Information Technology Reference
In-Depth Information
Burnett, J. (1991). Examining the media habits
of the affluent elderly. Journal of Advertising
Research , 31 (5), 33-41.
Grabner-Kraeuter, S. (2002). The role of consum-
ers' trust in online-shopping. Journal of Business
Ethics , 39 (1/2), 43-50.
Chen, L., Gillenson, M. & Sherrell, D. (2002).
Enticing online consumers: An extended tech-
nology acceptance perspective. Information &
Management, 39 (8), 705-719.
Groves, D. L. (1990). Computer assisted instruc-
tion with senior citizens. Journal of Instructional
Psychology, 17 (3), 172-177.
Han, K. S., & Noh, K. (1999). Critical failure
factors that discourage the growth of electronic
commerce. International Journal of Electronic
Commerce, 4 (2), 25-43.
Cohen, A. (2001). Internet insecurity. Time ,
157 (26), 44-51.
Davis, F. D. (1989). Perceived usefulness, per-
ceived ease of use and user acceptance of informa-
tion technology. MIS Quarterly , 13 (3), 319-339.
Hawkins, D., & Mannix, M. (2000). Privacy is
under siege at work, at home and online. U.S.
News and World Report, 129 (13), 62-68.
Doll, W. J., Hendrickson, A., & Deng, X. (1998).
Using Davis's perceived usefulness and ease-of-
use instruments for decision making: A confirma-
tory and multigroup invariance analysis. Decision
Sciences, 29 (4), 839-869.
Henry, J. W., & Martinko, M. J. (1997). An at-
tributional analysis of the rejection of information
technology. Journal of End User Computing,
9 (4), 3-17.
Eastman, J., & Iyer, R. (2004). The elderly's uses
and attitudes towards the Internet. The Journal of
Consumer Marketing, 21 (2/3), 208-220.
Hoffman, D. L., & Novak, T. P. (1999). Building
consumer trust online. Communications of the
ACM , 42 (4), 80-85.
Eisenberg, A. (2001, April 5). A 'smart' home,
to avoid the nursing home. New York Times , pp.
G.1.
Hu, P. J, Chau, P., Sheng, O., & Tam, K. Y.
(1999). Examining the technology acceptance
model using physician acceptance of telemedicine
technology. Journal of Management Information
Systems , 16 (2), 91-113.
Finn, J. (1997). Aging and information technol-
ogy: The promise and the challenge. Generations ,
21, 5-6.
Igbaria, M., Guimaraes, T., & Davis, G. B. (1995).
Testing the determinants of microcomputer usage
via a structural equation model. Journal of Man-
agement Information Systems , 11 (4), 87-102.
Foster, E. (2003). “Caught you!” InfoWorld,
25 (12), 60.
Gefen, D. (2003). TAM or just plain habit: A look
at experienced online shoppers. Journal of End
User Computing, 15 (3), 1-13.
Igbaria, M., Zinatelli, N., Craig, P., & Cavaya, A.
(1997). Personal computing acceptance factors in
small firms: A structural equation model. MIS
Quarterly, 21 (3), 279-305.
Gefen, D., Karahanna, E., & Straub, D. (2003).
Trust and TAM in online shopping: An integrated
model. MIS Quarterly, 27 (1), 51-90.
Jones, K. (2005). Pharming your identity; identity
theft is on the rise, and phishing e-mail scams
disguised as legitimate correspondence has risen
to epidemic proportions. PC Magazine, 24 (8),
19.
Gefen, D., & Straub, D. (2000). The relative use of
perceived ease of use in IS adoption: A study of
e-commerce adoption. Journal of the Association
for Information Systems, 1 (8), 1-28.
Search WWH ::




Custom Search