|
1.亞洲電子支付使用(2017/02/23),https://money.udn.com/money/story/5613/2301643 2.「pay.taipei」智慧支付平台(2017/02/20),https://technews.tw/2017/02/20/pay-taipei/ 3.2015~2019年全球行動支付市場規模(2017/02/09),https://mic.iii.org.tw/IndustryObservations_PressRelease02.aspx?sqno=457 4.用心強化安全設計!行動支付的信任從來不是說說而已(2017/06/01),https://www.bnext.com.tw/article/44161/visa-secure-mobile-payment 5.行動支付安全嗎?見仁見智(2015/10/12),http://googlerconcert1.pixnet.net/blog/post/437775775-%E8%A1%8C%E5%8B%95%E6%94%AF%E4%BB%98%E5%AE%89%E5%85%A8%E5%97%8E%3F%E8%A6%8B%E4%BB%81%E8%A6%8B%E6%99%BA%21 6.【行動支付消費者調查】用戶消費仍「低頻小額」 業者不妨採合作策略,(2017/03/15)https://mic.iii.org.tw/IndustryObservations_PressRelease02.aspx?sqno=462 7.資策會FIND銀髮族的購物行為調查(2017/03/31), http://www.iii.org.tw/Press/NewsDtl.aspx?nsp_sqno=1917&fm_sqno=14 8.行動支付 保險創新的下一步!現代保險健康理財雜誌(2017/06/05),http://magazine.chinatimes.com/riskmanagement/20170605002303-300208 9.保險雲世代(2016/04/11),http://www.tw-insurance.info/article.cfm?ct=7790 10.行動支付大浪 市調有5大預言(2017/02/10),https://tw.appledaily.com/new/realtime/20170210/1052730/ 11.邱皓政(2003),量化研究與統計分析,五南圖書出版股份有限公司,臺北市。 12.Ajzen, I. and Fishbein, M. (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, pp. 53-89, Addison-Wesley, Reading, MA. 13.Al-Somali, S. A., Gholami, R. and Clegg, B. (2008), “An investigation into the acceptance of online banking in Saudi Arabia,” Technovation, Vol. 29, No. 2, pp. 130-141. 14.Amer, A. A. and Abdel Hafez, H. A. (2017), “Empirical investigation of M-Government adoption in Egypt,” Egyptian Computer Science, Vol. 41, No. 2, pp. 36-48. 15.Anderson, E. and Weitz, B. (1990), “Determinants of continuity in conventional industrial channel dyads,” Marketing Science, Vol. 8, No. 4, pp. 310-23. 16.Anderson, J. C. and Gerbing, D. W. (1988), “Structural equation modeling in practice: A review and recommended two-step approach,” Psychological Bulletin, Vol. 103, No. 3, pp. 411-423. 17.Antovski, L and Gusev, M. (2003), “M-Payments,” Proceedings of the 25th International Conference on Information Technology Interfaces, pp. 95-100, Cavtat, Croatia. 18.Avolio, B., Yammarino, F. J. and Bass, B. M. (1991), “Identifying common methods variance with data collected from a single source: An unresolved sticky issue,” Journal of Management, Vol. 17, No. 3, pp. 571-587. 19.Bagozzi, R. P. and Yi, Y. (1988), “On the evaluation of structural equation models,” Journal of the Academy of Marketing Science, Vol. 16, No. 1, pp. 74-94. 20.Baker, D. A. and Cromton, J. L. (2000), “Quality satisfaction and behavioral intentions.” Annals of Tourism Research, Vol. 27, No. 3, pp. 785-804. 21.Balasubramanian, S. (1997), Two essays in Direct Marketing, Ph. D. Dissertation, Yale University, New Haven, CT. 22.Bandura, A., Adams, N. E., Hardy, A. B. adn Howells, G. N. (1980), “Tests of the generality of self-efficacy theory,”Cognitive Therapy and Research, Vol. 4, No. 1, pp. 39-66. 23.Bhimani, A. (1996),“Securing the commercial internet,”Communications of the ACM, Vol. 39, No. 6, pp. 29-35. 24.Suh, B and Han, I. (2002), “Effect of trust on customer acceptance of Internet banking,”Electronic Commerce Research and Applications, Vol. 1 No.3-4. pp. 247-263. 25.Benassi, P. (1999). “Truste: An online privacy seal program,”Communication of the ACM, Vol. 42, No. 2, pp. 56-59. 26.Bentler, P. M. and Wu, E. J. C. (1993), EQS/Windows User Guide, BMDP Statistical Software, Los Angeles, CA. 27.Berry, L. L., Seiders, K. and Grewal, D. (2002), “Understanding service convenience,” Journal of Marketing, Vol. 66, No. 3, pp. 1-17. 28.Boon, S. D. and Holmes, J. G. (1991),“The dynamics of interpersonal trust: Resolving uncertainty in the face of risk”, In R. A. Hinde & J. Groebel (Eds.), Cooperation and prosocial behavior. UK:Cambridge, Cambridge University Press, pp. 190-211. 29.Bradley, R. V., Pridmore, J. L. and Byrd, T. A. (2006), “Information systems success in the context of different corporate cultural types: An empirical investigation,” Journal of Management Information Systems, Vol. 23, No. 2, pp. 267-294. 30.Brown, L. G. (1990), “Convenience in services marketing,” The Journal of Services Marketing, Vol. 4, No. 1, pp. 53-59. 31.Brown, S. A., Fuller, R. M. and Vician, C. (2004), “Who’s afraid of the virtual world? Anxiety and computermediated communication,” Journal of the Association for Information Systems, Vol. 5, No. 2, pp. 79-107. 32.Carter, L. and Campbell, R. (2012), “Internet Voting Usefulness: An Empirical Analysis of Trust, Convenience and Accessibility,” Journal of Organizational & End User Computing, Vol. 24, No. 3, pp. 1-17. 33.Chae, M., Kim, J., Kim, H. and Ryu, H. (2001), “Information quality for mobile internet services: A theoretical model with empirical validation,” Electronic Markets, Vol. 12, No. 1, pp. 38-46. 34.Chang, C. C., Yan, C. F. and Tseng, J. S. (2012), “Perceived convenience in an extendedtechnology acceptance model: Mobile technology and english learning forcollege students,”Australasian Journal of Educational Technology, Vol. 28, No. 5, pp. 809-826. 35.Chang, Y. F., Chen, C. S. and Zhou, H. (2009), “Smart phone for mobile commerce,”Computer Standards and Interfaces, Vol. 31, No. 4, pp. 740-747. 36.Chen, L., Gillenson, M. L. and Sherrell, D. L. (2002), “Enticing online consumers: An extended technology acceptance perspective,” Information and Management, Vol. 39, No. 8, pp. 705-709. 37.Chen, Y. H. and Barnes, S. (2007), “Initial trust and online buyer behavior,” Industrial Management and Data Systems, Vol. 107, No. 1, pp. 21-36. 38.Cheng, T. C. E., Lam, D, Y. C. and Yeung, A. C. L. (2006), “Adoption of internet banking: an empirical study in Hong Kong,” Decis Support Syst, Vol. 42, No. 3, pp. 1558-1572. 39.Cho, V., Cheng, T. C. E. and Lai, W. M. J. (2009), “The role of perceived user-interface design in continued usage intention of self-paced e-learning tools,” Computers & Education, Vol. 53, No. 2, pp. 216-227. 40.Chuttur, M. Y. (2009), “Overview of the technology acceptance model: Origins, developments and future directions,” Sprouts: Working papers on information systems, Vol. 9, No. 37, pp. 9-37. 41.Dahlberg, T., Mallat, N., Ondrus, J. and Zmijewska, A. (2008), “Past, present and future of mobile payments research: A literature review,” Electronic Commerce Research and Applications, Vol. 7, No. 2, pp. 165-181. 42.Damghanian, H., Zarei, A. and Siahsarani Kojuri, M. A. (2016), “Impact of perceived security on trust, perceived risk, and acceptance of online banking in Iran,” Journal of Internet Commerce, Vol. 15, No. 3, pp. 214-238. 43.Davis, F. D. (1986), “A technology acceptance model for empirically testing new end-user information systems: Theory and results,” Ph. D. Dissertation, Sloan School of Management, Massachusetts Institute of Technology, Cambridge, MA. 44.Davis, F. D. (1989), “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” Management Information Systems Quarterly, Vol. 13, No. 3, pp. 319-340. 45.Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. (1989), “User acceptance of computer echnology: A comparison of two theoretical models,” Management Science, Vol. 35, No. 8, pp. 982-1003. 46.Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. (1992), “Extrinsic and intrinsic motivation to use computers in the workplace”, Journal of Applied Social Psychology, Vol. 22, No. 14, pp. 1111-1132. 47.DeLone, W. H. and McLean, E. R. (2003), “The DeLone and McLean model of information systems success: A ten-year update,” Journal of Management Information Systems, Vol. 19, No. 4, pp. 9-30. 48.DeLone, W. H. and E. R. McLean. (1992), “Information systems success: The quest for the dependent variable,” Information Systems Research, Vol. 3, No. 1. pp. 60-95. 49.Dimitriadis, S. (2010), “Testing perceived relational benefits as satisfaction and behavioral outcomes drivers,” International Journal of Bank Marketing, Vol. 28, No. 4, pp. 297-313. 50.Eppler, M. and Muenzenmayer, P. (2002), “Measuring information quality in the web context: A survey of state-of-the-art instruments and an application methodology,” Proceedings of 7th International Conference on Information Quality, pp.187-196. 51.Ervasti, M. and Helaakoski, H. (2010), “Case study of application-based mobile service acceptance and development in Finland,” International Journal of Information Technology and Management, Vol. 9, No. 3, pp. 243-259. 52.Finn, A. (2011), “Investigating the non-linear effects of e-service quality dimensions on customer satisfaction,” Journal of Retailing and Consumer Services, Vol. 18, No. 1, pp. 27-37. 53.Fornell, C. and Larcker, D. F. (1981), “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50. 54.Gao, L. and Waechter, K (2017), “Examining the role of initial trust in user adoption of mobile payment services: An empirical investigation,” Information Systems Frontiers, Vol. 19, No. 3, pp. 525-548. 55.Gaski, J. F. and Nevin, J. R. (1985), “The differential effects of exercised and unexercised power sources in a marketing channel,” Journal of Marketing Research, Vol. 22, No. 2, pp. 130-142. 56.Gefen, D. (2003), “TAM or just plain habit: A look at experienced online shoppers,” Journal of End User Computing, Vol. 15 No. 3, pp. 1-13. 57.Gefen, D., Karahanna, E. and Straub, D. W. (2003), “Trust and TAM in online shopping: An integrated model,” Management Information Systems Quarterly, Vol. 27, No. 1, pp. 51-90. 58.Ghosh, A. K. and Swaminatha, T. M. (2001), “Software Security and Privacy Risks in Mobile E-Commerce,”Communications of the ACM, Vol. 44, No. 2, pp. 51-57. 59.Grazioli, S. and Jarvenpaa, S. L. (2000), “Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers,” IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Vol. 30, No. 4, pp. 395-410. 60.Gupta, S. and Kim, H. W. (2007), “The moderating effect of transaction experience on the decision calculus in on-line repurchase.” International Journal of Electronic Commerce, Vol. 12, No. 1, pp. 127-158. 61.Hair, J. F. Jr., Black, W. C., Babin, B. J. and Anderson, R. E. (2010), Multivariate Data Analysis (7^th Ed.), Prentice-Hall, Inc., Upper Saddle River, NJ. 62.Halonen, T. and Virtanen, T. (2002), “A system for secure mobile payment transactions,” The International Federation for Information Processing book, Vol. 95. No. 1. pp. 157-170. 63.Hernández, B., Jiménez, J. and Martín, M. J. (2010), “Customer behavior in electronic commerce: The moderating effect of e-purchasing experience,” Journal of Business Research, Vol. 63, No. 9/10, pp. 964-971. 64.Hewson, C., Yule, P., Laurent, D. and Vogel, C. (2003), Internet Research Methods: A Practical Guide for the Social and Behavioural Sciences, Sage, London, UK. 65.Hossain, M. M. and Prybutok, V. R. (2008), “Consumer acceptance of RFID technology: An exploratory study,” IEEE Transactions on Engineering Management, Vol. 55, No. 2, pp. 316-328. 66.Hsu, C.L. and Lu, H.P. (2004), “Why do people play online games? An extended TAM with social influences and flow experience,” Information and Management, Vol. 41, No. 7, pp. 853-868. 67.Hulland, J. (1999), “Use of partial least squares in strategic management research: A review of four recent studies,” Strategic Management Journal, Vol. 20, No. 2, pp. 195-204. 68.Jöreskog, K. G. and Sörbom, D. S. (1993), LISREL 8, A Guide to the Program and Application, SPSS Inc., Chicago, IL. 69.Karjaluoto, H. and Leppäniemi, M. (2013), “Social Identity for Teenagers: Understanding behavioral intention to participate in virtual world environment,” Journal of Theoretical & Applied Electronic Commerce Research, Vol. 8, No. 1, pp. 1-16. 70.Keen, P. G. W. (1997), “Are You Ready for Trust Economy?” Computerworld, Vol. 31, No. 16, pp. 80-81. 71.Kim, C., Oh, E., Shin, N. and Chae, M. (2009), “An empirical investigation of factors affecting ubiquitous computing use and U-business value,” International Journal of Information Management, Vol. 29, No. 6, pp.436-448. 72.Kim, H. and Niehm, L. S. (2009), “The impact of website quality on information quality, value, and loyalty intentions in apparel retailing”, Journal of Interactive Marketing, Vol. 23, No. 3, pp. 221-233. 73.Kini, A. and Choobineh, J. (1998), “Trust in Elec-tronic Commerce, Definition and Theo-retical Considerations,” IEEE Proceedings of the 31st Hawaii International Conference on System Science, Vol. 4, pp. 51-61, 1998. 74.Kotler, P. (2003), Marketing Management (〖11〗^th Ed.), Prentice-Hall Inc., New York, NY. 75.Kotler, P. and Gary, A. (1996). Pronciples o f Marketing (7^th Ed.), Englewood, prentice Hall. NJ. 76.Lee, M. K. O. and Turban, E. (2001), “A trust model for consumer internet shopping,” International Journal of Electronic Commerce, Vol. 61, No. 1, pp. 75-91. 77.Lee, M. K. O., Cheung, C. M. K. and Chen, Z. (2005), “Acceptance of internet-based learning medium: The role of extrinsic and intrinsic motivation,” Information & Management, Vol. 42, 8, pp. 1095-1104. 78.Lee, Y. C. (2006), “An empirical investigation into factors influencing the adoption of an e-learning system,” Online Information Review, Vol. 30, No. 5, pp. 517-541. 79.Legris, P., Ingham, J. and Collerette, P. (2003), “Why do people use information technology? A critical review of the technology acceptance model,”Information and Management,”Vol. 40, No. 3, pp. 191-204. 80.Lin, H. F. (2007), “The role of online and offline features in sustaining virtual communities: An empirical study,” Internet Research, Vol. 17, No. 2, pp. 119-138. 81.Lin, H. F. (2008), “Determinants of successful virtual communities: Contributions from system characteristics and social factors,” Information & Management, Vol. 45, No. 8, pp. 522-527. 82.Lin, K. Y. and Lu, H. P. (2015), “Predicting mobile social network acceptance based onmobile value and social influence,” Internet Research, Vol. 25, No. 1, pp. 107-130. 83.Lone, W. H. and E. R. McLean. (1992), “Information systems success: The quest for the dependent variable,” Information Systems Research, Vol.3, No. 1, pp. 60-95. 84.Lorenzo-Romero, C. and Del Chiappa, G. (2013), “Adoption of social networking sites by Italian,” Information Systems and e-Business Management, Vol. 12, No. 2, pp. 165-187. 85.Lu, Y., Deng, Z. and Wang, B. (2010), “Exploring factors affecting Chinese consumers’ usage of short message service for personal communication,” Information Systems Journal, Vol. 20, No. 2, pp.183-208. 86.Lu. Y., Lu Y., Wang, B., Pan, Z. and Qin, H. (2015), “Acceptance of government-sponsored agricultural information systems in China: The role of government social power,” Information Systems and e-Business Management, Vol. 13, No. 2, pp. 329-354. 87.Mayer, R. C., Davis, J. h. and Schoorman, F. D. (1995), “An integrative model of organiza-tional trust,” Academy of Management Review, Vol. 20, No. 3, pp. 709-733. 88.McCallum, J., Simons, L., Simons, J. and Friedlander, Y. (1994), “Low serum cholesterol is not associated with depression in the elderly: Data from an Australian community study,” Australian and New Zealand Journal of Medicine, Vol. 24, No. 5, pp. 561-564. 89.McKinney, V., Yoon, K. and Zahedi, F. M. (2002), “The measurement of web-customer Satisfaction: An expectation and disconfirmation approach,” Information Systems Research, Vol. 13. No. 3, pp. 296-315. 90.McKnight, D. H. and Chervany, N. L. (2002), “What trust means in E-commerce customer relationships: An interdisciplinary conceptual typology,” International Journal of Electronic Commerce, Vol. 6, No. 2, pp. 35-59. 91.McKnight, D. H., Cummings, L. L. and Chervany, N. L. (1998), “Initial trust formation in new organizational relationships,” Academy of Management Review, Vol. 23, No. 3, pp. 473-490. 92.McKnight, D. H., Lankton, N., Nicolaou, A. and Price, J. (2017) “Distinguishing the effects of B2B information quality, system quality, and service outcome quality on trust and distrust,” The Journal of Strategic Information Systems, Vol. 26, No. 2, pp. 118-141. 93.Meharia, P. (2012),“Assurance on the reliability of mobile payment system and its effects on its’ use: An empirical examination,”Accounting and Management Information Systems, Vol. 11, No. 1, pp. 97-111. 94.Moorman, C., Deshpande, R. and Zaltman, G. (1993), “Factors affecting trust in market research relationships,” Journal of Marketing, Vol. 57, No. 1, pp. 81-101. 95.Mossholder, K. W., Bennett, N., Kemery, E. R. and Wesolowski, M. A. (1998), “Relationships between bases of power and work reactions: The mediational role of procedural justice,” Journal of Management, Vol. 24, No. 4, pp. 533-552. 96.Nelson, R. R., Todd, R. A. and Wixom, B. H. (2005), “Antecedents of information and system quality: An empirical examination within the context of data warehousing,” Journal of Management Information Systems,Vol. 21, No. 4, pp. 199-235. 97.Ngai, E. W. T., Poon, J. K. L. and Chan, Y. H. C. (2007), “Empirical examination of the adoption of WebCT using TAM, ” Computers and Education, Vol. 48, No. 2, pp. 250-267. 98.Nikou, S. A. and Economides, A. A. (2017), “Mobile-based assessment: Investigating the factors that influence behavioral intention to use,” Computers & Education, Vol. 109, p56-73. 99.Mills, A. J. and Plangger, K. (2015),“Social media strategy for online service brands,” The Service Industries Journal, Vol. 35, No. 10, pp. 521-536. 100.Nunnally, J. C. (1978), Psychometric Theory (2^th Ed.), McGraw-Hill, New York, NY. 101.Ong, C. S., Lai, J. Y. and Wang, Y. S. (2004), “Factors affecting engineers’ acceptance of asynchronous e-learning systems in high-tech companies”, Information and Management, Vol. 41, pp. 795-804. 102.Ozkan, S., Bindusara, G. and Hackney, R. (2010), “Facilitating the adoption of e-payment systems: Theoretical constructs and empirical analysis,” Journal of Enterprise Information Management, Vol. 23, No. 3. pp. 305-325. 103.Ozturk, A. B., Bilgihan, A., Nusair, K. and Okumus, F. (2016), “What keeps the mobile hotel booking users loyal? Investigating the roles of self-efficacy, compatibility, perceived ease of use, and perceived convenience,” International Journal of Information Management, Vol. 36, No. 6, pp. 1350-1359. 104.Pal., D., Vanijjab, V. and Papasratornc, B. (2015), “An Empirical analysis towards the adoption of NFC mobile payment system by the end user,” Procedia Computer Science, Vol. 69, No. 1, pp. 13-25 105.Pavlou, P. A. (2003), “Consumer acceptance of electronic commerce: Integrating trust and risk with the Technology Acceptance Model,” International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 101-134. 106.Pavlou, P. A. and Fygenson, M. (2006), “Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior,” Management Information Systems Quarterly, Vol. 30, No. 1, pp. 115-143. 107.Pintrich, P. R. (2000), “Multiple goals, multiple pathways: The role of goal orientation in learning and achievement,” Journal of Educational Psychology, Vol. 92, No. 3, pp. 544-555. 108.Pituch, K. A. and Lee, Y. K. (2006), “The influence of system characteristics on e-learning use,” Computers & Education, Vol. 47, No. 2, pp. 222-244. 109.Podsakoff, P. M. and Organ, D. W. (1986), “Self reports in organizational research: Problems and prospects,” Journal of Management, Vol. 12, No. 4, pp. 531-544. 110.Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y. and Podsakoff, N. P. (2003), “Common method viases in behavioral research: A critical review of the literature and recommened remedies,” Journal of Applied Psychology, Vol. 88, No. 5, pp. 879-903. 111.Rai, A., Lang, S. and Welker, R. (2002), “Assessing the validity of IS success models: An empirical test and theoretical analysis,” Information Systems Research, Vol. 13, No. 1, pp. 50-69. 112.Ramos-de-Luna, I. and Montoro-Ríos, F. (2016), “Determinants of the intention to use NFC technology as a payment system: An acceptance model approach,” Information Systems & e-Business Management, Vol. 14, No. 2, pp. 293-314. 113.Reichheld, F. F. and Schefter, P. (2000), “Your secret weapon on the web,” Harvard Business Review, Vol. 78, No. 4, pp. 105-113. 114.Roca, J. C., Chiu, C. M. and Marti´nez, F. J. (2006), “Understanding e-learning continuance intention: An extension of the technology acceptance model,” International Journal of Human- Computer Studies, Vol. 64, No. 8, pp. 683-696. 115.Rossiter, J. R. (2003) “How to construct a test of scientific knowledge in consumer behavior.” Journal of Consumer Research, Vol. 30, No. 2, pp. 305-310. 116.Schiaffino, S. and Amandia, Q. (2004),“User-interface agent interaction:Personalization issues,”International Journal of Human-Computer Studies, Vol. 60, No. 1, pp. 129-148. 117.Schiffman, L. G. and Kanuk, L. L. (1991), Consumer Behavior (2^nd Ed.), pp. 4-10. Upper Saddle River, NJ: Prentice Hall. 118.Schlosser, A. E. (2003), “Experiencing products in the virtual world: The role of goal and imagery in influencing attitudes versus purchase intentions,” Journal of Consumer Research, Vol. 30, No. 2, pp. 184-198. 119.Seddon. P. B. (1997), “A respecification and extension of the DeLone and McLean Model of Is Success,” Information Systems Research, Vol. 8, No. 3, pp. 240-253. 120.Shrigley, R. L. (1990), “Attitude and behavior are correlates,” Journal of Research in Science Teaching, Vol. 27, No.2, pp. 97-113. 121.Suh, B. and Han, I. (2002), “Effect of trust on customer acceptance of Internet banking,” Electronic Commerce Research and Applications, Vol. 1, No.3-4, pp. 247-263. 122.Suh, B. and Han, I. (2003), “The Impact of customer trust and perception of security control on the acceptance of electronic commerce,” International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 135-161.. 123.Szymanski, D. M. and Hise, R. T. (2000), “e-Satisfaction: An initial examination” Journal of Retailing, Vol. 76, No. 3, pp. 309-322. 124.Tang, L. L and Nguyen T. H. H. (2013), “Common causes of trust, Satisfaction and TAM in online shopping: An integrated model,” Journal of Quality, Vol. 20, No. 5 pp. 483-500. 125.Tarhini, A., Arachchilage, N.A.G. and Abbasi, M.S. (2015), “A critical review of theories and models of technology adoption and acceptance in information system research,” International Journal of Technology Diffusion, Vol. 6, No. 4, pp. 58-77. 126.Taylor, S. and Todd, P.A. (1995), “Understanding information technology usage: A test of competing models,” Information Systems Research, Vol. 6, No. 2, pp. 144-176. 127.Triandis, H. C. (1979), “Values, Attitudes, and Interpersonal Behavior,” in Nebraska Symposium on Motivation, H. E. How, Jr. (ed.), pp. 195-259, University of Nebraska Press, Lincoln, NE. 128.Tsai, H. T., Huang, H. C., Jaw, T. I. and Chen, W. K. (2006), “Why on-line customers remain with a particular e-retailer: An integrative model and empirical evidence,” Psychology and Marketing, Vol. 23, No. 5, pp. 447-464. 129.Tung, F. C. and Chang, S. C. (2008), “Nursing students’ behavioral intention to use online courses: A questionnaire survey,” International Journal of Nursing Studies, Vol. 45, No. 9, pp. 1299-1309. 130.Van der heijden, H. (2002), “Factors Affecting the Successful Introduction of Mobile Payment Systems,” Proceedings of the 15th Bled Electronic Commerce Conference. pp. 430-443. 131.Venkatesh, V. and Davis, F.D. (2000), “A theoretical extension of the technology acceptance model: four longitudinal field studies”, Management Science, Vol. 46, No. 2, pp. 186-204. 132.Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D. (2003), “User acceptance of information technology: Toward a unified view,” Management Information Systems Quarterly, Vol. 27, No. 3, pp. 425-478. 133.Venkatesh, V. (2000), “Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model,” Information Systems Research, Vol. 11, No.4, pp. 342-365. 134.Viehland, D. and Leong, R S Y. (2007), “Acceptance and use of mobile payments,” Proceedings of the 18th Australasian Conference on Information Systems, Toowoomba. 135.Walters, C. G. (1978), Consumer Behavior: Theory and Practice, (3rd Ed.). Homewood, IL:Richard D. Irwin, Inc 136.Walton, G., Childs, S. and Blenkinsopp, E. (2005), “Using mobile technologies to give health students access to learning resources in the UK community setting,” Health Information and Libraries Journal, Vol. 22, No.2, pp. 51-65. 137.Wambaa, S. F., Bhattacharyab, M., Trincherac, L. and Ngai. E. W. T. (2017), “Role of intrinsic and extrinsic factors in user social media acceptancewithin workspace: Assessing unobserved heterogeneity” International Journal of Information Management, Vol. 37, No. 2, pp. 1-13. 138.Wilkerson, G. L., Bennett L. T. and Oliver K. M. (1997), “Evaluation criteria and indicators of quality for internet resources,” Educational Technology, Vol. 37, No. 3, pp. 52-58. 139.Wu, J. J., Chen, Y. H. and Chungc, Y. S. (2010), “Trust factors influencing virtual community members: A study of transaction communities,” Journal of Business Research, Vol. 63, Nol. 9/10, pp. 1025-1032. 140.Yang, S., Lu, Y., Gupta, S., Cao, Y. and Zhang, R. (2012), “Mobile payment services adoption across time: An empirical study of the effects of behavioral beliefs, social influences, and personal traits,” Computers in Human Behavior, Vol. 28, No. 1, pp. 129-142. 141.Yeh, Y. H. and Choi, S. M. (2011), “MINI-lovers, maxi-mouths: An investigation of antecedents to eWOM intention among brand community members,” Journal of Marketing Communications, Vol. 17, No. 3, pp. 145-162. 142.Yoon, C. and Kim, S. (2007), “Convenience and TAM in a ubiquitous computing environment: The case of wireless LAN,” Electronic Commerce Research and Applications, Vol. 6, No. 1, pp.102-112. 143.Yousafzai, S., Pallister, J. and Foxall, G. (2009), “Multi-dimensional Role of Trust in Internet Banking Adoption,” The Service Industries Journal, Vol. 29, No. 5, pp. 591-605.
|