Information Technology Reference
In-Depth Information
Burnett, J. (1991). Examining the media habits
of the affluent elderly.
Journal of Advertising
Research
,
31
(5), 33-41.
Grabner-Kraeuter, S. (2002). The role of consum-
ers' trust in online-shopping.
Journal of Business
Ethics
,
39
(1/2), 43-50.
Chen, L., Gillenson, M. & Sherrell, D. (2002).
Enticing online consumers: An extended tech-
nology acceptance perspective.
Information &
Management, 39
(8), 705-719.
Groves, D. L. (1990). Computer assisted instruc-
tion with senior citizens.
Journal of Instructional
Psychology, 17
(3), 172-177.
Han, K. S., & Noh, K. (1999). Critical failure
factors that discourage the growth of electronic
commerce.
International Journal of Electronic
Commerce, 4
(2), 25-43.
Cohen, A. (2001). Internet insecurity.
Time
,
157
(26), 44-51.
Davis, F. D. (1989). Perceived usefulness, per-
ceived ease of use and user acceptance of informa-
tion technology.
MIS Quarterly
,
13
(3), 319-339.
Hawkins, D., & Mannix, M. (2000). Privacy is
under siege at work, at home and online.
U.S.
News and World Report, 129
(13), 62-68.
Doll, W. J., Hendrickson, A., & Deng, X. (1998).
Using Davis's perceived usefulness and ease-of-
use instruments for decision making: A confirma-
tory and multigroup invariance analysis.
Decision
Sciences, 29
(4), 839-869.
Henry, J. W., & Martinko, M. J. (1997). An at-
tributional analysis of the rejection of information
technology.
Journal of End User Computing,
9
(4), 3-17.
Eastman, J., & Iyer, R. (2004). The elderly's uses
and attitudes towards the Internet.
The Journal of
Consumer Marketing, 21
(2/3), 208-220.
Hoffman, D. L., & Novak, T. P. (1999). Building
consumer trust online.
Communications of the
ACM
,
42
(4), 80-85.
Eisenberg, A. (2001, April 5). A 'smart' home,
to avoid the nursing home.
New York Times
, pp.
G.1.
Hu, P. J, Chau, P., Sheng, O., & Tam, K. Y.
(1999). Examining the technology acceptance
model using physician acceptance of telemedicine
technology.
Journal of Management Information
Systems
,
16
(2), 91-113.
Finn, J. (1997). Aging and information technol-
ogy: The promise and the challenge.
Generations
,
21,
5-6.
Igbaria, M., Guimaraes, T., & Davis, G. B. (1995).
Testing the determinants of microcomputer usage
via a structural equation model.
Journal of Man-
agement Information Systems
,
11
(4), 87-102.
Foster, E. (2003). “Caught you!”
InfoWorld,
25
(12), 60.
Gefen, D. (2003). TAM or just plain habit: A look
at experienced online shoppers.
Journal of End
User Computing, 15
(3), 1-13.
Igbaria, M., Zinatelli, N., Craig, P., & Cavaya, A.
(1997). Personal computing acceptance factors in
small firms: A structural equation model.
MIS
Quarterly, 21
(3), 279-305.
Gefen, D., Karahanna, E., & Straub, D. (2003).
Trust and TAM in online shopping: An integrated
model.
MIS Quarterly, 27
(1), 51-90.
Jones, K. (2005). Pharming your identity; identity
theft is on the rise, and phishing e-mail scams
disguised as legitimate correspondence has risen
to epidemic proportions.
PC Magazine,
24
(8),
19.
Gefen, D., & Straub, D. (2000). The relative use of
perceived ease of use in IS adoption: A study of
e-commerce adoption.
Journal of the Association
for Information Systems, 1
(8), 1-28.
Search WWH ::
Custom Search