Information Technology Reference
In-Depth Information
Henry, J. W., & Martinko, M. J. (1997). An attributional
analysis of the rejection of information technology.
Journal of End User Computing, 9
(4), 3-17.
Lederer, A. L., Maupin, D. J., Seneca, M. P., & Zhuang, Y.
(2000). The technology acceptance model and the World
Wide Web.
Decision Support Systems
,
29
(3), 269-282.
Hoffman, D. L., & Novak, T. P. (1999). Building con-
sumer trust online.
Communications of the ACM
,
42
(4),
80-85.
Lee, M. K. O., & Turban, E. (2001). A trust model for
consumer Internet shopping.
International Journal of
Electronic Commerce, 6
(1), 75-91.
Hu, P. J, Chau, P., Sheng, O., & Tam, K. Y. (1999). Ex-
amining the technology acceptance model using physi-
cian acceptance of telemedicine technology.
Journal of
Management Information Systems
,
16
(2), 91-113.
Licht, J. (1999, August 31). Seniors assess a deluge of data:
Operators of Web sites reach out to a growing audience
of older people.
The Washington Post
, p. Z15.
Lin, J. C.-C., & Lu, H. (2000). Towards an understand-
ing of the behavioural intention to use a Web site.
International Journal of Information Management,
20
(30), 197-208.
Igbaria, M., Guimaraes, T., & Davis, G. B. (1995). Testing
the determinants of microcomputer usage via a structural
equation model.
Journal of Management Information
Systems
,
11
(4), 87-102.
Liu, Chang, Marchewka, Jack T., Lu, June & Yu, Chun-
Sheng. (2005). Beyond concern - A privacy-trust-behav-
ioral intention model of electronic commerce.
Information
& Management, 42
(1), 289-304.
Igbaria, M., Zinatelli, N., Craig, P., & Cavaya, A. (1997).
Personal computing acceptance factors in small firms:
A structural equation model.
MIS Quarterly, 21
(3),
279-305.
Lucas, H., & Spitler, V. K. (1999). Technology use and
performance: A field study of broker workstations.
Deci-
sion Sciences, 30
(2), 291-311.
Jones, K. (2005). Pharming your identity; identity theft
is on the rise, and phishing e-mail scams disguised as
legitimate correspondence has risen to epidemic propor-
tions.
PC Magazine, 24
(8), 19.
Marquie, J. C., Jourdan-Boddaert, L., & Huet, N. (2002).
Do older adults underestimate their actual computer
knowledge?
Behavior and Information Technology,
21
(4), 273-280.
Karahanna, E., & Straub, D. W. (1999). The psychological
origins of perceived usefulness and ease of use.
Informa-
tion & Management, 35
(4), 237-250.
Moon, J., & Kim, Y. (2001). Extending the TAM for a
World Wide Web context.
Information and Management,
38
(4), 217-230.
Kelleher, L. (2003). Breaking the stereotypes of older
adults online.
AARP
. Retrieved August 21, 2003, from
http://www.aarp.org/olderwiserwired/Articles/a2003-
02-20-oww-barriers.html
Moschis, G. P., & Mathur, A. (1993). How they're acting
their age.
Marketing Management, 2
(2), 40-51.
Kelloway, E. K. (1998).
Using Lisrel for structural
equation modeling: A researcher's guide.
Thousand
Oaks, CA: Sage.
Mukherjee, A., & Nath, P. (2003). A model of trust in
online relationships banking.
The International Journal
of Bank Marketing, 21
(1), 5-16.
Kerlinger, F. N. (1986).
Foundations of behavioral re-
search.
TX: Harcourt Brace College.
Nielson//NetRatings. (2003).
Broadband access grows
59 percent, while narrow band use declines, according
to Nielson//NetRatings.
Retrieved February 15, 2006,
fromhttp://www.nielsen-netratings.com/pr/pr_030115.
pdf
Koufaris, M., & Hampton-Sosa, W. (2004). The devel-
opment of initial trust in an online company by new
customer.
Information & Management
,
41
(3), 377-388.
Search WWH ::
Custom Search