-
1
-
-
84883278260
-
App store metrics
-
date: October 4, 2012, URL:
-
148apps (2012) App store metrics. Retrieved date: October 4, 2012, URL: http://148apps.biz/app-store-metrics/?mpage=appprice
-
(2012)
-
-
-
2
-
-
3242743529
-
Losses, gains, and hyperbolic discounting: an experimental approach to information security attitudes and behavior
-
UC Berkeley 2nd Annual Workshop on Economics and Information Security - Berkeley, CA.
-
Acquisti, A. & Grossklags, J. (2003) Losses, gains, and hyperbolic discounting: an experimental approach to information security attitudes and behavior. In: UC Berkeley 2nd Annual Workshop on Economics and Information Security, pp. 1-27. Berkeley, CA.
-
(2003)
, pp. 1-27
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
44249114234
-
Privacy attitudes and privacy behavior
-
Camp, L. & Lewis, S. (eds.) - Springer: US.
-
Acquisti, A. & Grossklags, J. (2004) Privacy attitudes and privacy behavior. In: Economics of Information Security. Vol. 12, Camp, L. & Lewis, S. (eds.), pp. 165-178. Springer: US.
-
(2004)
Economics of Information Security
, vol.12
, pp. 165-178
-
-
Acquisti, A.1
Grossklags, J.2
-
4
-
-
14744275332
-
Privacy and rationality in individual decision making
-
Acquisti, A. & Grossklags, J. (2005) Privacy and rationality in individual decision making. IEEE Security & Privacy, 3, 26-33.
-
(2005)
IEEE Security & Privacy
, vol.3
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
5
-
-
0034557459
-
Research report: the evolving relationship between general and specific computer self-efficacy: an empirical assessment
-
Agarwal, R., Sambamurthy, V. & Stair, R.M. (2000) Research report: the evolving relationship between general and specific computer self-efficacy: an empirical assessment. Information Systems Research, 11, 418.
-
(2000)
Information Systems Research
, vol.11
, pp. 418
-
-
Agarwal, R.1
Sambamurthy, V.2
Stair, R.M.3
-
7
-
-
84874621102
-
Apple, Google collect user data
-
date: May 31, 2011, url:
-
Angwin, J. & Valentino-Devries, J. (2011) Apple, Google collect user data. Retrieved date: May 31, 2011, url: http://online.wsj.com/article/SB10001424052748703983704576277101723453610.html
-
(2011)
-
-
Angwin, J.1
Valentino-Devries, J.2
-
8
-
-
33746855063
-
Expect the best and prepare for the worst: anticipatory coping and preparations for Y2K
-
Aspinwall, L., Sechrist, G. & Jones, P. (2005) Expect the best and prepare for the worst: anticipatory coping and preparations for Y2K. Motivation and Emotion, 29, 353-384.
-
(2005)
Motivation and Emotion
, vol.29
, pp. 353-384
-
-
Aspinwall, L.1
Sechrist, G.2
Jones, P.3
-
9
-
-
44249110999
-
Establishing trust in electronic commerce through online word of mouth: an examination across genders
-
Awad, N. & Ragowsky, A. (2008) Establishing trust in electronic commerce through online word of mouth: an examination across genders. Journal of Management Information Systems, 24, 101-121.
-
(2008)
Journal of Management Information Systems
, vol.24
, pp. 101-121
-
-
Awad, N.1
Ragowsky, A.2
-
10
-
-
0141816228
-
Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior
-
Ba, S.L. & Pavlou, P.A. (2002) Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Quarterly, 26, 243-268.
-
(2002)
MIS Quarterly
, vol.26
, pp. 243-268
-
-
Ba, S.L.1
Pavlou, P.A.2
-
11
-
-
0017472917
-
Self-efficacy: toward a unifying theory of behavioral change
-
Bandura, A. (1977a) Self-efficacy: toward a unifying theory of behavioral change. Psychological Review, 84, 191-215.
-
(1977)
Psychological Review
, vol.84
, pp. 191-215
-
-
Bandura, A.1
-
12
-
-
0003547941
-
-
General Learning Press, New York, New York, USA.
-
Bandura, A. (1977b) Social Learning Theory. General Learning Press, New York, New York, USA.
-
(1977)
Social Learning Theory
-
-
Bandura, A.1
-
13
-
-
0017472917
-
Toward a unifying theory of behavior change
-
Bandura, A. (1977c) Toward a unifying theory of behavior change. Psychological Review, 84, 191-215.
-
(1977)
Psychological Review
, vol.84
, pp. 191-215
-
-
Bandura, A.1
-
14
-
-
33746878674
-
Self-efficacy mechanism in human agency
-
Bandura, A. (1982) Self-efficacy mechanism in human agency. American Psychologist, 37, 122-147.
-
(1982)
American Psychologist
, vol.37
, pp. 122-147
-
-
Bandura, A.1
-
17
-
-
0036555167
-
Social cognitive theory in cultural context
-
Bandura, A. (2002) Social cognitive theory in cultural context. Applied Psychology, 51, 269-290.
-
(2002)
Applied Psychology
, vol.51
, pp. 269-290
-
-
Bandura, A.1
-
18
-
-
81355150547
-
Privacy in the digital age: a review of information privacy research in information systems
-
Belanger, F. & Crossler, R.E. (2011) Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017-1041.
-
(2011)
MIS Quarterly
, vol.35
, pp. 1017-1041
-
-
Belanger, F.1
Crossler, R.E.2
-
19
-
-
84867973432
-
Trustworthiness in electronic commerce: the role of privacy, security, and site attributes
-
Bélanger, F., Hiller, J.S. & Smith, W.J. (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems, 11, 245-270.
-
(2002)
Journal of Strategic Information Systems
, vol.11
, pp. 245-270
-
-
Bélanger, F.1
Hiller, J.S.2
Smith, W.J.3
-
21
-
-
84876188506
-
Misplaced confidences privacy and the control paradox
-
Brandimarte, L., Acquisti, A. & Loewenstein, G. (2013) Misplaced confidences privacy and the control paradox. Social Psychological and Personality Science, 4, 340-347.
-
(2013)
Social Psychological and Personality Science
, vol.4
, pp. 340-347
-
-
Brandimarte, L.1
Acquisti, A.2
Loewenstein, G.3
-
22
-
-
84862971110
-
Privacy concerns and information disclosure: an illusion of control hypothesis
-
Brandimarte, L., Acquisti, A., Loewenstein, G. & Babcock, L. (2009) Privacy concerns and information disclosure: an illusion of control hypothesis.
-
(2009)
-
-
Brandimarte, L.1
Acquisti, A.2
Loewenstein, G.3
Babcock, L.4
-
23
-
-
0024617548
-
Assessing coping strategies: a theoretically based approach
-
Carver, C.S., Scheier, M.F. & Weintraub, J.K. (1989) Assessing coping strategies: a theoretically based approach. Journal of Personality and Social Psychology, 56, 267-283.
-
(1989)
Journal of Personality and Social Psychology
, vol.56
, pp. 267-283
-
-
Carver, C.S.1
Scheier, M.F.2
Weintraub, J.K.3
-
24
-
-
2442482731
-
Do size and structure matter to mobile users? An empirical study of the effects of screen size, information structure, and task complexity on user activities with standard web phones
-
Chae, M. & Kim, J. (2004) Do size and structure matter to mobile users? An empirical study of the effects of screen size, information structure, and task complexity on user activities with standard web phones. Behaviour and Information Technology, 23, 165-181.
-
(2004)
Behaviour and Information Technology
, vol.23
, pp. 165-181
-
-
Chae, M.1
Kim, J.2
-
25
-
-
0042242856
-
A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study
-
Chin, W.W., Marcolin, B.L. & Newsted, P.R. (2003) A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14, 189-217.
-
(2003)
Information Systems Research
, vol.14
, pp. 189-217
-
-
Chin, W.W.1
Marcolin, B.L.2
Newsted, P.R.3
-
26
-
-
0000004470
-
Social cognitive theory and individual reactions to computing technology: a longitudinal study
-
Compeau, D., Higgins, C.A. & Huff, S. (1999) Social cognitive theory and individual reactions to computing technology: a longitudinal study. MIS Quarterly, 23, 145-158.
-
(1999)
MIS Quarterly
, vol.23
, pp. 145-158
-
-
Compeau, D.1
Higgins, C.A.2
Huff, S.3
-
27
-
-
21344456569
-
Application of social cognitive theory to training for computer skills
-
Compeau, D.R. & Higgins, C.A. (1995a) Application of social cognitive theory to training for computer skills. Information Systems Research, 6, 118-143.
-
(1995)
Information Systems Research
, vol.6
, pp. 118-143
-
-
Compeau, D.R.1
Higgins, C.A.2
-
28
-
-
49149116092
-
Computer self-efficacy: development of a measure and initial test
-
Compeau, D.R. & Higgins, C.A. (1995b) Computer self-efficacy: development of a measure and initial test. MIS Quarterly, 19, 189-211.
-
(1995)
MIS Quarterly
, vol.19
, pp. 189-211
-
-
Compeau, D.R.1
Higgins, C.A.2
-
30
-
-
0001501223
-
How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use
-
Culnan, M.J. (1993) How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17, 341-361.
-
(1993)
MIS Quarterly
, vol.17
, pp. 341-361
-
-
Culnan, M.J.1
-
31
-
-
84943584132
-
Late late majority
-
date: July 8, 2014, URL:
-
Dediu, H. (2014) Late late majority. Retrieved date: July 8, 2014, URL: http://www.asymco.com/2014/07/08/late-late-majority/
-
(2014)
-
-
Dediu, H.1
-
32
-
-
33749322976
-
Privacy calculus model in e-commerce - a study of Italy and the United States
-
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I. & Colautti, C. (2006) Privacy calculus model in e-commerce - a study of Italy and the United States. European Journal of Information Systems, 15, 389-402.
-
(2006)
European Journal of Information Systems
, vol.15
, pp. 389-402
-
-
Dinev, T.1
Bellotto, M.2
Hart, P.3
Russo, V.4
Serra, I.5
Colautti, C.6
-
33
-
-
33645133251
-
An extended privacy calculus model for e-commerce transactions
-
Dinev, T. & Hart, P. (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 61-80.
-
(2006)
Information Systems Research
, vol.17
, pp. 61-80
-
-
Dinev, T.1
Hart, P.2
-
34
-
-
84876384441
-
Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts
-
Dinev, T., Xu, H., Smith, J.H. & Hart, P. (2013) Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22, 295-316.
-
(2013)
European Journal of Information Systems
, vol.22
, pp. 295-316
-
-
Dinev, T.1
Xu, H.2
Smith, J.H.3
Hart, P.4
-
35
-
-
79955570859
-
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
-
Vancouver, BC, Canada.
-
Enck, W., Gilbert, P., Chun, B.-G., Cox, L., Jung, J., McDaniel, P. & Sheth, A. (2010a) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. Proceedings of OSDI 2010, pp., Vancouver, BC, Canada.
-
(2010)
Proceedings of OSDI 2010
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
36
-
-
79955570859
-
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
-
Vancouver, BC, Canada.
-
Enck, W., Gilbert, P., Chun, B.-G., Cox, L., Jung, J., McDaniel, P. & Sheth, A. (2010b) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. Proceedings of OSDI 2010, pp. 1-15. Vancouver, BC, Canada.
-
(2010)
Proceedings of OSDI 2010
, pp. 1-15
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
37
-
-
84943587988
-
China now leads the world in new iOS and Android device activations
-
(ed. Flurry) Flurry.
-
Farago, P. (2012) China now leads the world in new iOS and Android device activations. In: China Now Leads the World in New iOS and Android Device Activations, Vol. 2012 (ed. Flurry), pp. Flurry.
-
(2012)
China Now Leads the World in New iOS and Android Device Activations
, vol.2012
-
-
Farago, P.1
-
39
-
-
48449101733
-
Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets
-
Forman, C., Ghose, A. & Wiesenfeld, B. (2008) Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets. Information Systems Research, 19, 291-313.
-
(2008)
Information Systems Research
, vol.19
, pp. 291-313
-
-
Forman, C.1
Ghose, A.2
Wiesenfeld, B.3
-
40
-
-
0000356178
-
Two structural equation models: LISREL and PLS applied to consumer exit-voice theory
-
Fornell, C. & Bookstein, F.L. (1982) Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. Journal of Marketing Research, 19, 440-452.
-
(1982)
Journal of Marketing Research
, vol.19
, pp. 440-452
-
-
Fornell, C.1
Bookstein, F.L.2
-
41
-
-
0002819636
-
Trust online
-
Friedman, B., Peter, H., Khan, J. & Howe, D.C. (2000) Trust online. Communications of the ACM, 43, 34-40.
-
(2000)
Communications of the ACM
, vol.43
, pp. 34-40
-
-
Friedman, B.1
Peter, H.2
Khan, J.3
Howe, D.C.4
-
42
-
-
0032380339
-
Coping with consumer fraud: the need for a paradigm shift
-
Friedman, M. (1998) Coping with consumer fraud: the need for a paradigm shift. Journal of Consumer Affairs, 32, 1-12.
-
(1998)
Journal of Consumer Affairs
, vol.32
, pp. 1-12
-
-
Friedman, M.1
-
43
-
-
0344096683
-
Trust and TAM in online shopping: an integrated model
-
Gefen, D., Karahanna, E. & Straub, D.W. (2003) Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27, 51-90.
-
(2003)
MIS Quarterly
, vol.27
, pp. 51-90
-
-
Gefen, D.1
Karahanna, E.2
Straub, D.W.3
-
44
-
-
0001178032
-
Structural equation modeling and regression: guidelines for research practice
-
Gefen, D., Straub, D. & Boudreau, M.-C. (2000) Structural equation modeling and regression: guidelines for research practice. Communications of the AIS, 4, 1-78.
-
(2000)
Communications of the AIS
, vol.4
, pp. 1-78
-
-
Gefen, D.1
Straub, D.2
Boudreau, M.-C.3
-
45
-
-
29444460597
-
A practical guide to factorial validity using PLS-graph: tutorial and annotated example
-
Gefen, D. & Straub, D.W. (2005) A practical guide to factorial validity using PLS-graph: tutorial and annotated example. Communications of the AIS, 16, 91-109.
-
(2005)
Communications of the AIS
, vol.16
, pp. 91-109
-
-
Gefen, D.1
Straub, D.W.2
-
46
-
-
84868132018
-
The mother of all Android malware has arrived: stolen apps released to the market that root your phone, steal your data, open backdoor
-
date: May 20, 2011, URL:
-
Gingrich, A. (2011) The mother of all Android malware has arrived: stolen apps released to the market that root your phone, steal your data, open backdoor. Retrieved date: May 20, 2011, URL: http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor/
-
(2011)
-
-
Gingrich, A.1
-
47
-
-
33745085266
-
Entrepreneurs, effectual logic, and over-trust
-
Goel, S. & Karri, R. (2006) Entrepreneurs, effectual logic, and over-trust. Entrepreneurship: Theory and Practice, 30, 477-493.
-
(2006)
Entrepreneurship: Theory and Practice
, vol.30
, pp. 477-493
-
-
Goel, S.1
Karri, R.2
-
48
-
-
0141647251
-
Social support and coping style differences in subjects high and low in interpersonal trust
-
Grace, G.D. & Schill, T. (1986) Social support and coping style differences in subjects high and low in interpersonal trust. Psychological Reports, 59, 584-586.
-
(1986)
Psychological Reports
, vol.59
, pp. 584-586
-
-
Grace, G.D.1
Schill, T.2
-
49
-
-
3142664237
-
Consumer and business deception on the Internet: content analysis of documentary evidence
-
Grazioli, S. & Jarvenpaa, S.L. (2003) Consumer and business deception on the Internet: content analysis of documentary evidence. International Journal of Electronic Commerce, 7, 93-118.
-
(2003)
International Journal of Electronic Commerce
, vol.7
, pp. 93-118
-
-
Grazioli, S.1
Jarvenpaa, S.L.2
-
50
-
-
5144234428
-
Anxious responses to predictable and unpredictable aversive events
-
Grillon, C., Baas, J.P., Lissek, S., Smith, K. & Milstein, J. (2004) Anxious responses to predictable and unpredictable aversive events. Behavioral Neuroscience, 118, 916-924.
-
(2004)
Behavioral Neuroscience
, vol.118
, pp. 916-924
-
-
Grillon, C.1
Baas, J.P.2
Lissek, S.3
Smith, K.4
Milstein, J.5
-
51
-
-
57049166499
-
Formative vs. reflective measurement: comment on Marakas, Johnson, and Clay
-
(2007). Journal of the Association for
-
Hardin, A. M., Chang, J. C.-J. & Fuller, M. A. (2008) Formative vs. reflective measurement: comment on Marakas, Johnson, and Clay (2007). Journal of the Association for Information Systems, 9, 519-534.
-
(2008)
Information Systems
, vol.9
, pp. 519-534
-
-
Hardin, A.M.1
Chang, J.C.-J.2
Fuller, M.A.3
-
52
-
-
84877662726
-
Computer self-efficacy, anxiety, and learning in online versus face to face medium
-
Hauser, R., Paul, R. & Bradley, J. (2012) Computer self-efficacy, anxiety, and learning in online versus face to face medium. Journal of Information Technology Education: Research, 11, 141-154.
-
(2012)
Journal of Information Technology Education: Research
, vol.11
, pp. 141-154
-
-
Hauser, R.1
Paul, R.2
Bradley, J.3
-
53
-
-
0038880247
-
Preference and belief: ambiguity and competence in choice under uncertainty
-
Heath, C. & Tversky, A. (1991) Preference and belief: ambiguity and competence in choice under uncertainty. Journal of Risk and Uncertainty, 4, 5-28.
-
(1991)
Journal of Risk and Uncertainty
, vol.4
, pp. 5-28
-
-
Heath, C.1
Tversky, A.2
-
54
-
-
84889663520
-
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service
-
Herath, T., Chen, R., Wang, J., Banjara, K., Wilbur, J. & Rao, H.R. (2014) Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Information Systems Journal, 24, 61-84.
-
(2014)
Information Systems Journal
, vol.24
, pp. 61-84
-
-
Herath, T.1
Chen, R.2
Wang, J.3
Banjara, K.4
Wilbur, J.5
Rao, H.R.6
-
55
-
-
33645827800
-
Does past success lead analysts to become overconfident?
-
Hilary, G. & Menzly, L. (2006) Does past success lead analysts to become overconfident? Management Science, 52, 489-500.
-
(2006)
Management Science
, vol.52
, pp. 489-500
-
-
Hilary, G.1
Menzly, L.2
-
56
-
-
4544246468
-
Internet self-efficacy and electronic service acceptance
-
Hsu, M.-H. & Chiu, C.-m. (2004) Internet self-efficacy and electronic service acceptance. Decision Support Systems, 38, 369-381.
-
(2004)
Decision Support Systems
, vol.38
, pp. 369-381
-
-
Hsu, M.-H.1
Chiu, C.-m.2
-
57
-
-
33751347629
-
Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations
-
Hsu, M.H., Ju, T.L., Yen, C.H. & Chang, C.M. (2007) Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65, 153-169.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, pp. 153-169
-
-
Hsu, M.H.1
Ju, T.L.2
Yen, C.H.3
Chang, C.M.4
-
58
-
-
33847712553
-
The value of privacy assurance: an exploratory field experiment
-
Hui, K.L., Teo, H.H. & Lee, S.Y.T. (2007) The value of privacy assurance: an exploratory field experiment. MIS Quarterly, 31, 19-33.
-
(2007)
MIS Quarterly
, vol.31
, pp. 19-33
-
-
Hui, K.L.1
Teo, H.H.2
Lee, S.Y.T.3
-
59
-
-
84943581248
-
Worldwide and U.S. mobile applications, storefronts, and developer 2010-2014 forecasts and year-end 2010 vendor market shares: the 'appification' of everything
-
IDG (2010) Worldwide and U.S. mobile applications, storefronts, and developer 2010-2014 forecasts and year-end 2010 vendor market shares: the 'appification' of everything. Retrieved date: URL: http://www.idg.com/www/pr.nsf/0/1280307E4BE966E8852577F8004FA500
-
(2010)
-
-
-
60
-
-
54449093990
-
Personality traits and concern for privacy: an empirical study in the context of location-based services
-
Junglas, I.A., Johnson, N.A. & Spitzmuller, C. (2008) Personality traits and concern for privacy: an empirical study in the context of location-based services. European Journal of Information Systems, 17, 387-402.
-
(2008)
European Journal of Information Systems
, vol.17
, pp. 387-402
-
-
Junglas, I.A.1
Johnson, N.A.2
Spitzmuller, C.3
-
61
-
-
0345280712
-
Self-efficacy and disclosure of HIV-positive serostatus to sex partners
-
Kalichman, S.C. & Nachimson, D. (1999) Self-efficacy and disclosure of HIV-positive serostatus to sex partners. Health Psychology, 18, 281.
-
(1999)
Health Psychology
, vol.18
, pp. 281
-
-
Kalichman, S.C.1
Nachimson, D.2
-
62
-
-
84870964899
-
Privacy assurance and network effects in the adoption of location-based services: an iPhone experiment
-
paper . St. Louis, MI.
-
Keith, M. J., Babb, J. S., Furner, C. P. & Abdullat, A. (2010) Privacy assurance and network effects in the adoption of location-based services: an iPhone experiment. In: Proceedings of the International Conference on Information Systems (ICIS 2010), pp. paper 237. St. Louis, MI.
-
(2010)
Proceedings of the International Conference on Information Systems (ICIS 2010)
, pp. 237
-
-
Keith, M.J.1
Babb, J.S.2
Furner, C.P.3
Abdullat, A.4
-
63
-
-
84893650500
-
Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior
-
Keith, M.J., Thompson, S.C., Hale, J., Benjamin Lowry, P. & Greer, C. (2013) Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71, 1163-1173.
-
(2013)
International Journal of Human-Computer Studies
, vol.71
, pp. 1163-1173
-
-
Keith, M.J.1
Thompson, S.C.2
Hale, J.3
Benjamin Lowry, P.4
Greer, C.5
-
64
-
-
44249119885
-
Self-perception-based versus transference-based trust determinants in computer-mediated transactions: a cross-cultural comparison study
-
Kim, D. (2008) Self-perception-based versus transference-based trust determinants in computer-mediated transactions: a cross-cultural comparison study. Journal of Management Information Systems, 24, 13-45.
-
(2008)
Journal of Management Information Systems
, vol.24
, pp. 13-45
-
-
Kim, D.1
-
65
-
-
36249020892
-
A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents
-
Kim, D.J., Ferrin, D.L. & Rao, H.R. (2008) A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, 544-564.
-
(2008)
Decision Support Systems
, vol.44
, pp. 544-564
-
-
Kim, D.J.1
Ferrin, D.L.2
Rao, H.R.3
-
66
-
-
27544446278
-
A study of online transaction self-efficacy, consumer trust, and uncertainty reduction in electronic commerce transaction
-
Kim, Y. H. & Kim, D. J. (2005) A study of online transaction self-efficacy, consumer trust, and uncertainty reduction in electronic commerce transaction. System Sciences, 2005. HICSS'05. Proceedings of the 38th Annual Hawaii International Conference on, pp. 170c-170c. IEEE.
-
(2005)
System Sciences, 2005. HICSS'05. Proceedings of the 38th Annual Hawaii International Conference on IEEE.
, pp. 170c-170c
-
-
Kim, Y.H.1
Kim, D.J.2
-
67
-
-
33846006255
-
The effects of personalization and familiarity on trust and adoption of recommendation agents
-
Komiak, S.Y.X. & Benbasat, I. (2006) The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30, 941-960.
-
(2006)
MIS Quarterly
, vol.30
, pp. 941-960
-
-
Komiak, S.Y.X.1
Benbasat, I.2
-
68
-
-
77953859855
-
Online social networks: why we disclose
-
Krasnova, H., Spiekermann, S., Koroleva, K. & Hildebrand, T. (2010) Online social networks: why we disclose. Journal of Information Technology, 25, 109-125.
-
(2010)
Journal of Information Technology
, vol.25
, pp. 109-125
-
-
Krasnova, H.1
Spiekermann, S.2
Koroleva, K.3
Hildebrand, T.4
-
69
-
-
0024788327
-
The concept of coping modes: relating cognitive person variables to actual coping behavior
-
Krohne, H.W. (1989) The concept of coping modes: relating cognitive person variables to actual coping behavior. Advances in Behaviour Research and Therapy, 11, 235-248.
-
(1989)
Advances in Behaviour Research and Therapy
, vol.11
, pp. 235-248
-
-
Krohne, H.W.1
-
70
-
-
84990586591
-
How believing in ourselves increases risk taking: perceived self-efficacy and opportunity recognition
-
Krueger, N. & Dickson, P.R. (1994) How believing in ourselves increases risk taking: perceived self-efficacy and opportunity recognition. Decision Sciences, 25, 385-400.
-
(1994)
Decision Sciences
, vol.25
, pp. 385-400
-
-
Krueger, N.1
Dickson, P.R.2
-
71
-
-
84993660913
-
Privacy as a concept and a social issue: a multidimensional developmental theory
-
Laufer, R.S. & Wolfe, M. (1977) Privacy as a concept and a social issue: a multidimensional developmental theory. Journal of Social Issues, 33, 22-42.
-
(1977)
Journal of Social Issues
, vol.33
, pp. 22-42
-
-
Laufer, R.S.1
Wolfe, M.2
-
73
-
-
42649109355
-
Why do we trust new technology? A study of initial trust formation with organizational information systems
-
Li, X., Hess, T.J. & Valacich, J.S. (2008) Why do we trust new technology? A study of initial trust formation with organizational information systems. The Journal of Strategic Information Systems, 17, 39-71.
-
(2008)
The Journal of Strategic Information Systems
, vol.17
, pp. 39-71
-
-
Li, X.1
Hess, T.J.2
Valacich, J.S.3
-
74
-
-
84868633960
-
Theories in online information privacy research: a critical review and an integrated framework
-
Li, Y. (2012) Theories in online information privacy research: a critical review and an integrated framework. Decision Support Systems, 54, 471-481.
-
(2012)
Decision Support Systems
, vol.54
, pp. 471-481
-
-
Li, Y.1
-
75
-
-
79955636557
-
Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures
-
Lowry, P.B., Cao, J. & Everard, A. (2011) Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures. Journal of Management Information Systems, 27, 165-204.
-
(2011)
Journal of Management Information Systems
, vol.27
, pp. 165-204
-
-
Lowry, P.B.1
Cao, J.2
Everard, A.3
-
76
-
-
84901483810
-
Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: when to choose it and how to use it
-
Lowry, P.B. & Gaskin, J. (2014) Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: when to choose it and how to use it. IEEE Transactions on Professional Communication, 57, 123-146.
-
(2014)
IEEE Transactions on Professional Communication
, vol.57
, pp. 123-146
-
-
Lowry, P.B.1
Gaskin, J.2
-
77
-
-
84880242186
-
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers
-
Lowry, P.B., Moody, G., Vance, A., Jensen, M., Jenkins, J.L. & Wells, T. (2012) Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. Journal of the American Society for Information Science and Technology, 63, 755-766.
-
(2012)
Journal of the American Society for Information Science and Technology
, vol.63
, pp. 755-766
-
-
Lowry, P.B.1
Moody, G.2
Vance, A.3
Jensen, M.4
Jenkins, J.L.5
Wells, T.6
-
78
-
-
69249098534
-
The CMC interactivity model: how interactivity enhances communication quality and process satisfaction in lean-media groups
-
Lowry, P.B., Romano, N.C., Jenkins, J.L. & Guthrie, R.W. (2009) The CMC interactivity model: how interactivity enhances communication quality and process satisfaction in lean-media groups. Journal of Management Information Systems, 26, 159-200.
-
(2009)
Journal of Management Information Systems
, vol.26
, pp. 159-200
-
-
Lowry, P.B.1
Romano, N.C.2
Jenkins, J.L.3
Guthrie, R.W.4
-
79
-
-
44249091185
-
Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites
-
Lowry, P.B., Vance, A., Moody, G., Beckman, B. & Read, A. (2008) Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. Journal of Management Information Systems, 24, 201-227.
-
(2008)
Journal of Management Information Systems
, vol.24
, pp. 201-227
-
-
Lowry, P.B.1
Vance, A.2
Moody, G.3
Beckman, B.4
Read, A.5
-
80
-
-
84889561169
-
A picture is worth a thousand words: source credibility theory applied to logo and website design for heightened credibility and consumer trust
-
Lowry, P.B., Wilson, D.W. & Haig, W.L. (2014) A picture is worth a thousand words: source credibility theory applied to logo and website design for heightened credibility and consumer trust. International Journal of Human-Computer Interaction, 30, 63-93.
-
(2014)
International Journal of Human-Computer Interaction
, vol.30
, pp. 63-93
-
-
Lowry, P.B.1
Wilson, D.W.2
Haig, W.L.3
-
81
-
-
77951126522
-
Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services
-
Luo, X., Li, H., Zhang, J. & Shim, J.P. (2010) Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decision Support Systems, 49, 222-234.
-
(2010)
Decision Support Systems
, vol.49
, pp. 222-234
-
-
Luo, X.1
Li, H.2
Zhang, J.3
Shim, J.P.4
-
82
-
-
71649090601
-
Effects of computer self-efficacy and system reliability on user interaction with decision support systems
-
Madhavan, P. & Phillips, R.R. (2010) Effects of computer self-efficacy and system reliability on user interaction with decision support systems. Computers in Human Behavior, 26, 199-204.
-
(2010)
Computers in Human Behavior
, vol.26
, pp. 199-204
-
-
Madhavan, P.1
Phillips, R.R.2
-
83
-
-
55349132521
-
The evolving nature of the computer self-efficacy construct: an empirical investigation of measurement construction, validity, reliability and stability over time
-
Marakas, G.M., Johnson, R.D. & Clay, P.F. (2007) The evolving nature of the computer self-efficacy construct: an empirical investigation of measurement construction, validity, reliability and stability over time. Journal of the Association for Information Systems, 8, 15-46.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, pp. 15-46
-
-
Marakas, G.M.1
Johnson, R.D.2
Clay, P.F.3
-
84
-
-
0032341068
-
The multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for research
-
Marakas, G.M., Yi, M.Y. & Johnson, R.D. (1998) The multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for research. Information Systems Research, 9, 126-163.
-
(1998)
Information Systems Research
, vol.9
, pp. 126-163
-
-
Marakas, G.M.1
Yi, M.Y.2
Johnson, R.D.3
-
85
-
-
73549114871
-
Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior
-
Mathieson, K. (1991) Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2, 173-191.
-
(1991)
Information Systems Research
, vol.2
, pp. 173-191
-
-
Mathieson, K.1
-
86
-
-
0036737236
-
Developing and validating trust measures for e-commerce: an integrative typology
-
McKnight, D.H., Choudhury, V. & Kacmar, C. (2002) Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research, 13, 334-359.
-
(2002)
Information Systems Research
, vol.13
, pp. 334-359
-
-
McKnight, D.H.1
Choudhury, V.2
Kacmar, C.3
-
87
-
-
70349321521
-
Toward an understanding of the online consumer's risky behavior and protection practices
-
Milne, G.R., Labrecque, L.I. & Cromer, C. (2009) Toward an understanding of the online consumer's risky behavior and protection practices. Journal of Consumer Affairs, 43, 449-473.
-
(2009)
Journal of Consumer Affairs
, vol.43
, pp. 449-473
-
-
Milne, G.R.1
Labrecque, L.I.2
Cromer, C.3
-
88
-
-
41949136902
-
Effects of threat cues on attentional shifting, disengagement and response slowing in anxious individuals
-
Mogg, K., Holmes, A., Garner, M. & Bradley, B.P. (2008) Effects of threat cues on attentional shifting, disengagement and response slowing in anxious individuals. Behaviour Research and Therapy, 46, 656-667.
-
(2008)
Behaviour Research and Therapy
, vol.46
, pp. 656-667
-
-
Mogg, K.1
Holmes, A.2
Garner, M.3
Bradley, B.P.4
-
89
-
-
84905907007
-
When trust and distrust collide: the engendering and role of ambivalence in online consumer behavior
-
Moody, G.D., Galletta, D.F. & Lowry, P.B. (2014) When trust and distrust collide: the engendering and role of ambivalence in online consumer behavior. Electronic Commerce Research and Applications, 13, 266-282.
-
(2014)
Electronic Commerce Research and Applications
, vol.13
, pp. 266-282
-
-
Moody, G.D.1
Galletta, D.F.2
Lowry, P.B.3
-
90
-
-
63749116991
-
Self-efficacy, overconfidence, and the negative effect on subsequent performance: a field study
-
Moores, T.T. & Chang, J.C.-J. (2009) Self-efficacy, overconfidence, and the negative effect on subsequent performance: a field study. Information & Management, 46, 69-76.
-
(2009)
Information & Management
, vol.46
, pp. 69-76
-
-
Moores, T.T.1
Chang, J.-J.2
-
91
-
-
0343468534
-
Telling more than we can know: verbal reports on mental processes
-
Nisbett, R.E. & Wilson, T.D. (1977) Telling more than we can know: verbal reports on mental processes. Psychological Review, 84, 231-258.
-
(1977)
Psychological Review
, vol.84
, pp. 231-258
-
-
Nisbett, R.E.1
Wilson, T.D.2
-
92
-
-
33646032387
-
Self-accountability emotions and fear appeals: motivating behavior
-
Passyn, K. & Sujan, M. (2006) Self-accountability emotions and fear appeals: motivating behavior. Journal of Consumer Research, 32, 583-589.
-
(2006)
Journal of Consumer Research
, vol.32
, pp. 583-589
-
-
Passyn, K.1
Sujan, M.2
-
93
-
-
84867928512
-
Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation
-
Pavlou, P.A. (2002) Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. The Journal of Strategic Information Systems, 11, 215-243.
-
(2002)
The Journal of Strategic Information Systems
, vol.11
, pp. 215-243
-
-
Pavlou, P.A.1
-
94
-
-
33749347189
-
Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior
-
Pavlou, P.A. & Fygenson, M. (2006) Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior. MIS Quarterly, 30, 115-143.
-
(2006)
MIS Quarterly
, vol.30
, pp. 115-143
-
-
Pavlou, P.A.1
Fygenson, M.2
-
95
-
-
2442676514
-
Building effective online marketplaces with institution-based trust
-
Pavlou, P.A. & Gefen, D. (2004) Building effective online marketplaces with institution-based trust. Information Systems Research, 15, 37-59.
-
(2004)
Information Systems Research
, vol.15
, pp. 37-59
-
-
Pavlou, P.A.1
Gefen, D.2
-
96
-
-
27644441621
-
Adoption of mobile internet services: an exploratory study of mobile commerce early adopters
-
Pedersen, E.P. (2005) Adoption of mobile internet services: an exploratory study of mobile commerce early adopters. Journal of Organizational Computing and Electronic Commerce, 15, 203-222.
-
(2005)
Journal of Organizational Computing and Electronic Commerce
, vol.15
, pp. 203-222
-
-
Pedersen, E.P.1
-
97
-
-
79952618367
-
Integrating the smartphone into a sound environmental information systems strategy: principles, practices and a research agenda
-
Pitt, L.F., Parent, M., Junglas, I., Chan, A. & Spyropoulou, S. (2011) Integrating the smartphone into a sound environmental information systems strategy: principles, practices and a research agenda. The Journal of Strategic Information Systems, 20, 27-37.
-
(2011)
The Journal of Strategic Information Systems
, vol.20
, pp. 27-37
-
-
Pitt, L.F.1
Parent, M.2
Junglas, I.3
Chan, A.4
Spyropoulou, S.5
-
99
-
-
84943588173
-
The surprise behind the mobile app numbers
-
Huffington Post, date: July 15, 2011, URL:
-
Reed, M. (2011) The surprise behind the mobile app numbers. Huffington Post, Retrieved date: July 15, 2011, URL: http://www.huffingtonpost.com/morgan-reed/the-surprise-behind-the-m_b_895397.html
-
(2011)
-
-
Reed, M.1
-
100
-
-
56749152239
-
SmartPLS 2.0 (M3) Beta
-
date: October 30, 2010, url:.
-
Ringle, C. M., Wende, S. & Will, S. (2005) SmartPLS 2.0 (M3) Beta. Retrieved date: October 30, 2010, url: http://www.smartpls.de.
-
(2005)
-
-
Ringle, C.M.1
Wende, S.2
Will, S.3
-
102
-
-
33845898497
-
The economic consequences of accounting fraud in product markets: theory and a case from the U.S. telecommunications industry (WorldCom)
-
Sadka, G. (2006) The economic consequences of accounting fraud in product markets: theory and a case from the U.S. telecommunications industry (WorldCom). American Law and Economics Review, 8, 439-475.
-
(2006)
American Law and Economics Review
, vol.8
, pp. 439-475
-
-
Sadka, G.1
-
103
-
-
33749043466
-
Promises and lies: restoring violated trust
-
Schweitzer, M.E., Hershey, J.C. & Bradlow, E.T. (2006) Promises and lies: restoring violated trust. Organizational Behavior and Human Decision Processes, 101, 1-19.
-
(2006)
Organizational Behavior and Human Decision Processes
, vol.101
, pp. 1-19
-
-
Schweitzer, M.E.1
Hershey, J.C.2
Bradlow, E.T.3
-
104
-
-
84943581980
-
App genome report
-
App Genome Report - February 2011, Lookout Mobile Security.
-
Security, L. M. (2011) App genome report. In: App Genome Report - February 2011, Vol. 2011, pp. Lookout Mobile Security.
-
(2011)
, vol.2011
-
-
Security, L.M.1
-
105
-
-
27544476203
-
Making it personal: how personalization affects trust over time
-
Waikaloa, HI.
-
Serino, C. M., Furner, C. P. & Smatt, C. (2005) Making it personal: how personalization affects trust over time. Hawaiian International Conference on System Sciences, pp. IEEE, Waikaloa, HI.
-
(2005)
Hawaiian International Conference on System Sciences IEEE
-
-
Serino, C.M.1
Furner, C.P.2
Smatt, C.3
-
106
-
-
78650596113
-
iPhone privacy
-
Black Hat DC 2010 30. Black Hat, January 3, Arlington, VA, USA.
-
Seriot, N. (2010) iPhone privacy. Black Hat DC 2010, pp. 30. Black Hat, January 3, Arlington, VA, USA.
-
(2010)
-
-
Seriot, N.1
-
107
-
-
84876992358
-
Nearly half of American adults are smartphone owners
-
Pew Research, date
-
Smith, A. (2012) Nearly half of American adults are smartphone owners. Pew Research, Retrieved date: url:
-
(2012)
-
-
Smith, A.1
-
108
-
-
0000981743
-
Information privacy: measuring individual's concerns about organizational practices
-
Smith, H.J., Milberg, S.J. & Burke, S.J. (1996) Information privacy: measuring individual's concerns about organizational practices. MIS Quarterly, 20, 167-196.
-
(1996)
MIS Quarterly
, vol.20
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
Burke, S.J.3
-
109
-
-
13244286108
-
Validation guidelines for IS positivist research
-
Straub, D.W., Boudreau, M.C. & Gefen, D. (2004) Validation guidelines for IS positivist research. Communications of the AIS, 14, 380-426.
-
(2004)
Communications of the AIS
, vol.14
, pp. 380-426
-
-
Straub, D.W.1
Boudreau, M.C.2
Gefen, D.3
-
110
-
-
54249132563
-
Information needs and risk perception as predictors of risk information seeking
-
Ter Huurne, E. & Gutteling, J. (2008) Information needs and risk perception as predictors of risk information seeking. Journal of Risk Research, 11, 847-862.
-
(2008)
Journal of Risk Research
, vol.11
, pp. 847-862
-
-
Ter Huurne, E.1
Gutteling, J.2
-
111
-
-
70449591802
-
How to trust? The importance of self-efficacy and social trust in public responses to industrial risks
-
ter Huurne, E.F.J. & Gutteling, J.M. (2009) How to trust? The importance of self-efficacy and social trust in public responses to industrial risks. Journal of Risk Research, 12, 809-824.
-
(2009)
Journal of Risk Research
, vol.12
, pp. 809-824
-
-
ter Huurne, E.F.J.1
Gutteling, J.M.2
-
112
-
-
33749390822
-
Intentions to use information technologies: an integrative model
-
Thompson, R., Compeau, D.R. & Higgins, C. (2006) Intentions to use information technologies: an integrative model. Journal of Organizational and End User Computing, 18, 25-46.
-
(2006)
Journal of Organizational and End User Computing
, vol.18
, pp. 25-46
-
-
Thompson, R.1
Compeau, D.R.2
Higgins, C.3
-
113
-
-
44249124273
-
Examining trust in information technology artifacts: the effects of system quality and culture
-
Vance, A., Elie-Dit-Cosaque, C. & Straub, D.W. (2008) Examining trust in information technology artifacts: the effects of system quality and culture. Journal of Management Information Systems, 24, 73-100.
-
(2008)
Journal of Management Information Systems
, vol.24
, pp. 73-100
-
-
Vance, A.1
Elie-Dit-Cosaque, C.2
Straub, D.W.3
-
114
-
-
43649087245
-
Technology acceptance model 3 and a research agenda on interventions
-
Venkatesh, V. & Bala, H. (2008) Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39, 273-315.
-
(2008)
Decision Sciences
, vol.39
, pp. 273-315
-
-
Venkatesh, V.1
Bala, H.2
-
115
-
-
0033872521
-
A theoretical extension of the technology acceptance model: four longitudinal field studies
-
Venkatesh, V. & Davis, F.D. (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46, 186-204.
-
(2000)
Management Science
, vol.46
, pp. 186-204
-
-
Venkatesh, V.1
Davis, F.D.2
-
116
-
-
1542382496
-
User acceptance of information technology: toward a unified view
-
Venkatesh, V., Morris, M.G., Davis, G.B. & Davis, F.D. (2003) User acceptance of information technology: toward a unified view. MIS Quarterly, 27, 425-478.
-
(2003)
MIS Quarterly
, vol.27
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
117
-
-
57349183755
-
Effects of the electronic Nigerian money fraud on the brand equity of Nigeria and Africa
-
Viosca, R.C. Jr., Bergiel, B.J. & Balsmeier, P. (2004) Effects of the electronic Nigerian money fraud on the brand equity of Nigeria and Africa. Management Research News, 27, 11-20.
-
(2004)
Management Research News
, vol.27
, pp. 11-20
-
-
Viosca, R.C.1
Bergiel, B.J.2
Balsmeier, P.3
-
118
-
-
52149116017
-
The effects of change control and management review on software flexibility and project performance
-
438-433
-
Wang, E.T.G., Ju, P.-H., Jiang, J.J. & Klein, G. (2008) The effects of change control and management review on software flexibility and project performance. Information & Management, 45, 438-433.
-
(2008)
Information & Management
, vol.45
-
-
Wang, E.T.G.1
Ju, P.-H.2
Jiang, J.J.3
Klein, G.4
-
120
-
-
38349112609
-
Recommendation agents for electronic commerce: effects of explanation facilities on trusting beliefs
-
Wang, W.Q. & Benbasat, I. (2007) Recommendation agents for electronic commerce: effects of explanation facilities on trusting beliefs. Journal of Management Information Systems, 23, 217-246.
-
(2007)
Journal of Management Information Systems
, vol.23
, pp. 217-246
-
-
Wang, W.Q.1
Benbasat, I.2
-
121
-
-
33644786234
-
Predicting consumer intention to use mobile service
-
Wang, Y.-S., Lin, H.-H. & Luarn, P. (2006) Predicting consumer intention to use mobile service. Information Systems Journal, 16, 157-179.
-
(2006)
Information Systems Journal
, vol.16
, pp. 157-179
-
-
Wang, Y.-S.1
Lin, H.-H.2
Luarn, P.3
-
122
-
-
27744445678
-
Adult attachment, social self-efficacy, self-disclosure, loneliness, and subsequent depression for freshman college students: a longitudinal study
-
Wei, M., Russell, D.W. & Zakalik, R.A. (2005) Adult attachment, social self-efficacy, self-disclosure, loneliness, and subsequent depression for freshman college students: a longitudinal study. Journal of Counseling Psychology, 52, 602.
-
(2005)
Journal of Counseling Psychology
, vol.52
, pp. 602
-
-
Wei, M.1
Russell, D.W.2
Zakalik, R.A.3
-
123
-
-
80053127414
-
Locus of control and location privacy: an empirical study in Singapore
-
Xu, H. (2010) Locus of control and location privacy: an empirical study in Singapore. Journal of Global Information Technology Management, 13, 63-87.
-
(2010)
Journal of Global Information Technology Management
, vol.13
, pp. 63-87
-
-
Xu, H.1
-
124
-
-
77749333391
-
The role of push-pull technology in privacy calculus: the case of location-based services
-
Xu, H., Teo, H.H., Tan, B.C.Y. & Agarwal, R. (2010) The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 26, 135-173.
-
(2010)
Journal of Management Information Systems
, vol.26
, pp. 135-173
-
-
Xu, H.1
Teo, H.H.2
Tan, B.C.Y.3
Agarwal, R.4
|