메뉴 건너뛰기




Volumn 4, Issue , 2005, Pages 1575-1582

The web of system performance: Extending the TAM model

Author keywords

Conjoint analysis; Connectivity; Extendibility; Flexibility; Functionality; Privacy; Reliability; Security; System requirements; TAM; Usability; WOSP

Indexed keywords

CONJOINT ANALYSIS; CONNECTIVITY; EXTENDIBILITY; FLEXIBILITY; FUNCTIONALITY; SECURITY; SYSTEM REQUIREMENTS; TAM; USABILITY; WOSP;

EID: 84869790200     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (30)
  • 1
    • 0346085299 scopus 로고    scopus 로고
    • A general, yet useful theory of information systems
    • Alter, S. (1999) A general, yet useful theory of information systems, Communications oftheAIS, 1, 13.
    • (1999) Communications OftheAIS , vol.1 , pp. 13
    • Alter, S.1
  • 2
    • 0006372914 scopus 로고    scopus 로고
    • A study of senior information systems manager's decision models in adopting new computing architectures
    • Bajaj, A. (2000) A study of senior information systems manager's decision models in adopting new computing architectures, Journal of The Association of Information Systems, 1, 4.
    • (2000) Journal of the Association of Information Systems , vol.1 , pp. 4
    • Bajaj, A.1
  • 3
    • 0002587094 scopus 로고    scopus 로고
    • TRUSTe: An online privacy seal program
    • Benassi, P. (1999). TRUSTe: An online privacy seal program, Communications oftheACM, 42, 2, 56-59.
    • (1999) Communications OftheACM , vol.42 , Issue.2 , pp. 56-59
    • Benassi, P.1
  • 5
    • 0027883457 scopus 로고
    • The productivity paradox of information technology
    • Brynjolfsson, E. (1993) The productivity paradox of information technology, Communicatioins of the ACM, 36, 12, 67-77.
    • (1993) Communicatioins of the ACM , vol.36 , Issue.12 , pp. 67-77
    • Brynjolfsson, E.1
  • 7
    • 0036041894 scopus 로고    scopus 로고
    • Non-functional requirements: From elicitation to modeling languages
    • Cysneiros, L. M. and Leita, J. (2002), Non-functional requirements: from elicitation to modeling languages, Proceedings of the 24th ICSE, 699-700
    • (2002) Proceedings of the 24th ICSE , pp. 699-700
    • Cysneiros, L.M.1    Leita, J.2
  • 9
    • 84869778858 scopus 로고
    • Dept. of Defence, Trusted computer system evaluation criteria, No. DOD 5200.28. STD
    • Dept. of Defence (1985) Trusted computer system evaluation criteria, No. DOD 5200.28. STD.
    • (1985)
  • 10
    • 84869844598 scopus 로고
    • European Commission, Information technology security evaluation criteria (ITSEC), Provisional Harmonized Criteria, ISBN 92-826-7024-4
    • European Commission (1993) Information technology security evaluation criteria (ITSEC), Provisional Harmonized Criteria, ISBN 92-826-7024-4.
    • (1993)
  • 11
    • 84869795215 scopus 로고
    • Multivariate data analysis with readings, Prentice-Hall
    • Hair, J. F., Anderson, R. E., Tatham, R. L. and Black, W. C. (1995) Multivariate data analysis with readings, Prentice-Hall.
    • (1995)
    • Hair, J.F.1    Anderson, R.E.2    Tatham, R.L.3    Black, W.4
  • 12
    • 0033277433 scopus 로고    scopus 로고
    • Examining the technology acceptance model using physician acceptance of telemedicine
    • Hu, P. J., Chau, P. Y. K., Sheng, O. R. L. and Tam, K. Y. (1999) Examining the technology acceptance model using physician acceptance of telemedicine, Journal of Management Information Systems, 16, 2, 91-112.
    • (1999) Journal of Management Information Systems , vol.16 , Issue.2 , pp. 91-112
    • Hu, P.J.1    Chau, P.Y.K.2    Sheng, O.R.L.3    Tam, K.Y.4
  • 13
    • 84884727787 scopus 로고    scopus 로고
    • An integrated framework for security and dependability
    • Jonsson, E. (1998) An integrated framework for security and dependability, Proceedings of the 1998 NSPW, 22-29.
    • (1998) Proceedings of the 1998 NSPW , pp. 22-29
    • Jonsson, E.1
  • 16
    • 0028121915 scopus 로고
    • Information technology alignment or fit in highly turbulent environments: The concept of flexibility
    • Knoll, K., & Jarvenpaa, S. L. (1994) Information technology alignment or fit in highly turbulent environments: The concept of flexibility, L{cyrillic} CM SIGCPR 94, 1-14
    • (1994) L{cyrillic} CM SIGCPR , vol.94 , pp. 1-14
    • Knoll, K.1    Jarvenpaa, S.L.2
  • 19
    • 84869795214 scopus 로고    scopus 로고
    • Java Distributed Objects: The Authoritative Solution, Sams, Indianapolis
    • McCarty, B., &Cassady-Dorion, L. (1999). Java Distributed Objects: The Authoritative Solution, Sams, Indianapolis.
    • (1999)
    • McCarty, B.1    Cassady-Dorion, L.2
  • 20
    • 85009906652 scopus 로고    scopus 로고
    • Guidelines for the Security of Information Systems
    • OECD, Paris, France
    • OECD (1996) Guidelines for the Security of Information Systems, OECD, Paris, France.
    • (1996) OECD
  • 21
    • 0041990699 scopus 로고    scopus 로고
    • Development of a measure to assess the quality of user-developed applications
    • Rivard, S., Poirier, G., Raymond, L. and Bergeron, F. (1997) Development of a measure to assess the quality of user-developed applications, CMSIGMISDatabase, 28, 3, 44-58.
    • (1997) CMSIGMISDatabase , vol.28 , Issue.3 , pp. 44-58
    • Rivard, S.1    Poirier, G.2    Raymond, L.3    Bergeron, F.4
  • 22
    • 0038515826 scopus 로고    scopus 로고
    • Measuring organizational is effectiveness an overview and update of senior management perspectives
    • Seddon, P. B., Graeser, V. and Willcocks, L. P. (2002) Measuring organizational is effectiveness an overview and update of senior management perspectives, A CM SIGMIS Database, 33, 2, 11-18.
    • (2002) A CM SIGMIS Database , vol.33 , Issue.2 , pp. 11-18
    • Seddon, P.B.1    Graeser, V.2    Willcocks, L.P.3
  • 23
  • 24
    • 73549120882 scopus 로고
    • Understanding information technology usage: A test of competing models
    • Taylor, S. and Todd, P. A. (1995) Understanding information technology usage: A test of competing models, Information Systems Research, 6,2, 144-176.
    • (1995) Information Systems Research , vol.6 , Issue.2 , pp. 144-176
    • Taylor, S.1    Todd, P.A.2
  • 25
    • 84869741677 scopus 로고    scopus 로고
    • Why Things Bite Back. New York, Vintage Books, Random House
    • Tenner, E. (1997). Why Things Bite Back. New York, Vintage Books, Random House.
    • (1997)
    • Tenner, E.1
  • 26
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • Venkatesh, V, Morris, M. G., Davis, G. B. and Davis, F. D. (2003) User acceptance of information technology: Toward a unified view, MIS Quarterly, 27, 3, 425-478
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 30
    • 7244254280 scopus 로고    scopus 로고
    • Reducing spam by closing the social-technical gap
    • October
    • Whitworth, B., & Whitworth, E. (2004). Reducing spam by closing the social-technical gap IEEE Computer, October, 38-45.
    • (2004) IEEE Computer , pp. 38-45
    • Whitworth, B.1    Whitworth, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.