521
-
A theoretical extension of the technology acceptance model: four longitudinal field studies
-
Venkatesh V., and Davis F. A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science 46 2 (2000) 186-204
-
(2000)
Management Science
, vol.46
, Issue.2
, pp. 186-204
-
-
Venkatesh, V.1
Davis, F.2
-
36
-
-
1542382496
-
User acceptance of information technology: toward a unified view
-
Venkatesh V., Morris M.G., Davis G.B., and Davis F.D. User acceptance of information technology: toward a unified view. MIS Quarterly 27 3 (2003) 425-478
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
37
-
-
18944367029
-
A theoretical integration of user satisfaction and technology acceptance
-
Wixom B., and Todd P. A theoretical integration of user satisfaction and technology acceptance. Information Systems Research 16 1 (2005) 85-102
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 85-102
-
-
Wixom, B.1
Todd, P.2
-
38
-
-
4243066338
-
It's all about attitude: revisiting the technology acceptance model
-
Yang H.-d., and Yoo Y. It's all about attitude: revisiting the technology acceptance model. Decision Support Systems 38 1 (2004) 19-31
-
(2004)
Decision Support Systems
, vol.38
, Issue.1
, pp. 19-31
-
-
Yang, H.-d.1
Yoo, Y.2
-
39
-
-
34548477450
-
Network externalities, layered protection and it security risk management
-
Yue W.T., Cakanyildirim M., Ryu Y.U., and Liu D. Network externalities, layered protection and it security risk management. Decision Support Systems 44 1 (2007) 1-16
-
(2007)
Decision Support Systems
, vol.44
, Issue.1
, pp. 1-16
-
-
Yue, W.T.1
Cakanyildirim, M.2
Ryu, Y.U.3
Liu, D.4
|