93
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

The empirical study of impact critical security factors of mobile applications on technology acceptance model

&
Pages 245-273 | Received 01 Feb 2016, Published online: 21 Apr 2017

References

  • Abrams, R. (2010). Android Application Security. blog, 19(Aug), http://blog.eset.com/2010/08/19/android-application-security-2.
  • Anckar, B., & D’incau D. (2002). Value Creation in Mobile Commerce: Findings from a Consumer Survey. Journal of Information Technology Theory and Application 4(1), 43–64.
  • Butler, M. (2011). Android: Changing the Mobile Landscape. IEEE Pervasive Computing, 10(1), 4–7. doi: 10.1109/MPRV.2011.1
  • Dabholkar, P. A., & Bagozzi, R. P. (2002). An Attitudinal Model of Technology-Based Self-Service: Moderating Effects of Consumer Traits and Siruational Factors. Academy of Marketing Science Journal, 61(3), 184–201. doi: 10.1177/0092070302303001
  • Davis, F. D. (1986). Doctoral Dissertation, MIT Sloan School of Management. Cambridge, MA.
  • Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319–339. doi: 10.2307/249008
  • Hong, W., Wong, W., Thong, J. & Tam, K. (2002). Determinants of user acceptance of digital libraries: An empirical examination of individual differences and system characteristics. Journal of Management Information Systems, 18(3), 97–124.
  • Hong, X. Y., Zhang, S.Y., & Guo, J. Y. (2011). key factors affecting organizational adoption and application information security management system certification. Computer Audit Journal, 23, 99–112.
  • Huang, X. G., Han, H. E., Kuo, G. M., & Cheng, K. T. (2011). Diabetes was used as an example to explore the key factors affecting hospitals to build personal health records portal based on Information staff’s view. Information Management Journal, 19(2), 407–437.
  • Igbaria, M., Parasuraman, S. & Baroudi, J. J. (1996). A motivational model of computer usage. Journal of Management Information Systems, 13(1), 127–143. doi: 10.1080/07421222.1996.11518115
  • Legris, P., Inghamb, J., & Collerette, P. (2003). Why do People Use Information Technology? A Critical Review of the Technology Acceptance Model. Information and Management, 40(3), 191–204. doi: 10.1016/S0378-7206(01)00143-4
  • Lewis, W., Agarwal, R. & Sambamurthy, V. (2003). Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS Quarterly, 27(4), 657–678.
  • Lin, J. C., & Lu, H. (2000). Towards an understanding of the behavioral intention to use a website. International Journal of Information Management, 20(3), 197–208. doi: 10.1016/S0268-4012(00)00005-0
  • Lucas, H. C., & Spitler, V. K. (1999). Technology use and performance: A field study of broker workstations. Decision Sciences, 30(2), 291–311. doi: 10.1111/j.1540-5915.1999.tb01611.x
  • Ong, C. S., Lai, J. Y., and Wang, Y. S. (2004). Factors affecting engineers acceptance of asynchronous e-learning systems in high-tech companies. Information & Management, 41(6), 795–804. doi: 10.1016/j.im.2003.08.012
  • Moon, J. W., & Kim, Y. G. (2001). Extending the TAM for a World-Wide-Web context. Information & Management, 38(4), 217–230. doi: 10.1016/S0378-7206(00)00061-6
  • Noyes, K. (2010). Why Android App Security Is Better than for iPhon. PCWorld, 6 Aug.;www.pcworld.com/businesscenter/article/202758why_android_app_security_is_better_than_for_the_iphone.html
  • Oliver, R. L. (1997). Satisfaction: A Behavioral Perspective on the Consumer, Boston: McGraw-Hill.
  • Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315. doi: 10.1111/j.1540-5915.2008.00192.x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.