120
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Gender Differences in Email and Instant Messaging: A Study of Undergraduate Business Information Systems Students

&
Pages 20-30 | Published online: 04 Jan 2016

References

  • Adams, D., Nelson, R., & Todd, P. (1992). Perceived usefulness, ease-of-use, and usage of information technology: A replication. MIS Quarterly, 16(2), 227–247.
  • Birdsell, D., Muzzio, D., Krane, D., & Cottreau, A. (1998). Web users are looking more like America. The Public Perspective, 9(3), 33–35.
  • Boneva, B., Kraut, R., & Frohlich, D., (2001). Using e-mail for personal relationships: The difference gender makes. American Behavioral Psychologist, 45(3), 530–549.
  • Caldwell, M., & Peplau, L. (1982). Sex differences in same-sex friendships. Sex Roles, 8, 721–732.
  • Carlson, J., & Zmud, R. (1999). Channel expansion theory and the experiential nature of media richness perceptions. Academy of Management Journal, 42(2), 153–170.
  • Claes, M. (1992). Friendship and personal adjustment during adolescence. Journal of Adolescence, 15(1), 39–55.
  • CNN. (2002, February 7). Report: More than 50% of U.S. on Internet. Retrieved on December 15, 2002, from http://www.cnn.com/2002/TECH/internet/02/06/internet.use/index.html
  • Davis, F. (1986). A technological acceptance model for empirically testing new end-user information systems: Theory and results. Doctoral Dissertation, Sloan School of Management, Massachusetts Institute of Technology.
  • Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.
  • Deaux, K. & Major, B. (1987). Putting gender into context: An interactive model of gender-related behavior. Psychological Review, 94, 369–389.
  • Diener, E., Suh, E., Lucas, R., & Smith, H. (1999). Subjective well-being: Three decades of progress. Psychological Bulletin, 125, 276–302.
  • Di Leonardo, M. (1987). The female world of cards and holidays: Women, families and the work of kinship. Signs: Journal of Women in Culture and Society, 12, 440–453.
  • Doll, W., Hendrickson, A., & Deng, X. (1993). Using Davis's Perceived Usefulness and Ease-of-use Instruments for Decision Making: A Confirmatory and Multigroup Invariance Analysis. Decision Sciences, 29(4), 839–869.
  • Duck, S., & Wright, P. (1993). Reexamining gender differences in same-gender friendships. A close look at two kinds of data. Sex Roles, 28, 709–727.
  • Eagle, A., & Steffen, V. (1984). Gender stereotypes stem from the distribution of women and men into social roles. Journal of Personality and Social Psychology, 46, 735–754.
  • Fehr, B. (1996). Friendship processes. Thousand Oaks, CA: Sage.
  • Gattiker, U., Perlusz, S., & Bohmann, K. (2000). Using the Internet for B2B activities: A review and future directions for research. Internet Research: Electronic Networking Applications and Policy, 10, 126–140.
  • Gefen, D., & Straub, D. (1997). Gender differences in the perception and use of email: An extension to the Technology Acceptance Model. MIS Quarterly, 21(4), 389–400.
  • Graphics, Visualization, and Usability Center (GVU). (1999). Results of GVU's tenth world wide user survey. Atlanta: Georgia Tech Research Corporation. Retrieved on December 15, 2002, from http://www.gvu.gatech.edu/user_surveys/survey-1998-10/.
  • Hauser, S., Powers, S., Weiss-Perry, B., Follansbee, D., Rajapak, D., & Greene, W. (1987). The constraining and enabling coding system manual. Unpublished manuscript.
  • Hendrickson, A., Massey, P., & Cronan, T. (1993). On the test-retest reliability of perceived usefulness and perceived ease-of-use scales. MIS Quarterly, 17(2), 227–230.
  • Hiltz, S., & Turoff, M. (1978). Network nation: Human communication via computer. Reading, MA: Addison Wesley.
  • Huang, E. “The Acceptance of Women-Centric Websites,” Journal of Computer Information Systems, 45:4 Summer 2005 pp. 75–83.
  • Igbaria, M., Guimaraes, T., & Davis, G. (1995). Testing the determinants of microcomputer usage via a structured equation model. Journal of Management Information Systems, 11(4), 87–114.
  • Johnson, F., & Aries, E. (1983). The talk of women friends. Women's Studies International Forum, 6, 353–361.
  • Kraut, R., Mukhopadhyay, T., Szczypula, J., Kiesler, S., & Scherlis, W. (2000). Information and communication: Alternate uses of the Internet in households. Information Systems Research, 10, 287–303.
  • Kwon, T., & Zmud, R. (1987). Unifying the fragmented models of information systems implementation. R. J. Boland, Jr. and R. A. Hirschheim (Eds.), In Critical Issues in Information Systems Research (pp. 227–251). John Wiley and Sons: New York.
  • Lundgren, T. D. and K. S. Nantz. “Student Attitudes Toward Internet Courses: A Longitudinal Study,” Journal of Computer Information Systems, 43:3 Spring 2003 pp. 61–66.
  • Maccoby, E. (1990). Gender and relationships: A developmental account. American Psychologist, 45(4), 513–520.
  • Markus, M. (1983). Power, politics and MIS implementation. Communications of the ACM, 26(6), 430–444.
  • McKenna, K., & Bargh, J. (2000). Plan 9 from cyberspace: The implications of the Internet for personality and social psychology. Personality and Social Psychology Review, 4, 57–75.
  • Mills, R.J., K. A. Lawless, and J. A. Pratt. “Training Groups of End Users: Examining Group Interactions in a Computer-Based Learning Environment,” Journal Of Computer Information Systems, 46:3, Spring 2006 pp.104–109.
  • Odell, P., Korgen, K., Schumacher, P., & Delucchi, M. (2000). Internet use among female and male college students. CyberPsychology & Behavior, 3(5), 855–862.
  • Pew Internet and American Life Project (2000). Daily Internet Activities. Retrieved on December 15, 2002, from http://www.pewinternet.org/reports/chart.asp?img=5_Daily_Activities.gif
  • Rice, R. (1993). Media Appropriateness: Using social presence theory to compare traditional and new organizational media. Human Communication Research, 19(4), 451–484.
  • Rosenthal, C. (1985). Kinkeeping in the familial division of labor. Journal of Marriage and the Family, 47, 965–974.
  • Rubin, Z. (1986). On men and friendship. Psychoanalytic Review, 73, 165–181.
  • Segars, A., & Grover, V. (1993). Re-examining perceived ease-of-use and usefulness: A confirmatory factor analysis. MIS Quarterly, 17(4), 517–525.
  • Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications. London: Wiley.
  • Spence, J., & Buckner, C. (2000). Instrumental and expressive traits, trait stereotypes, and sexist attitudes: What do they signify? Psychology of Women Quarterly, 24, 44–62.
  • Spence, J., & Helmreich, R. (1978). Masculinity and femininity: Their psychological dimensions, correlates, and antecedents. Austin: University of Texas Press.
  • Sproull, L., & Kiesler, S. (1991). Connections: New ways of working in the networked organization. Cambridge, MA: MIT Press.
  • SPSS Inc. (1999). SPSS Base 9.0 for Windows User's Guide. SPSS Inc., Chicago IL.
  • Stafford, L., Kline, S, & Dimmick, J. (1999). Home e-mail: Relational maintenance and gratification opportunities. Journal of Broadcasting & Electronic Media, 43(4), 659–669.
  • Stewart, C., Shields, S., Monolescu, D., & Taylor, J. (1999). Gender and participation in synchronous CMC: An IRC case study. Interpersonal Computing and Technology: An Electronic Journal for the 21st Century, 7, 1–41.
  • Straub, D., Limayem, M., & Karahanna-Evaristo, E. (1995). Measuring system usage: Implications for IS theory testing. Management Science, 41(8), 1328–1342.
  • Swanson, E. (1988). Information Systems Implementation. Irwin, Homewood, IL.
  • Szajna, B., & Scamell, R. (1993). The effects of information system user expectations on their performance and perceptions. MIS Quarterly, 17(4), 493–516.
  • Talukder, M.M.I. “The Perception of Professionals and Management Personnel on the Virtual Organization,” Journal of Computer Information Systems, 43:3, Spring 2003 pp. 92–99.
  • Taylor, H. (1999, December 26). The Harris Poll #76: Online population growth surges to 56% of all adults. Six times higher than it was four years ago. Retrieved on December 15, 2002, from http://www.harrisinteractive.com/harris_poll/pdf/dec22_1999.pdf
  • Thoits, P. (1983). Multiple identities and psychological well-being: A reformulation and test of the social isolation hypothesis. American Sociological Review, 48, 174–187.
  • Truman, G. & Baroudi, J. (1994). Gender differences in the information systems managerial ranks: An assessment of potential discriminatory practices. MIS Quarterly, 18(2), 129–141.
  • Twenge, J. (1997). Changes in masculine and feminine traits across time: A meta-analysis. Sex Roles, 36, 305–327.
  • Walker, K. (1994). “I'm no friends the way she's friends”: Ideological and behavioral constructions of masculinity in men's friendships. Masculinities, 2, 38–55.
  • Weiser, E. (2000). Gender differences in Internet use patterns and Internet application preferences: A two-sample comparison. CyberPsychology & Behavior, 3, 167–178.
  • Wellman, B. (1992). Men in networks: Private communities, domestic friendships. In O.M. Nardi (Ed.), Men's friendships (pp. 74–114). London: Sage.
  • Wellman, B., Quan, A., Witte, J., & Hampton K. (2001). Does the Internet increase, decrease or supplement social capital? Social networks, participation, and community commitment. American Behavioral Scientist, 45, 436–455.
  • Williams, A., Ware, J., & Donald, C. (1981). A model of mental health, life events, and social supports applicable to general populations. Journal of Health and Social Behavior, 22, 324–333.
  • Wilson, E.V. and J.P. Morrison. “Effects of Educational Context on Socialization in Computer–Mediated Communication,” Journal of Computer Information Systems, 40:2, Winter 1999–2000 pp. 86–89.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.