Information Technology Reference
In-Depth Information
Woodward, J. (1997). Biometrics: Privacy's foe or
privacy's friend? Proceedings of the IEEE, 85 (9), 1480-
1492.
Yi, M. Y., & Davis, F. D. (2003). Developing and validating
an observational learning model of computer software
training and skill acquisition. Information Systems Re-
search, 14 (2), 146-169.
Workman, M. (2005). Expert decision system use, disuse
and misuse: A study using the theory of planned behavior.
Computers in Human Behavior, 21 , 211-231.
Yi, M. Y., & Hwang, Y. (2003). Predicting the use of
Web-based information systems: Self-efficacy, enjoy-
ment, learning goal orientation, and the technology
acceptance model. International Journal of Human-
Computer Studies, 59 (4), 431-449.
World Wide Web Consortium. (2003). Platform for
privacy preferences (P3P) project . Retrieved from
http://www3.org.P3P
Yi , M. U., & I m , K . S. (20 0 4). P r e d ic t i ing
c o m p u t e r t a s k p e r f o r m a n c e : P e r s o n a l
goal and self-efficacy. Journal of Organizational and
End User Computing, 16 (2), 28-37.
Yi, M.Y., Fiedler, K.D., & Park, J.S. (2006). Understanding
the role of individual innovativeness in the acceptance of
IT-based innovations: Comparative analyses of models
and measures. Decision Sciences, 37 (3), 393-426.
Zachman, J. A. (1987). A framework for information
systems architecture. IBM Systems Journal, 26 (3),
276-292.
Wyatt, S., Thomas, G., & Terranova, T. (2002). They came,
they surfed, they went back to the beach: Conceptualizing
use and new use of the Internet. In S. Woolgar (Ed.),
Virtual society? Technology, cyberbole, reality . Oxford:
Oxford University Press.
Yi, M.Y., & Davis, F. D. (2001). Improving computer
training effectiveness for decision technologies: Behavior
modeling and retention enhancement. Decision Sciences,
32 (3), 521-544.
Search WWH ::




Custom Search