209
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

The Psychological Influences of Threat on B2C E-commerce Adoption: An Extended Study and Explanatory Framework

Pages 303-315 | Published online: 07 Jul 2010

REFERENCES

  • Awad , N. F. and Krishnan , M. S. 2006 . Evaluation of information transparency and the willingness to be profiled online for personalization . MIS Quarterly , 30 ( 1 ) : 13 – 31 .
  • Baum , K. 2006, April . “ Identity theft: The aftermath 2004 with comparisons to the aftermath 2003 study ” . In Bureau of Justice Statistics Bulletin, NCJ 212213 , Washington, DC : Office of Justice Programs, U.S. Department of Justice .
  • Bellman , S. , Lohse , G. L. and Johnson , E. J. 1999 . Predictors of online buying behavior . Communications of the ACM , 42 ( 12 ) : 32 – 38 .
  • Davis , F. D. 1989 . Perceived usefulness, perceived ease of use, and user acceptance of information technology . MIS Quarterly , 13 ( 3 ) : 319 – 340 .
  • Dennis , A. R. and Reinicke , B. A. 2004 . BETA versus VHS and the acceptance of electronic brainstorming technology . MIS Quarterly , 28 ( 1 ) : 1 – 20 .
  • Dutton , J. E. and Jackson , S. E. 1987 . The categorization of strategic issues by decision makers and its links to organizational action . Academy of Management Review , 12 ( 1 ) : 76 – 90 .
  • 2006, November . Online holiday shopping preview Retrieved June 17, 2008, from http://www.emarketer.com/Reports/All/Em_holiday_us_nov06.aspx?src=report_head_info_sitesearcheMarketer.com
  • eMarketer.com . 2007, February . Asia-Pacific B2C e-commerce: China, Japan, South Korea Retrieved June 13, 2008, from http://www.emarketer.com/Reports/All/Em_b2c_ecom_asia_feb07.aspx?src=report_head_info_sitesearch
  • Everard , A. and Galletta , D. F. 2005 . How presentation flaws affect perceived site quality . Journal of Management Information Systems , 22 ( 3 ) : 55 – 95 .
  • Falk , L. K. , Sockey , H. and Chen , K. 2005 . E-commerce and consumer's expectations: What makes a website work . Journal of Website Promotion , 1 ( 1 ) : 85 – 95 .
  • Gefen , D. , Karahanna , E. and Straub , D. W. 2003 . Trust and TAM in online shopping: An integrated model . MIS Quarterly , 27 ( 1 ) : 51 – 90 .
  • Gefen , D. and Straub , D. 2000 . The Relative importance of perceived ease-of-use in IS Adoption: A study of e-commerce adoption . Journal of AIS , 1 ( 8 ) : 1 – 30 .
  • Haag , S. , Baltzan , P. and Phillips , A. 2005 . Business driven technology , New York : McGraw-Hill/Irwin .
  • Hui , K. , Teo , H. H. and Lee , S. T. 2007 . The value of privacy assurance: An exploratory field experiment . MIS Quarterly , 31 ( 1 ) : 19 – 33 .
  • Koufaris , M. 2002 . Applying the technology acceptance model and flow theory to online consumer behavior . Information Systems Research , 13 ( 2 ) : 205 – 223 .
  • Martocchio , J. J. 1992 . Microcomputer usage as an opportunity: The influence of context in employee training . Personnel Psychology , 45 ( 3 ) : 529 – 552 .
  • Morris , M. G. , Venkatesh , V. and Ackerman , P. L. 2005 . Gender and age differences in employee decisions about new technology: An extension to the theory of planned behavior . IEEE Trans Engineering Management , 52 ( 1 ) : 69 – 84 .
  • Pavlou , P. A. 2001 . “ Integrating trust in electronic commerce with the technology acceptance model: Model development and validation ” . In Proceedings of the Seventh Americas Conference in Information Systems , Edited by: DeGross , J. 816 – 822 . New York : ACM .
  • Pavlou , P. A. and Fygenson , M. 2006 . Understanding and predicting e-commerce adoption: An extension of the theory of planned behavior . MIS Quarterly , 31 ( 1 ) : 105 – 136 .
  • Pavlou , P. A. and Gefen , D. 2005 . Psychological contract violation in online market places: Antecedents, consequences, and moderating role . Information Systems Research , 16 ( 4 ) : 372 – 399 .
  • Roskos-Ewoldsen , D. R. , Yu , H. J. and Rhodes , N. 2004 . Fear appeal messages affect accessibility of attitudes toward the threat and adaptive behaviors . Communication Monographs , 71 ( 1 ) : 49 – 69 .
  • Salisbury , W. D. , Pearson , R. A. , Pearson , A. W. and Miller , D. W. 2001 . Perceived security and World Wide Web purchase intention . Industrial Management & Data Systems , 101 ( 3/4 ) : 165 – 176 .
  • Suh , B. and Han , I. 2003 . The impact of customer trust and perception of security control on the acceptance of electronic commerce . International Journal of Electronic Commerce , 7 ( 3 ) : 135 – 161 .
  • Taylor , S. and Todd , P. A. 1995 . Understanding information technology usage: A test of competing models . Information Systems Research , 6 ( 2 ) : 144 – 153 .
  • Venkatesh , V. 2006 . Where to go from here? Thoughts on future directions for research on individual-level technology adoption with a focus on decision making . Decision Sciences , 37 ( 4 ) : 497 – 518 .
  • Venkatesh , V. and Davis , F. D. 2000 . A theoretical extension of the technology acceptance model: Four longitudinal field studies . Management Science , 46 ( 2 ) : 186 – 204 .
  • Venkatesh , V. , Morris , M. G. , Davis , G. and Davis , F. D. 2003 . User acceptance of information technology: Toward a unified view . MIS Quarterly , 27 ( 3 ) : 425 – 478 .
  • Witte , K. 1992 . Putting the fear back into fear appeals: The extended parallel process model . Communication Monographs , 59 ( 12 ) : 329 – 349 .
  • Witte , K. 1993 . Message and conceptual confounds in fear appeals: The role of threat, fear, and efficacy . Southern Communication Journal , 58 ( 2 ) : 147 – 155 .
  • Witte , K. 1995 . Fear control and danger control: A test of the extended parallel process model (EPPM) . Communication Monographs , 61 ( 2 ) : 113 – 134 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.