-
1
-
-
0036015953
-
Assessing a firm's web presence: A heuristic evaluation procedure for the measurement of usability
-
doi:10.1287/isre.13.2.168.84
-
Agarwal, R., & Venkatesh, V. (2002). Assessing a firm's web presence: A heuristic evaluation procedure for the measurement of usability. Information Systems Research, 13(2), 168-186. doi:10.1287/ isre.13.2.168.84
-
(2002)
Information Systems Research
, vol.13
, Issue.2
, pp. 168-186
-
-
Agarwal, R.1
Venkatesh, V.2
-
2
-
-
33645003633
-
Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on postadoption information technology use
-
Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on postadoption information technology use. Management Information Systems Quarterly, 29(3), 427-459.
-
(2005)
Management Information Systems Quarterly
, vol.29
, Issue.3
, pp. 427-459
-
-
Ahuja, M.K.1
Thatcher, J.B.2
-
3
-
-
0002305454
-
From intentions to actions: A theory of planned behavior
-
In Kuhl, J., & Beckmann, J. (Eds.) New York: Springer Verlag
-
Ajzen, I. (1985). From intentions to actions: A theory of planned behavior . In Kuhl, J., & Beckmann, J. (Eds.), Action Control: From Cognition to Behavior. New York: Springer Verlag.
-
(1985)
Action Control: From Cognition to Behavior
-
-
Ajzen, I.1
-
4
-
-
0001837453
-
Attitude structure and behavior relations
-
In Partkanis, A. R., Berckler, S. T., & Greenwald, A. G. (Eds.)Hillsdale, NJ: Erlbaum
-
Ajzen, I. (1988). Attitude structure and behavior relations . In Partkanis, A. R., Berckler, S. T., & Greenwald, A. G. (Eds.), Attitude Structure and Function. Hillsdale, NJ: Erlbaum.
-
(1988)
Attitude Structure and Function
-
-
Ajzen, I.1
-
5
-
-
44949274046
-
The theory of planned behavior
-
doi:10.1016/0749- 5978(91)90020-T
-
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. doi:10.1016/0749- 5978(91)90020-T
-
(1991)
Organizational Behavior and Human Decision Processes
, vol.50
, Issue.2
, pp. 179-211
-
-
Ajzen, I.1
-
6
-
-
0032626827
-
Attitudes, satisfaction and usage: Factors contributing to each in the acceptance of information technology
-
doi:10.1080/014492999119020
-
Al-Gahtani, S. S., & King, M. (1999). Attitudes, satisfaction and usage: Factors contributing to each in the acceptance of information technology. Behaviour & Information Technology, 18(4), 277-297. doi:10.1080/ 014492999119020
-
(1999)
Behaviour & Information Technology
, vol.18
, Issue.4
, pp. 277-297
-
-
Al-Gahtani, S.S.1
King, M.2
-
7
-
-
17144420958
-
The relationships among job satisfaction, organizational norms, and communicational climate among employees in an academic organization
-
doi:10.1080/00909887909365196
-
Applebaum, R. L., & Anatol, K. W. E. (1979). The relationships among job satisfaction, organizational norms, and communicational climate among employees in an academic organization. Journal of Applied Communication Research, 7(2), 83-90. doi:10.1080/00909887909365196
-
(1979)
Journal of Applied Communication Research
, vol.7
, Issue.2
, pp. 83-90
-
-
Applebaum, R.L.1
Anatol, K.W.E.2
-
8
-
-
2642549662
-
Computer security and risky computing practices: A rational choice perspective
-
Aytes, K., & Connolly, T. (2004). Computer security and risky computing practices: A rational choice perspective. Journal of Organizational and End User Computing, 16(3), 22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
9
-
-
0003526171
-
-
(10th ed.). Belmont, CA: Wadsworth/Thomson Learning
-
Babbie, E. (2004). The practice of social research (10th ed.). Belmont, CA: Wadsworth/Thomson Learning.
-
(2004)
The Practice Of Social Research
-
-
Babbie, E.1
-
10
-
-
0017472917
-
Self-efficacy: Toward a unifying theory of behavioral change
-
doi:10.1037/0033-295X.84.2.191
-
Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191-215. doi:10.1037/0033-295X.84.2.191
-
(1977)
Psychological Review
, vol.84
, Issue.2
, pp. 191-215
-
-
Bandura, A.1
-
13
-
-
0002198728
-
Performance outcome feedback and attributional feedback: Interactive effects on recipient responses
-
doi:10.1037/0021-9010.71.2.203
-
Bannister, B. D. (1986). Performance outcome feedback and attributional feedback: Interactive effects on recipient responses. The Journal of Applied Psychology, 71, 203-210. doi:10.1037/0021-9010.71.2.203
-
(1986)
The Journal of Applied Psychology
, vol.71
, pp. 203-210
-
-
Bannister, B.D.1
-
14
-
-
0024302579
-
Can the field of MIS be disciplined
-
doi:10.1145/63238.63241
-
Banville, C., & Landry, M. (1989). Can the field of MIS be disciplined? Communications of the ACM, 32(1), 48-60. doi:10.1145/63238.63241
-
(1989)
Communications of the ACM
, vol.32
, Issue.1
, pp. 48-60
-
-
Banville, C.1
Landry, M.2
-
15
-
-
0039988884
-
Supporting the information technology champion
-
doi:10.2307/249647
-
Beath, C. M. (1991). Supporting the information technology champion. Management Information Systems Quarterly, 15(3), 355-371. doi:10.2307/249647
-
Management Information Systems Quarterly
, vol.15
, Issue.3
, pp. 355-371
-
-
Beath, C.M.1
-
16
-
-
77956293171
-
-
December. Paper presented at the SAA Conference, New York, NY
-
Berlo, D. K., & Lemert, J. B. (1961, December). An empirical test of a general construct of credibility. Paper presented at the SAA Conference, New York, NY.
-
(1961)
An Empirical Test Of A General Construct Of Credibility
-
-
Berlo, D.K.1
Lemert, J.B.2
-
17
-
-
0000365869
-
Dimensions for evaluating the acceptability of message sources
-
doi:10.1086/267745
-
Berlo, D. K., Lemert, J. B., & Mertz, R. J. (1969). Dimensions for evaluating the acceptability of message sources. Public Opinion Quarterly, 33(4), 563-576. doi:10.1086/267745
-
(1969)
Public Opinion Quarterly
, vol.33
, Issue.4
, pp. 563-576
-
-
Berlo, D.K.1
Lemert, J.B.2
Mertz, R.J.3
-
18
-
-
84960686650
-
Persuasiveness of communication is affected by exposure frequency and message quality: A theoretical and empirical analysis of persisting attitude change
-
Cacioppo, J. T., & Petty, R. E. (1980). Persuasiveness of communication is affected by exposure frequency and message quality: A theoretical and empirical analysis of persisting attitude change. Current Issues & Research in Advertising, 3(1), 97-122.
-
(1980)
Current Issues & Research in Advertising
, vol.3
, Issue.1
, pp. 97-122
-
-
Cacioppo, J.T.1
Petty, R.E.2
-
19
-
-
3042779288
-
The elaboration likelihood model of persuasion
-
Cacioppo, J. T., & Petty, R. E. (1984). The elaboration likelihood model of persuasion. Advances in Consumer Research. Association for Consumer Research (U. S.), 11(1), 673-675.
-
(1984)
Advances in Consumer Research. Association for Consumer Research (U. S.)
, vol.11
, Issue.1
, pp. 673-675
-
-
Cacioppo, J.T.1
Petty, R.E.2
-
20
-
-
0001879464
-
Effects of message repetition on argument processing, recall, and persuasion
-
doi:10.1207/s15324834basp1001-2
-
Cacioppo, J. T., & Petty, R. E. (1989). Effects of message repetition on argument processing, recall, and persuasion. Basic and Applied Social Psychology, 10(1), 3-12. doi:10.1207/s15324834basp1001-2
-
(1989)
Basic and Applied Social Psychology
, vol.10
, Issue.1
, pp. 3-12
-
-
Cacioppo, J.T.1
Petty, R.E.2
-
22
-
-
58149403717
-
Communicator physical attractiveness and persuasion
-
doi:10.1037/0022-3514.37.8.1387
-
Chaiken, S. (1979). Communicator physical attractiveness and persuasion. Journal of Personality and Social Psychology, 37(8), 1387-1397. doi:10.1037/0022-3514.37.8.1387
-
(1979)
Journal of Personality and Social Psychology
, vol.37
, Issue.8
, pp. 1387-1397
-
-
Chaiken, S.1
-
24
-
-
49149116092
-
Computer self-efficacy: Development of a measure and initial test
-
doi:10.2307/249688
-
Compeau, D., & Higgins, C. A. (1995b). Computer self-efficacy: Development of a measure and initial test. Management Information Systems Quarterly, 19(2), 189-211. doi:10.2307/249688
-
(1995)
Management Information Systems Quarterly
, vol.19
, Issue.2
, pp. 189-211
-
-
Compeau, D.1
Higgins, C.A.2
-
25
-
-
77956272019
-
-
Retrieved February 15, 2006, from
-
Cramm, S. (2005). The soft side of persuasion. Retrieved February 15, 2006, from http://www.cio.com/research/leadership/edit/ec051705-persuasion.html
-
(2005)
The Soft Side of Persuasion
-
-
Cramm, S.1
-
26
-
-
1542304914
-
Effect of perceived expertise, strength of advice, and environmental setting on parental compliance
-
Crisci, R., & Kassinove, H. (1973). Effect of perceived expertise, strength of advice, and environmental setting on parental compliance. The Journal of Social Psychology, 89, 245-250.
-
(1973)
The Journal of Social Psychology
, vol.89
, pp. 245-250
-
-
Crisci, R.1
Kassinove, H.2
-
27
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
doi:10.2307/249008
-
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Management Information Systems Quarterly, 13(3), 318-340. doi:10.2307/249008
-
(1989)
Management Information Systems Quarterly
, vol.13
, Issue.3
, pp. 318-340
-
-
Davis, F.D.1
-
28
-
-
0000916949
-
An attribution analysis of the effect of communicator characteristics on opinion change: The case of communicator attractiveness
-
doi:10.1037/h0076850
-
Eagly, A. H., & Chaiken, S. (1975). An attribution analysis of the effect of communicator characteristics on opinion change: The case of communicator attractiveness. Journal of Personality and Social Psychology, 32(1), 136-144. doi:10.1037/h0076850
-
(1975)
Journal of Personality and Social Psychology
, vol.32
, Issue.1
, pp. 136-144
-
-
Eagly, A.H.1
Chaiken, S.2
-
29
-
-
0003551671
-
-
Reading, MA: Addison- Wesley
-
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior. Reading, MA: Addison- Wesley.
-
(1975)
Belief, Attitude, Intention And Behavior
-
-
Fishbein, M.1
Ajzen, I.2
-
30
-
-
18844456006
-
Have you met your organization's computer usage policy
-
doi:10.1108/02635570510583280
-
Foltz, C. B., Cronan, T. P., & Jones, T. W. (2005). Have you met your organization's computer usage policy? Industrial Management & Data Systems, 105(2), 137-146. doi:10.1108/02635570510583280
-
(2005)
Industrial Management & Data Systems
, vol.105
, Issue.2
, pp. 137-146
-
-
Foltz, C.B.1
Cronan, T.P.2
Jones, T.W.3
-
31
-
-
21344490393
-
The persuasion knowledge model: How people cope with persuasion attempts
-
doi:10.1086/209380
-
Friestad, M., & Wright, P. (1994). The persuasion knowledge model: How people cope with persuasion attempts. The Journal of Consumer Research, 21(1), 1-31. doi:10.1086/209380
-
(1994)
The Journal of Consumer Research
, vol.21
, Issue.1
, pp. 1-31
-
-
Friestad, M.1
Wright, P.2
-
32
-
-
0001178032
-
Structural equation modeling techniques and regression: Guidelines for research practice
-
Gefen, D., Straub, D., & Boudreau, M. (2000). Structural equation modeling techniques and regression: Guidelines for research practice. Communications of AIS, 7(7), 1-78.
-
(2000)
Communications of AIS
, vol.7
, Issue.7
, pp. 1-78
-
-
Gefen, D.1
Straub, D.2
Boudreau, M.3
-
33
-
-
0011109771
-
Source credibility and response to fear-arousing communications
-
doi:10.1080/03637756509375436
-
Hewgill, M. A., & Miller, G. (1965). Source credibility and response to fear-arousing communications. Speech Monographs, 32(2), 95-101. doi:10.1080/03637756509375436
-
(1965)
Speech Monographs
, vol.32
, Issue.2
, pp. 95-101
-
-
Hewgill, M.A.1
Miller, G.2
-
35
-
-
33750479041
-
Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet
-
doi:10.1016/j.dss.2006.03.009
-
Hong, S., Thong, J. Y. L., & Tam, K. Y. (2006). Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet. Decision Support Systems, 42(3), 1819-1834. doi:10.1016/j.dss.2006.03.009
-
(2006)
Decision Support Systems
, vol.42
, Issue.3
, pp. 1819-1834
-
-
Hong, S.1
Thong, J.Y.L.2
Tam, K.Y.3
-
36
-
-
0004254851
-
-
New Haven, CT: Yale University Press
-
Hovland, C., Janis, I. L., & Kelly, H. (1953). Communication and persuasion. New Haven, CT: Yale University Press.
-
(1953)
Communication and persuasion
-
-
Hovland, C.1
Janis, I.L.2
Kelly, H.3
-
37
-
-
77958414685
-
The influence of source credibility on communication effectiveness
-
doi:10.1086/266350
-
Hovland, C., & Weiss, W. (1951). The influence of source credibility on communication effectiveness. Public Opinion Quarterly, 15, 635-650. doi:10.1086/266350
-
(1951)
Public Opinion Quarterly
, vol.15
, pp. 635-650
-
-
Hovland, C.1
Weiss, W.2
-
38
-
-
0001199110
-
End-user computing effectiveness: A structural equation model
-
doi:10.1016/0305-0483(90)90055-E
-
Igbaria, M. (1990). End-user computing effectiveness: A structural equation model. OMEGA International Journal of Management Science, 18(6), 637-652. doi:10.1016/0305-0483(90)90055-E
-
(1990)
OMEGA International Journal of Management Science
, vol.18
, Issue.6
, pp. 637-652
-
-
Igbaria, M.1
-
39
-
-
84950633680
-
Computer anxiety and attitudes towards microcomputer use
-
doi:10.1080/01449299008924239
-
Igbaria, M., & Chakrabarti, A. (1990). Computer anxiety and attitudes towards microcomputer use. Behaviour & Information Technology, 9, 229-241. doi:10.1080/01449299008924239
-
(1990)
Behaviour & Information Technology
, vol.9
, pp. 229-241
-
-
Igbaria, M.1
Chakrabarti, A.2
-
41
-
-
0037217039
-
The effects of source credibility and message framing on exercise intentions, behaviors, and attitudes: An integration of the elaboration likelihood model and prospect theory
-
doi:10.1111/j.1559-1816.2003.tb02078.x
-
Jones, L. W., Sinclair, R. C., & Courneya, K. S. (2003). The effects of source credibility and message framing on exercise intentions, behaviors, and attitudes: An integration of the elaboration likelihood model and prospect theory. Journal of Applied Social Psychology, 33(1), 179-196. doi:10.1111/j.1559-1816.2003. tb02078.x
-
(2003)
Journal of Applied Social Psychology
, vol.33
, Issue.1
, pp. 179-196
-
-
Jones, L.W.1
Sinclair, R.C.2
Courneya, K.S.3
-
42
-
-
0346962358
-
Reinstatement of the communicator in delayed measurement of opinion change
-
doi:10.1037/h0061861
-
Kelman, H. C., & Hovland, C. I. (1953). Reinstatement of the communicator in delayed measurement of opinion change. Journal of Abnormal and Social Psychology, 48(3), 327-335. doi:10.1037/h0061861
-
(1953)
Journal of Abnormal and Social Psychology
, vol.48
, Issue.3
, pp. 327-335
-
-
Kelman, H.C.1
Hovland, C.I.2
-
43
-
-
84970118687
-
Speaker credibility in persuasive business communication: A model which explains gender differences
-
doi:10.1177/002194368902600204
-
Kenton, S. B. (1989). Speaker credibility in persuasive business communication: A model which explains gender differences. Journal of Business Communication, 26(2), 143-157. doi:10.1177/002194368902600204
-
(1989)
Journal of Business Communication
, vol.26
, Issue.2
, pp. 143-157
-
-
Kenton, S.B.1
-
46
-
-
84986173272
-
Internet acceptable usage policy for organizations
-
doi:10.1108/09685229710367726
-
Lichtenstein, S., & Swatman, P. M. C. (1997). Internet acceptable usage policy for organizations. Information Management & Computer Security, 5(5), 182-190. doi:10.1108/09685229710367726
-
(1997)
Information Management & Computer Security
, vol.5
, Issue.5
, pp. 182-190
-
-
Lichtenstein, S.1
Swatman, P.M.C.2
-
47
-
-
0022729874
-
Credibility of source of communication on products' safety hazards
-
Lirtzman, S. I., & Shuv-Ami, A. (1986). Credibility of source of communication on products' safety hazards. Psychological Reports, 58, 707-718.
-
(1986)
Psychological Reports
, vol.58
, pp. 707-718
-
-
Lirtzman, S.I.1
Shuv-Ami, A.2
-
48
-
-
0001395146
-
Effects of source expertness, physical attractiveness, and supporting arguments on persuasion: A case of brains over beauty
-
doi:10.1037/0022-3514.39.2.235
-
Maddux, J. E., & Rogers, R. W. (1980). Effects of source expertness, physical attractiveness, and supporting arguments on persuasion: A case of brains over beauty. Journal of Personality and Social Psychology, 39, 235-244. doi:10.1037/0022- 3514.39.2.235
-
(1980)
Journal of Personality and Social Psychology
, vol.39
, pp. 235-244
-
-
Maddux, J.E.1
Rogers, R.W.2
-
49
-
-
0032341068
-
The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research
-
doi:10.1287/isre.9.2.126
-
Marakas, G. M., Yi, M. Y., & Johnson, R. D. (1998). The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research. Information Systems Research, 9(2), 126-163. doi:10.1287/isre.9.2.126
-
(1998)
Information Systems Research
, vol.9
, Issue.2
, pp. 126-163
-
-
Marakas, G.M.1
Yi, M.Y.2
Johnson, R.D.3
-
50
-
-
84985100162
-
The effects of message intensity on receiver evaluations of source, message and topic
-
doi:10.1111/j.1460-2466.1970.tb00892.x
-
McEwen, W. J., & Greenberg, B. S. (1970). The effects of message intensity on receiver evaluations of source, message and topic. The Journal of Communication, 20(4), 340-350. doi:10.1111/j.1460-2466.1970.tb00892.x
-
(1970)
The Journal of Communication
, vol.20
, Issue.4
, pp. 340-350
-
-
McEwen, W.J.1
Greenberg, B.S.2
-
51
-
-
0001924576
-
An information-processing model of advertising effectiveness
-
In Davis, H. L., & Silk, A. J. (Eds.) New York: Wiley
-
McGuire, W. J. (1978). An information-processing model of advertising effectiveness . In Davis, H. L., & Silk, A. J. (Eds.), Behavioral and management sciences in marketing (pp. 156-180). New York: Wiley.
-
(1978)
Behavioral and Management Sciences In Marketing
, pp. 156-180
-
-
McGuire, W.J.1
-
52
-
-
0001827817
-
A theoretical assessment of the user satisfaction construct in information systems research
-
doi:10.1287/mnsc.36.1.76
-
Melone, N. P. (1990). A theoretical assessment of the user satisfaction construct in information systems research. Management Science, 36(1), 76-91. doi:10.1287/mnsc.36.1.76
-
(1990)
Management Science
, vol.36
, Issue.1
, pp. 76-91
-
-
Melone, N.P.1
-
53
-
-
73449149291
-
Development of an instrument to measure the perceptions of adopting an information technology innovation
-
doi:10.1287/ isre.2.3.192
-
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222. doi:10.1287/ isre.2.3.192
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 192-222
-
-
Moore, G.C.1
Benbasat, I.2
-
54
-
-
0012893808
-
Source credibility, social comparison, and social influence
-
Mugny, G., Tafani, E., Falomir, P., Juan, M., & Layat, C. (2000). Source credibility, social comparison, and social influence. Revue Internationale de Psychologie Sociale, 13, 151-175.
-
(2000)
Revue Internationale de Psychologie Sociale
, vol.13
, pp. 151-175
-
-
Mugny, G.1
Tafani, E.2
Falomir, P.3
Juan, M.4
Layat, C.5
-
56
-
-
4644268774
-
Crafting information technology governance
-
doi:10.1201/1078/44705.21.4.200409 01/84183.2
-
Peterson, R. (2004). Crafting information technology governance. Information Systems Management, 21(4), 7-22. doi:10.1201/1078/44705.21.4.200409 01/84183.2
-
(2004)
Information Systems Management
, vol.21
, Issue.4
, pp. 7-22
-
-
Peterson, R.1
-
57
-
-
0001132217
-
Source factors and the elaboration likelihood model of persuasion
-
Petty, R. E., & Cacioppo, J. T. (1984). Source factors and the elaboration likelihood model of persuasion. Advances in Consumer Research. Association for Consumer Research (U. S.), 11(1), 668-672.
-
(1984)
Advances in Consumer Research. Association for Consumer Research (U. S.)
, vol.11
, Issue.1
, pp. 668-672
-
-
Petty, R.E.1
Cacioppo, J.T.2
-
58
-
-
1542380758
-
The persuasiveness of source credibility: A critical review of five decade's evidence
-
doi:10.1111/j.1559-1816.2004.tb02547.x
-
Pornpitakpan, C. (2004). The persuasiveness of source credibility: A critical review of five decade's evidence. Journal of Applied Social Psychology, 34(2), 243-281. doi:10.1111/j.1559-1816.2004. tb02547.x
-
(2004)
Journal of Applied Social Psychology
, vol.34
, Issue.2
, pp. 243-281
-
-
Pornpitakpan, C.1
-
59
-
-
0344521267
-
Do current measures of dimensions of source credibility produce stable outcomes in replicated tests
-
Powell, F. C., & Wanzenried, J. W. (1995). Do current measures of dimensions of source credibility produce stable outcomes in replicated tests? Perceptual and Motor Skills, 81(2), 675-687.
-
(1995)
Perceptual and Motor Skills
, vol.81
, Issue.2
, pp. 675-687
-
-
Powell, F.C.1
Wanzenried, J.W.2
-
60
-
-
21844526896
-
Source attributions and persuasion: Perceived honesty as a determinant of message scrutiny
-
doi:10.1177/0146167295216010
-
Priester, J. R., & Petty, R. E. (1995). Source attributions and persuasion: Perceived honesty as a determinant of message scrutiny. Personality and Social Psychology Bulletin, 21(6), 637-654. doi:10.1177/0146167295216010
-
(1995)
Personality and Social Psychology Bulletin
, vol.21
, Issue.6
, pp. 637-654
-
-
Priester, J.R.1
Petty, R.E.2
-
61
-
-
0001940135
-
Factors that influence the social dimension of alignment between business and information technology objectives
-
doi:10.2307/3250980
-
Reich, B. H., & Benbasat, I. (2000). Factors that influence the social dimension of alignment between business and information technology objectives. Management Information Systems Quarterly, 24(1), 81-113. doi:10.2307/3250980
-
(2000)
Management Information Systems Quarterly
, vol.24
, Issue.1
, pp. 81-113
-
-
Reich, B.H.1
Benbasat, I.2
-
62
-
-
0037373508
-
Understanding it adoption decisions in small business: Integrating current theories
-
doi:10.1016/ S0378-7206(02)00010-1
-
Riemenschneider, C. K., Harrison, D. A., & Mykytyn, P. P. (2003). Understanding it adoption decisions in small business: Integrating current theories. Information & Management, 40(4), 269-285. doi:10.1016/ S0378-7206(02)00010-1
-
(2003)
Information & Management
, vol.40
, Issue.4
, pp. 269-285
-
-
Riemenschneider, C.K.1
Harrison, D.A.2
Mykytyn, P.P.3
-
63
-
-
0001543567
-
User attitudes and management information systems use
-
doi:10.2307/255742
-
Robey, D. (1979). User attitudes and management information systems use. Academy of Management, 22(3), 527-538. doi:10.2307/255742
-
(1979)
Academy of Management
, vol.22
, Issue.3
, pp. 527-538
-
-
Robey, D.1
-
64
-
-
58149405986
-
Interpersonal trust, trustworthiness, and gullibility
-
doi:10.1037/0003-066X.35.1.1
-
Rotter, J. B. (1980). Interpersonal trust, trustworthiness, and gullibility. The American Psychologist, 35(1), 1-7. doi:10.1037/0003-066X.35.1.1
-
(1980)
The American Psychologist
, vol.35
, Issue.1
, pp. 1-7
-
-
Rotter, J.B.1
-
65
-
-
2942738445
-
Arrangements for information technology governance: A theory of multiple contingencies
-
doi:10.2307/249754
-
Sambamurthy, V., & Zmud, R. W. (1999). Arrangements for information technology governance: A theory of multiple contingencies. Management Information Systems Quarterly, 23(2), 261-290. doi:10.2307/249754
-
(1999)
Management Information Systems Quarterly
, vol.23
, Issue.2
, pp. 261-290
-
-
Sambamurthy, V.1
Zmud, R.W.2
-
66
-
-
0035580128
-
Computers as tools or as social actors? The users' perspective on anthropomorphic agents
-
doi:10.1142/S0218843001000321
-
Schaumburg, H. (2001). Computers as tools or as social actors? The users' perspective on anthropomorphic agents. International Journal of Cooperative Information Systems, 10(1-2), 217-234. doi:10.1142/ S0218843001000321
-
(2001)
International Journal of Cooperative Information Systems
, vol.10
, Issue.1-2
, pp. 217-234
-
-
Schaumburg, H.1
-
67
-
-
50049128296
-
Factors influencing protection motivation and IS security policy compliance
-
November
-
Siponen, M., Pahnila, S., & Mahmood, A. (2006, November). Factors influencing protection motivation and IS security policy compliance. Innovations in Information Technology, 1.
-
(2006)
Innovations in Information Technology
, vol.1
-
-
Siponen, M.1
Pahnila, S.2
Mahmood, A.3
-
68
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
doi:10.1108/09685220010371394
-
Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31-41. doi:10.1108/09685220010371394
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
69
-
-
47049090036
-
The attitude-behavior relationship in consumer conduct: The role of norms, past behavior, and self-identity
-
doi:10.3200/ SOCP.148.3.311-334
-
Smith, J. R., Terry, D. J., Manstead, A. S., Louis, W. R., & Wolfs, D. K. J. (2008). The attitude-behavior relationship in consumer conduct: The role of norms, past behavior, and self-identity. The Journal of Social Psychology, 148(3), 311-333. doi:10.3200/ SOCP.148.3.311-334
-
(2008)
The Journal of Social Psychology
, vol.148
, Issue.3
, pp. 311-333
-
-
Smith, J.R.1
Terry, D.J.2
Manstead, A.S.3
Louis, W.R.4
Wolfs, D.K.J.5
-
70
-
-
13244286108
-
Validation guidelines for IS positivist research
-
Straub, D. W., Boudreau, M. C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communications of AIS, 13, 380-427.
-
(2004)
Communications of AIS
, vol.13
, pp. 380-427
-
-
Straub, D.W.1
Boudreau, M.C.2
Gefen, D.3
-
71
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
doi:10.2307/249551
-
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. Management Information Systems Quarterly, 22(4), 441-469. doi:10.2307/249551
-
(1998)
Management Information Systems Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
72
-
-
85007654794
-
Acceptance and rejection of a suggestion
-
Suzuki, K. (1978). Acceptance and rejection of a suggestion. The Japanese Psychological Research, 20, 60-70.
-
(1978)
The Japanese Psychological Research
, vol.20
, pp. 60-70
-
-
Suzuki, K.1
-
73
-
-
33749390822
-
Intentions to use information technologies: An integrative model
-
Thompson, R., Compeau, D., & Higgins, C. (2006). Intentions to use information technologies: An integrative model. Journal of Organizational and End User Computing, 18(3), 25-46.
-
(2006)
Journal of Organizational and End User Computing
, vol.18
, Issue.3
, pp. 25-46
-
-
Thompson, R.1
Compeau, D.2
Higgins, C.3
-
74
-
-
38749129220
-
Personal computing: Toward a conceptual model of utilization
-
doi:10.2307/249443
-
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. Management Information Systems Quarterly, 15(1), 125-143. doi:10.2307/249443
-
(1991)
Management Information Systems Quarterly
, vol.15
, Issue.1
, pp. 125-143
-
-
Thompson, R.L.1
Higgins, C.A.2
Howell, J.M.3
-
75
-
-
0033872521
-
A theoretical extension of the technology acceptance model: Four longitudinal field studies
-
doi:10.1287/mnsc.46.2.186.11926
-
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186-204. doi:10.1287/mnsc.46.2.186.11926
-
(2000)
Management Science
, vol.46
, Issue.2
, pp. 186-204
-
-
Venkatesh, V.1
Davis, F.D.2
-
76
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. Management Information Systems Quarterly, 27(3), 425-478.
-
(2003)
Management Information Systems Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
77
-
-
2642569127
-
Introducing the Check-Off Password System (COPS): An advancement in user authentication methods and information security
-
Warkentin, M., Davis, K., & Bekkering, E. (2004). Introducing the Check-Off Password System (COPS): An advancement in user authentication methods and information security. Journal of Organizational and End User Computing, 16(3), 41-58.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 41-58
-
-
Warkentin, M.1
Davis, K.2
Bekkering, E.3
-
78
-
-
77955101093
-
IT security governance and centralized security controls
-
In Warkentin, M., & Vaughn, R. (Eds.)Hershey, PA: IGI Global
-
Warkentin, M., & Johnston, A. C. (2006). IT security governance and centralized security controls . In Warkentin, M., & Vaughn, R. (Eds.), Enterprise Information Assurance and System Security: Managerial and Technical Issues (pp. 16-24). Hershey, PA: IGI Global.
-
(2006)
Enterprise Information Assurance and System Security: Managerial and Technical Issues
, pp. 16-24
-
-
Warkentin, M.1
Johnston, A.C.2
-
79
-
-
67650180632
-
IT governance and organizational design for security management
-
In Baskerville, R., Goodman, S., & Straub, D. W. (Eds.) Armonk, NY: M.E. Sharpe
-
Warkentin, M., & Johnston, A. C. (2008). IT governance and organizational design for security management . In Baskerville, R., Goodman, S., & Straub, D. W. (Eds.), Information Security Policies and Practices. Armonk, NY: M. E. Sharpe.
-
(2008)
Information Security Policies and Practices
-
-
Warkentin, M.1
Johnston, A.C.2
-
80
-
-
84889576026
-
Factors of source credibility
-
doi:10.1080/00335636809382870
-
Whitehead, J. L. Jr. (1968). Factors of source credibility. The Quarterly Journal of Speech, 54, 59-63. doi:10.1080/00335636809382870
-
(1968)
The Quarterly Journal of Speech
, vol.54
, pp. 59-63
-
-
Whitehead Jr., J.L.1
-
81
-
-
0000126592
-
Personal communication in marketing: An examination of self-interest contingency relationships
-
doi:10.2307/3172849.May
-
Wiener, J. L., LaForge, R. W., & Goolsby, J. R. (1990, May). Personal communication in marketing: An examination of self-interest contingency relationships. JMR, Journal of Marketing Research, 27, 227-231. doi:10.2307/3172849
-
(1990)
JMR, Journal of Marketing Research
, vol.27
, pp. 227-231
-
-
Wiener, J.L.1
LaForge, R.W.2
Goolsby, J.R.3
-
82
-
-
84995188403
-
Retention of opinion change as a function of differential source credibility
-
doi:10.1080/00207596808247232
-
Wittaker, J. O., & Meade, R. D. (1968). Retention of opinion change as a function of differential source credibility. International Journal of Psychology, 3, 103-108. doi:10.1080/00207596808247232
-
(1968)
International Journal of Psychology
, vol.3
, pp. 103-108
-
-
Wittaker, J.O.1
Meade, R.D.2
-
83
-
-
84941646855
-
Putting the fear back into fear appeals: The extended parallel process model
-
doi:10.1080/03637759209376276
-
Witte, K. (1992). Putting the fear back into fear appeals: The extended parallel process model. Communication Monographs, 59, 329-349. doi:10.1080/03637759209376276
-
(1992)
Communication Monographs
, vol.59
, pp. 329-349
-
-
Witte, K.1
-
84
-
-
0000798667
-
The effect of numbers on the route to persuasion
-
doi:10.1086/208988
-
Yalch, R. F., & Elmore-Yalch, R.. The effect of numbers on the route to persuasion. The Journal of Consumer Research, 11, 522-527. doi:10.1086/208988
-
The Journal of Consumer Research
, vol.11
, pp. 522-527
-
-
Yalch, R.F.1
Elmore-Yalch, R.2
-
85
-
-
33745728522
-
Supporting distributed groups with group support systems: A study of the effects of group leaders and communication modes on group performance
-
Youngjin, K. (2006). Supporting distributed groups with group support systems: A study of the effects of group leaders and communication modes on group performance. Journal of Organizational and End User Computing, 18(2), 20-37.
-
(2006)
Journal of Organizational and End User Computing
, vol.18
, Issue.2
, pp. 20-37
-
-
Youngjin, K.1
|