169
Views
0
CrossRef citations to date
0
Altmetric
Regular Articles

The Demise of Novell Netware—Did Perceptions Related to Network Administration Play a Role?

, &
Pages 26-39 | Published online: 17 Jan 2012

REFERENCES

  • Adams , D. A. , Nelson , R. R. and Todd , P. A. 1992 . Perceived usefulness, ease of use, & usage of information technology: A replication . MIS Quarterly , 16 ( 2 ) : 227 – 247 .
  • Asch , S. E. 1955 . Opinions & social pressure . Scientific American , 193 : 31 – 35 .
  • Al–Jabri , I. M. and Al–Hadad , A. 2008 . “ End user adoption of ERP systems: Investigation of four beliefs ” . In Proceedings of the Fourteenth Americas Conference on Information Systems 1 – 8 . Toronto, Ontario , , Canada
  • Armstrong , R. S. and Overton , T. 1977 . Estimating nonresponse bias in mail surveys . Journal of Marketing Research , 14 : 396 – 402 .
  • Benbasat , I. and Barki , H. 2007 . Quo vadis, TAM? . Journal of the Association for Information Systems , 8 ( 4 ) : 212 – 218 .
  • Besnard , D. and Budi , A. 2004 . Computer security impaired by legitimate users . Computers & Security , 23 : 229 – 237 .
  • Bhattacherjee , A. and Hikmet , N. 2008 . Reconceptualizing organizational support and its effect on information technology usage: Evidence from health care sector . Journal of CIS , 67 ( 4 ) : 69 – 76 .
  • Brandel , M. 2007 . The top 10 dead (or dying) computer skills . Computerworld. , MayRetrieved from http://www.computerworld.com
  • Brown , S. A. , Massey , A. P. , Montoya–Weiss , M. M. and Burkman , J. R. 2002 . Do I really have to? User acceptance of mandated technology . European Journal of Information Systems , 11 ( 4 ) : 283 – 295 .
  • Brown , I. , Boipelo , N. L. and Nabeel Nazeer , M. 2008 . Internet access in south african homes: Factors influencing consumer choice . Proceedings of AMCIS. ,
  • Bureau of Labor Statistics (BLS). (2008). Computer support specialists and systems administrators. http://www.bls.gov/oco/ocos268.htm#projections_data (http://www.bls.gov/oco/ocos268.htm#projections_data)
  • Byrne , B. 2001 . Structural equation modeling with AMOS, basic concepts, applications and programming , Hillsdale , NJ : Lawrence Erlbaum Associates .
  • Caelli , W. J. 2002 . Trusted … or … trustworthy: The search for a new paradigm for computer and network security . Computers and Security , 21 ( 5 ) : 413 – 420 .
  • Chan , H. C. , Teo , H. H. , Yang , J. and Li , Y. 2004 . “ The technology acceptance model for competitive software products ” . In Proceedings of the Eighth Pacific Asia Conference on Information Systems 1848 – 1855 .
  • Chau , P. Y. K. and Hu , J. H. P. 2001 . Information technology acceptance by individual professionals: A model comparison approach . Decision Sciences , 32 ( 4 ) : 699 – 719 .
  • Chin , W. W. 1998 . Issues and opinion on structural equation modeling . MIS Quarterly , 22 ( 1 ) : 7 – 16 .
  • Clarke , N. L. , Furnell , S. M. , Rodwell , P. M. and Reynolds , P. L. 2002 . Acceptance of subscriber authentication methods . Computers and Security , 21 ( 3 ) : 220 – 228 .
  • Dai , H. and Palvia , P. 2008 . “ Factors affecting mobile commerce adoption: A cross-cultural study in China and United States ” . In AMCIS
  • Davis , F. D. 1989 . Perceived usefulness, perceived ease of use, and user acceptance of information technology . MIS Quarterly , 13 ( 3 ) : 319 – 340 .
  • Davis , F. D. , Bagozzi , R. P. and Warshaw , P. R. 1989 . User acceptance of computer technology: a comparison of two theoretical models . Management Science , 35 ( 8 ) : 982 – 1003 .
  • De Dreu , C. K. W. and Boles , T. 1998 . Share and share alike or winner take all? The influence of social value orientation upon choice and recall of negotiation heuristics . Organizational Behavior and Human Decision Processes , 76 : 253 – 276 .
  • Deci , E. L. 1975 . Intrinsic Motivation , New York , NY : Plenum Press .
  • Dishaw , M. T. and Strong , D. M. 1999 . Extending the technology acceptance model with task-technology fit constructs . Information & Management , 36 ( 1 ) : 9 – 21 .
  • El–Gayar , O. and Moran , M. 2007 . Examining students’ acceptance of tablet PC using TAM . Issues in Information Systems , 8 ( 1 ) : 167 – 172 .
  • Ennew , C. T. , Reed , G. V. and Binks , M. R. 1993 . Importance of performance analysis and the measurement of service quality . European Journal of Marketing , 27 ( 2 ) : 59 – 70 .
  • Fornell , C. and Larcker , D. F. 1981 . Evaluating structural equation models with unobservable variables and measurement error . Management Science , 40 ( 4 ) : 440 – 465 .
  • Fu , J. R. , Farn , C. K. and Chao , W. P. 2006 . Acceptance of electronic tax filing: a study of taxpayer intentions . Information & Management , 43 ( 1 ) : 109 – 126 .
  • Gaskin , J. 2006 . Novell: Brainshare or brainDead? Retrieved from Networkedworld.com
  • Gefen , D. , Straub , D. W. and Boudreau , M. 2000 . Structural equation modeling techniques and regression: Guidelines for research practice . Communications of the Association for Information Systems , 4 ( 7 ) : 1 – 78 .
  • Ghosh , A. K. and Swaminatha , T. M. 2000 . Software security and privacy risk in mobile e-commerce . Communications of the ACM , 44 ( 2 )
  • Goodhue , D. L. 2007 . Comment on Benbasat and Barki's “quo vadis TAM” article . Journal of the Association for Information Systems , 8 ( 4 )
  • Goodhue , D. L. and Thompson , R. L. 1995 . Task-technology fit and individual performance . MIS Quarterly , 19 ( 2 ) : 213 – 236 .
  • Hair , J. T. , Anderson , R. E. , Tatham , R. L. and Black , W. C. 1998 . Multivariate Data Analysis , 5th , Upper Saddle River , NJ : Prentice Hall .
  • Hasan , B. 2006 . Delineating the effects of general and system-specific computer self-efficacy beliefs on IS acceptance . Information & Management , 43 ( 5 ) : 565 – 571 .
  • Heijden , H. V. D. 2003 . Factors influencing the usage of websites: The case of a generic portal in the Netherlands . Information & Management , 40 ( 6 ) : 541 – 549 .
  • Hendrickson , A. R. , Glorfeld , K. and Cronan , T. P. 1994 . On the repeated test-retest reliability of the end-user computing satisfaction instrument: a comment . Decision Sciences , 2 ( 4 ) : 655 – 667 .
  • Hernández , B. , Jiméneza , J. and Martína , M. J. 2008 . Extending the technology acceptance model to include the IT decision-maker: A study of business management software . Technovation. , 28 ( 3 ) : 112 – 121 .
  • Home , A. and Sayger , T. 1990 . Treating conduct and oppositional defiant disorders in children , New York , NY : Pergamon Press .
  • Hsieh , P. A. J. J. and Wang , W. 2007 . Explaining employees’ extended use of complex information systems . European Journal of Information Systems , 16 ( 3 ) : 216 – 227 .
  • Hsu , C. L. and Lu , H. P. 2004 . Why do people play on-line games? An extended TAM with social influences and flow experience . Information & Management , 41 ( 7 ) : 853 – 868 .
  • Igbaria , M. , Guimaraes , T. and Davis , G. B. 1995 . Testing the determinants of micro computer usage via a structural equation model . Journal of Management Information Systems , 11 ( 4 ) : 87 – 114 .
  • Jackson , C. , Chow , S. and Bitch , R. 1997 . Toward an understanding of the behavioral intention to use an information system . Decision Sciences , 28 ( 2 ) : 357 – 389 .
  • Jarvenpaa , S. L. and Tractinsky , N. 1992 . Consumer trust in an internet store: A cross-cultural validation . Journal of Computer Mediated Communication , 5 ( 2 ) : 1 – 35 .
  • Keil , M. , Beranek , P. M and Konsynski , B. R. 1995 . Usefulness and ease of use: Field study evidence regarding task considerations . Decision Support Systems , 13 ( 1 ) : 75 – 91 .
  • Kim , J. , Arnett , K. P. and Templeton , G. F. 2008 . Securing personal information assets: Testing antecedents of behavioral intentions. Proc . 15th Americas Conference on Information Systems (AMCIS) , : 1 – 8 .
  • Korgaonkar , P. K. and Wolin , L. D. 1999 . A multivariate analysis of web usage . Journal of Advertising Research , 39 : 53 – 68 .
  • Koufaris , M. and Hampton–Sosa , W. 2002 . “ Initial Perceptions of Company Trustworthiness Online: A Comprehensive Model and Empirical Test ” . In Report No. #CIS-2002-11 , CUNY .
  • Kwahk , K. August 14–17 2008 . “ An empirical study on the effect of attitude toward change and computer self-efficacy on ERP adoption: A comparison of the local and global packages ” . In Proceedings of the Fourteenth Americas Conference on Information Systems August 14–17 , Toronto, Ontario , , Canada
  • Lee , J. S. , Cho , H. , Gay , G. , Davidson , B. and Ingraffea , A. 2003 . Technology acceptance and social networking in distance learning . Educational Technology and Society , 6 ( 2 ) : 50 – 61 .
  • Lee , M. K. O. , Cheung , C. M. K. and Chen , Z. 2005 . Acceptance of internet-based learning medium: The role of extrinsic and intrinsic motivation . Information & Management , 42 ( 8 ) : 1095 – 1104 .
  • Lee , Y. , Kozar , K. A. and Larsen , K. R. T. 2003 . The technology acceptance model: Past, present and future . Communications of the AIS , 12 ( 50 ) : 752 – 780 .
  • Legris , P. , Ingham , J. and Collerette , P. 2003 . Why do people use information technology? A critical review of the technology acceptance model . Information & Management , 40 : 191 – 204 .
  • Lin , J. C. C. and Lu , H. 2000 . Towards an understanding of the behavioral intention to use a web site . International Journal of Information Management , 20 : 197 – 208 .
  • Liu , C. , Marchewka , J. T. , Lu , J. and Yu , C. 2005 . Beyond concern—A privacy-trust-behavioral intention model of electronic commerce . Information & Management , 42 : 289 – 304 .
  • Mathieson , K. 1991 . Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior . Information Systems Research , 2 ( 3 ) : 173 – 191 .
  • Microsoft (2009). Number of Microsoft Certified Professionals Worldwide, 2009. http://www.microsoft.com/learning/mcp/certified.mspx (http://www.microsoft.com/learning/mcp/certified.mspx)
  • Microsoft, (2008). http://www.microsoft.com/windowsserver2003/evaluation/overview/technologies/activedirectory.mspx (http://www.microsoft.com/windowsserver2003/evaluation/overview/technologies/activedirectory.mspx)
  • Moore , G. and I. Benbasat , I. 1991 . Adoption of IT Innovation . Information Systems Research , 2 ( 3 ) : 192 – 222 .
  • Moon , J. W. and Kim , Y. G. 2001 . Extending the TAM for a world-wide-web context . Information & Management , 38 ( 4 ) : 217 – 30 .
  • Morgan , T. P. 2009 . Novell profits even as sales slide . Financial News. ,
  • Nah , F. , Tan , X. and Teh , S. 2004 . An empirical investigation on end-users’ acceptance of enterprise systems . Information Resources Management Journal , 17 ( 3 ) : 32 – 53 .
  • Neo , B. , Khoo , P. and S. Ang , S. 1994 . “ The adoption of trade net by the trading community: An empirical analysis ” . In Proc. ICIS’94 , 159 – 174 . ACM Press .
  • Novell Inc . 2000 . “ An installed base that's bigger than most countries ” . In Novell Netware 5.1 Administration , Provo , UT : Novell Press .
  • O'Cass , A. and T. French . 2003 . Adoption of web retailing by internet users . Journal of Retailing and Consumer Services , 10 ( 2 ) : 81 – 95 .
  • Olson , G. M. 1989 . “ The Nature of Group Work ” . In Annual Meeting of Human Factors Society Denver , CO
  • Orlikowski , W. J. 1993 . CASE tools as organizational change: Investigating incremental and radical changes in systems development . MIS Quarterly , 17 ( 3 ) : 309 – 340 .
  • Orlikowski , W. J. and Iacono , C. S. 2001 . Research commentary: Desperately seeking the ‘IT’ in IT research—A call to theorizing the IT artifact . Information Systems Research , 12 ( 2 ) : 121 – 134 .
  • Orlikowski , W. J. and Robey , D. 1991 . Information technology and the structuring of organizations . Information Systems Research , 2 ( 2 ) : 398 – 427 .
  • Parasuraman , A. 2000 . Technology readiness index (TRI): A multiple-item scale to measure readiness to embrace new technologies . Journal of Service Research , 2 ( 4 ) : 307 – 20 .
  • Ringle , C. M. , Wende , S. and Will , A. 2005 . Smart PLS , Edited by: Hamburg , U. O. Hamburg , , Germany : University of Hamburg .
  • Saadé , R. , Nebebe , F. and Tan , W. 2007 . Viability of the ‘technology acceptance model’ in multimedia learning environments: A comparative study . Interdisciplinary Journal of Knowledge and Learning Objects , 3 : 175 – 184 .
  • Sagiv , L. and Schwartz , S. H. 2000 . Values Priorities and Subjective Well-Being: Direct Relations and Congruity Effects . European Journal of Social Psychology , 30 : 177 – 198 .
  • Santos , J. 2003 . E-service quality . Managing Service Quality , 13 ( 3 ) : 233 – 46 .
  • Schneberger , S. , Pollard , C. and Watson , H. 2009 . Theories for academics and practitioners . Information Systems Management , 26 ( 1 ) : 52 – 60 .
  • Segars , A. H. and Grover , V. 1993 . Re-examining perceived ease of use and usefulness: A confirmatory factor analysis . MIS Quarterly , 7 ( 4 ) : 517 – 525 .
  • Sun , H. and Zhang , P. December 10–11 2004 . “ An empirical study of the roles of affective variables in user adoption of search engines ” . In Proceedings of the Third Annual Workshop on HCI Research in MIS December 10–11 , Washington , D.C
  • Tan , M. and Teo , T. S. H. 2000 . Factors influencing the adoption of internet banking . Journal of the Association for Information Systems , 1 ( 5 ) : 1 – 44 .
  • Taylor , S. and Todd , P. A. 1995a . Assessing IT usage: The role of prior experience . MIS Quarterly , 19 ( 2 ) : 561 – 570 .
  • Taylor , S. and Todd , P. A. 1995b . Understanding information technology usage: A test of competing models . Information Systems Research , 6 ( 2 ) : 144 – 176 .
  • Tektips.com, (2004). Novell certification and testing forum—Netware is dead? http://www.tek-tips.com/viewthread.cfm?qid=620628&page=1 (http://www.tek-tips.com/viewthread.cfm?qid=620628&page=1)
  • Thomson , M. E. and von Sonos , R. 1998 . Information security awareness: Educating our users effectively . Information Management and Computer Security , 6 ( 4 ) : 67 – 173 .
  • Tsai , P. , Compeau , D. and Meister , D. 2004 . “ On volunatariness ” . In Internal Report, Ivey Business School, The University of Western Ontario
  • Venkatesh , V. and Davis , F. D. 2000 . A theoretical extension of the technology acceptance model: Four longitudinal field studies . Management Science , 46 ( 2 ) : 186 – 204 .
  • Venkatesh , V. , Morris , M. G. and Davis , G. B. 2003 . User acceptance of information technology: Toward a unified view . MIS Quarterly , 27 ( 3 ) : 425 – 478 .
  • Warkentin , M. , Davis , K. and Bekkering , E. 2004 . Introducing the check-off password system (cops): An advancement in user authentication methods and information security . Journal of Organizational & End User Computing , 16 ( 3 ) : 41 – 58 .
  • Yi , M. Y. and Hwang , Y. 2003 . Predicting the use of web-based information systems: self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model . International Journal of Human-Computer Studies , 59 ( 4 ) : 431 – 449 .
  • Yu , J. , Ha , I. , Choi , M. and Rho , J. 2005 . Extending the TAM for a t-commerce . Information & Management , 42 ( 7 ) : 965 – 976 .
  • Zigurs , I. and Khazanchi , D. 2008 . From profiles to patterns: A new view of Task-fit . Information Systems Management , 25 ( 1 ) : 8 – 13 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.