Information Technology Reference
In-Depth Information
Henry, J. W., & Martinko, M. J. (1997). An attributional
analysis of the rejection of information technology.
Journal of End User Computing, 9 (4), 3-17.
Lederer, A. L., Maupin, D. J., Seneca, M. P., & Zhuang, Y.
(2000). The technology acceptance model and the World
Wide Web. Decision Support Systems , 29 (3), 269-282.
Hoffman, D. L., & Novak, T. P. (1999). Building con-
sumer trust online. Communications of the ACM , 42 (4),
80-85.
Lee, M. K. O., & Turban, E. (2001). A trust model for
consumer Internet shopping. International Journal of
Electronic Commerce, 6 (1), 75-91.
Hu, P. J, Chau, P., Sheng, O., & Tam, K. Y. (1999). Ex-
amining the technology acceptance model using physi-
cian acceptance of telemedicine technology. Journal of
Management Information Systems , 16 (2), 91-113.
Licht, J. (1999, August 31). Seniors assess a deluge of data:
Operators of Web sites reach out to a growing audience
of older people. The Washington Post , p. Z15.
Lin, J. C.-C., & Lu, H. (2000). Towards an understand-
ing of the behavioural intention to use a Web site.
International Journal of Information Management,
20 (30), 197-208.
Igbaria, M., Guimaraes, T., & Davis, G. B. (1995). Testing
the determinants of microcomputer usage via a structural
equation model. Journal of Management Information
Systems , 11 (4), 87-102.
Liu, Chang, Marchewka, Jack T., Lu, June & Yu, Chun-
Sheng. (2005). Beyond concern - A privacy-trust-behav-
ioral intention model of electronic commerce. Information
& Management, 42 (1), 289-304.
Igbaria, M., Zinatelli, N., Craig, P., & Cavaya, A. (1997).
Personal computing acceptance factors in small firms:
A structural equation model. MIS Quarterly, 21 (3),
279-305.
Lucas, H., & Spitler, V. K. (1999). Technology use and
performance: A field study of broker workstations. Deci-
sion Sciences, 30 (2), 291-311.
Jones, K. (2005). Pharming your identity; identity theft
is on the rise, and phishing e-mail scams disguised as
legitimate correspondence has risen to epidemic propor-
tions. PC Magazine, 24 (8), 19.
Marquie, J. C., Jourdan-Boddaert, L., & Huet, N. (2002).
Do older adults underestimate their actual computer
knowledge? Behavior and Information Technology,
21 (4), 273-280.
Karahanna, E., & Straub, D. W. (1999). The psychological
origins of perceived usefulness and ease of use. Informa-
tion & Management, 35 (4), 237-250.
Moon, J., & Kim, Y. (2001). Extending the TAM for a
World Wide Web context. Information and Management,
38 (4), 217-230.
Kelleher, L. (2003). Breaking the stereotypes of older
adults online. AARP . Retrieved August 21, 2003, from
http://www.aarp.org/olderwiserwired/Articles/a2003-
02-20-oww-barriers.html
Moschis, G. P., & Mathur, A. (1993). How they're acting
their age. Marketing Management, 2 (2), 40-51.
Kelloway, E. K. (1998). Using Lisrel for structural
equation modeling: A researcher's guide. Thousand
Oaks, CA: Sage.
Mukherjee, A., & Nath, P. (2003). A model of trust in
online relationships banking. The International Journal
of Bank Marketing, 21 (1), 5-16.
Kerlinger, F. N. (1986). Foundations of behavioral re-
search. TX: Harcourt Brace College.
Nielson//NetRatings. (2003). Broadband access grows
59 percent, while narrow band use declines, according
to Nielson//NetRatings. Retrieved February 15, 2006,
fromhttp://www.nielsen-netratings.com/pr/pr_030115.
pdf
Koufaris, M., & Hampton-Sosa, W. (2004). The devel-
opment of initial trust in an online company by new
customer. Information & Management , 41 (3), 377-388.
Search WWH ::




Custom Search