Information Technology Reference
In-Depth Information
Woodward, J. (1997). Biometrics: Privacy's foe or
privacy's friend?
Proceedings of the IEEE, 85
(9), 1480-
1492.
Yi, M. Y., & Davis, F. D. (2003). Developing and validating
an observational learning model of computer software
training and skill acquisition.
Information Systems Re-
search,
14
(2), 146-169.
Workman, M. (2005). Expert decision system use, disuse
and misuse: A study using the theory of planned behavior.
Computers in Human Behavior, 21
, 211-231.
Yi, M. Y., & Hwang, Y. (2003). Predicting the use of
Web-based information systems: Self-efficacy, enjoy-
ment, learning goal orientation, and the technology
acceptance model.
International Journal of Human-
Computer Studies,
59
(4), 431-449.
World Wide Web Consortium. (2003).
Platform for
privacy preferences (P3P) project
. Retrieved from
http://www3.org.P3P
Yi , M. U., & I m , K . S. (20 0 4). P r e d ic t i ing
c o m p u t e r t a s k p e r f o r m a n c e : P e r s o n a l
goal and self-efficacy.
Journal of Organizational and
End User Computing,
16
(2), 28-37.
Yi, M.Y., Fiedler, K.D., & Park, J.S. (2006). Understanding
the role of individual innovativeness in the acceptance of
IT-based innovations: Comparative analyses of models
and measures.
Decision Sciences, 37
(3), 393-426.
Zachman, J. A. (1987). A framework for information
systems architecture.
IBM Systems Journal, 26
(3),
276-292.
Wyatt, S., Thomas, G., & Terranova, T. (2002). They came,
they surfed, they went back to the beach: Conceptualizing
use and new use of the Internet. In S. Woolgar (Ed.),
Virtual society? Technology, cyberbole, reality
. Oxford:
Oxford University Press.
Yi, M.Y., & Davis, F. D. (2001). Improving computer
training effectiveness for decision technologies: Behavior
modeling and retention enhancement.
Decision Sciences,
32
(3), 521-544.