Access the full text.
Sign up today, get DeepDyve free for 14 days.
I. Ajzen (1991)
The theory of planned behaviorOrganizational Behavior and Human Decision Processes, 50
D. Hoffman, T. Novak, M. Peralta (1999)
Building consumer trust onlineCommun. ACM, 42
Huaiqing Wang, Matthew Lee, Chen Wang (1998)
Consumer privacy concerns about Internet marketingCommun. ACM, 41
D. McKnight, L. Cummings, N. Chervany (1998)
Initial Trust Formation in New Organizational RelationshipsAcademy of Management Review, 23
A. Aldridge, Michele White, K. Forcht (1997)
Security considerations of doing business via the Internet: cautions to be consideredInternet Res., 7
H. Triandis (1980)
Values, attitudes, and interpersonal behavior.Nebraska Symposium on Motivation. Nebraska Symposium on Motivation, 27
Joseph Jones, L. Vijayasarathy (1998)
Internet consumer catalog shopping: findings from an exploratory study and directions for future researchInternet Res., 8
Deborah Compeau, C. Higgins (1995)
Application of Social Cognitive Theory to Training for Computer SkillsInf. Syst. Res., 6
V. Swaminathan, Elzbieta Lepkowska-White, Bharat Rao (2006)
Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic ExchangeJ. Comput. Mediat. Commun., 5
Deborah Compeau, C. Higgins, S. Huff (1999)
Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal StudyMIS Q., 23
A. Bandura (1977)
Self-efficacy: toward a unifying theory of behavioral change.Psychological review, 84 2
D. Harrison, Peter Mykytyn, Cynthia Riemenschneider (1997)
Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical TestsInf. Syst. Res., 8
Kieran Mathieson (1991)
Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned BehaviorInf. Syst. Res., 2
Fred Davis (1989)
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information TechnologyMIS Q., 13
V. Venkatesh (2000)
Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance ModelInf. Syst. Res., 11
Pauline Ratnasingham (1998)
The importance of trust in electronic commerceInternet Res., 8
V. Venkatesh, Fred Davis (1996)
A Model of the Antecedents of Perceived Ease of Use: Development and Test†Decision Sciences, 27
D. McKnight, L. Cummings, N. Chervany (1998)
Initial trust formation in new organizational relationships, Academy of Management Review, , ., 23
Shirley Taylor, P. Todd (1995)
Understanding Information Technology Usage: A Test of Competing ModelsInf. Syst. Res., 6
W.W Chin
The partial least squares approach to structural equation modeling
Ronald Thompson, C. Higgins, Jane Howell (1991)
Personal Computing: Toward a Conceptual Model of UtilizationMIS Q., 15
I. Ajzen, M. Fishbein (1980)
Understanding Attitudes and Predicting Social Behavior
K. Byford (1998)
Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic Communications EnvironmentRutgers Computer and Technology Law Journal, 24
Bernadette Szajna (1996)
Empirical evaluation of the revised technology acceptance modelManagement Science, 42
Better Business Bureau
Third‐party assurance boosts online purchasing
Shirley Taylor, P. Todd (1995)
Assessing IT usage: the role of prior experienceManagement Information Systems Quarterly, 19
I. Ajzen (1985)
From Intentions to Actions: A Theory of Planned Behavior
Using the theory of planned behavior as the theoretical base, data collected through a semi-annual survey of Web users were used to determine if beliefs about privacy and Internet trustworthiness helped determine attitudes towards the Internet, which were thought to affect intent to make Internet purchases. Intent, in turn, was thought to affect actual purchasing behavior. Taking Internet experience into account, general support for the model was found.
Internet Research – Emerald Publishing
Published: May 1, 2002
Keywords: Retailing; Management theory; Privacy; Trust
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.