|
Adams, S. A., “Blog-based applications and health information: Two case studies that illustrate important questions for Consumer Health Informatics (CHI) research,” International Journal of Medical Informatics, Vol. 79, No. 6, pp. 89-96 (2008) Agarwal, R. and Prasad, J., “Are individual differences germane to the acceptance of new information technologies?” Decision Sciences, Vol. 30, No. 2, pp. 361-391 (1999) Ahn, T., Ryu, S., and Han, I., “The impact of the online and offline features on the user acceptance of Internet shopping malls,” Electronic commerce Research and Applications, Vol. 3, No. 4, pp. 405-420 (2004) Ajzen, I. and Fishbein, M., Understanding attitudes and predicting social behavior, Englewood Cliffs, NJ: Prentice-Hall. (1980). Ajzen, I., “The theory of planned behavior,” Organizational Behavior and Human Decision Process, Vol. 50, No. 2, pp. 179-211 (1991) Aladwani, A. M. and Palvia, P. C., “Developing and validating an instrument for measuring user-perceived web quality,” Information & Management, Vol. 39, No. 6, pp. 467-476 (2002) Algesheimer R., Dholakia, U. M., and Herrmann A., “The Social Influence of Brand Community: Evidence from European Car Clubs,” Journal of Marketing, Vol. 69, No. 3, pp.19-34 (2005) Allen, J. P., “The evolution of new mobile applications: A sociotechnical perspective,” International Journal of Electronic Commerce, Vol. 8, No. 1, pp. 23-36 (2003) Amichai-Hamburger, Y., Kaynar, O., and Fine, A., “The effects of need for cognition on Internet use,” Computers in Human Behavior, Vol. 23, No. 1, pp. 880-891 (2007) Anderson, J. and Lee, R., “The future of social relations,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2010/The-future-of-social-relations.aspx (2010) Arnold, J., Chittenden, L., Ellis, K. D., Eubanks, J., Godwin, I., McDonald, E., Morris, S. E., Ovadia, S., Shrode, F., and Teplitzky, S., “What’s the Ballyhoo about Blogs?” Serials Review, Vol. 33, No. 3, pp. 175-187 (2007) Asch, S. E., “Forming impressions of personality,” Journal of Abnormal and Social Psychology, Vol. 41, No. 3, pp. 258-290 (1946). Association of College & Research Libraries (ACRL), “Information literacy competency standards for higher education,” retrieved from http://www.ala.org/ala/mgrps/divs/acrl/standards/informationliteracycompetency.cfm (2000) Bandura, A., “Organizational application of social cognitive theory,” Australian Journal of Management, Vol. 13, No. 2, pp. 275-302 (1988) Bandura, A., Social foundations of thought and action: A social cognitive theory, Prentice-Hall, Englewood Cliffs, NJ. (1986) Baumgartner, H. and Homburg, C., “Applications of structural equation modeling in marketing and consumer research: A review,” International Journal of Research in Marketing, Vol. 13, No. 2, pp. 139-161 (1996) Behrens, S., “A conceptual analysis and historical overview of information literacy,” College and Research Libraries, Vol. 55, No. 4, pp. 309-322 (1994) Bentler, P. M. and Bonett, D. G., “Significance tests and goodness-of-fit in the analysis of covariance structures,” Psychological Bulletin, Vol. 88, No, 3, pp. 588-606 (1980) Bhatnagar, A. and Ghose, S., “An analysis of frequency and duration of search on the Internet,” Journal of Business, Vol. 77, No. 2, pp. 311-330 (2004) Blau, P, Exchange and power in social life, New York: Wiley. (1964) Bostrom, R. P. and Heinen, J. S., “MIS problems and failures: A socio-technical perspective. Part I: The causes,” MIS Quarterly, Vol. 1, No. 3, pp. 17-32 (1977a) Bostrom, R. P. and Heinen, J. S., “MIS problems and failures: A socio-technical perspective. Part II: The application of socio-technical theory,” MIS Quarterly, Vol. 1, No. 4, pp. 11-28 (1977b) Browne, M. W. and Cudeck, R., “Alternative ways of assessing model fit,” In Bollen, K. A. and Long, J. S. (Eds.), Testing structural equation models, Newbury Park, CA: Sage, pp. 136-162 (1993) Butcher, K. J., “Differential impact of social influence in the hospitality encounter,” International Journal of Contemporary Hospitality Management, Vol. 17, No. 2, pp. 125-135 (2004) Cacioppo, J. T. and Petty, R. E., “The need for cognition,” Journal of Personality and Social Psychology, Vol. 42, No. 1, pp. 116-131 (1982) Cacioppo, J. T., Petty, R. E., and Kao, C. F., “The efficient assessment of need for cognition,” Journal of Personality Assessment, Vol. 48, No. 3, pp. 306-307 (1984) Cameron, A. F. and Webster, J., “Unintended consequences of emerging communication technologies: instant messaging in the workplace,” Computers in Human Behavior, Vol. 21, No. 1, pp. 85-103 (2005) Casaló, L., Flavián, C., and Guinalíu, M., “The role of perceived usability, reputation, satisfaction and consumer familiarity on the website loyalty formation process,” Computers in Human Behavior, Vol. 24, No. 2, pp. 325-345 (2008) Castelluccio, M., “E-mail in real time,” Strategic Finance, Vol. 81, No. 3, pp. 34–37 (1999). Chatterjee, S., Kang, Y. S., and Mishra, D. P., “Market signals and relative preference: the moderating effects of conflicting information, decision focus, and need for cognition,” Journal of Business Research, Vol. 58, No. 10, pp. 1362-1370 (2005) Chau, M. and Xu, J., “Mining communities and their relationships in blogs: A study of online hate groups,” International Journal of Human-Computer Studies, Vol. 65, No. 1, pp. 57-70 (2007) Chau, P. Y., “An empirical assessment of a modified technology acceptance model,” Journal of Management Information Systems, Vol. 13, No. 2, pp. 185-204 (1996) Chiu, C. M., Hsu, M. H., and Wang, E. T. G., “Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories,” Decision Support Systems, Vol. 42, No. 3, pp. 1872-1888 (2006) Clark, I., “Information literacy and the writing center,” Computers and Composition, Vol. 12, No. 2, pp. 203-209 (1995) Corrall, S., “Information literacy strategy development in higher education: An exploratory study,” International Journal of Information Management, Vol. 28, No. 1, pp. 26-37 (2008) Cyr, D., Hassanein, K., Head, M., and Ivanov, A., “The role of social presence in establishing loyalty in e-Service environments,” Interaction with Computers, Vol. 19, No. 1, pp. 43-56 (2007) Cyr, D., Head, M., and Ivanov, A., “Design aesthetics leading to m-loyalty in mobile commerce,” Information & Management, Vol. 43, No. 8, pp. 950-963 (2006) Dai, D. Y. and Wang, X., “The role of need for cognition and reader beliefs in text comprehension and interest development,” Contemporary Educational Psychology, Vol. 32, No. 3, pp. 332-347 (2007) Danaher, P. J., Mullarkey, G. W., and Essegaier, S., “Factors affecting Web site visit duration: A cross-domain analysis,” Journal of Marketing Research, Vol. 43, No. 2, pp. 182-194 (2006) Davis, F. D., “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, Vol. 13, No. 3, pp. 319-337 (1989) Davis, F. D., Bagozzi, R. P., and Warshaw, P. R., “Extrinsic and intrinsic motivation to use computers in the workplace,” Journal of Applied Social Psychology, Vol. 22, No. 14, pp. 1111-1132 (1992) Dawes, J., “Do data characteristics change according to the number of scale points used? An experiment using 5-point, 7-point and 10-point scales,” International Journal of Market Research, Vol. 50, No. 1, pp. 61-77 (2008) DeLone, W. H. and McLean, E. R., “Information Systems Success Revisited,” Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS 02), Big Island, Hawaii, pp. 238-249 (2002) DeLone, W. H. and McLean, E. R., “Information Systems Success: The Quest for the Dependent Variable,” Information Systems Research, Vol. 3, No. 1, pp. 60-95 (1992) DeLone, W. H. and McLean, E. R., “The DeLone and McLean Model of Information Systems Success: A Ten-Year Update,” Journal of Management Information Systems, Vol. 19, No. 4, pp. 9-30 (2003) Dickey, M. D., “The impact of web-logs (blogs) on student perceptions of isolation and alienation in a web-based distance-learning environment,” Open Learning, Vol. 19, No. 3, pp. 279-291 (2004) Dickinger, A., Arami, M., and Meyer, D., “The role of perceived enjoyment and social norm in the adoption of technology with network externalities,” European Journal of Information Systems, Vol. 17, No. 1, pp. 4-11 (2008) Du, H. S. and Wagner, C., “Weblog success: Exploring the role of technology,” International Journal of Human-Computer Studies, Vol. 64, No. 9, pp. 789-798 (2006) Faulhabor, G., “Network effects and merger analysis: instant messaging and the AOL–Time Warner case,” Telecommunications Policy, Vol. 26, No.5-6, pp. 311-333 (2002) Ferguson, K. M., “Social capital and children’s wellbeing: a critical synthesis of the international social capital literature,” International Journal of Social Welfare, Vol. 15, No. 1, pp. 2-18 (2006) Fishbein, M. and Ajzen, I., Belief, attitude, intention, and behavior: An introduction to theory and research, Reading, MA: Addison-Wesley. (1975) Fishbein, M. and Ajzen, I., Understanding Attitude and Predicting Social Behavior, Prentice-Hall, Englewod Cliffs, NJ. (1980) Flavián, C., Guinalíu, M., and Gurrea, R., “The role played by perceived usability, satisfaction and consumer trust on website loyalty,” Information & Management, Vol. 43, No. 1, pp. 1-14 (2006) Fong, A. C. M., Lau, C. T., and Hui, S. C., “Towards an open protocol for secure online presence notification,” Computer Standards and Interfaces, Vol. 23, No. 4, pp. 311-324 (2001) Fornell, C. and Larcker, D. F., “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50 (1981) Fornell, C., “A second generation of multivariate analysis: classification of methods and implications for marketing research,” In Houston, M. J. (Ed.), American Marketing Association, Chicago, Illinois, pp.407-450 (1987) Freeman, L. C., “Centrality in Social Networks: Conceptual clarification,” Social Networks, Vol. 1, No. 3, pp. 215-239 (1979) Fulk, J., “Social construction of communication technology,” Academy of Management Journal, Vol. 36, No. 5, pp. 921-950 (1993) Fulk, J., Schmitz, J., and Steinfield, C. W., “A social influence model of technology use,” In Fulk, J. and Steinfield, C. W. (Eds.), Organizations and communication technology, Newbury Park, CA: Sage, pp.117-140 (1990) Fulk, J., Steinfield, C. W., Schmitz, J. A., and Power, J. G., “Social information processing model of media use in organizations,” Communication Research, Vol. 14, No. 5, pp. 529-552 (1987) Gefen, D. and Straub, D., “Gender differences in the perception and use of e-mail: An extension to the technology acceptance model,” MIS Quarterly, Vol. 21, No.4, pp. 389–400 (1997) Goldman, R. H., Cohen, A., and Sheahan, F., “Using seminar blogs to enhance student participation and leaning in public health school classes,” American Journal of Public Health, Vol. 98, No. 9, pp. 1658-1663 (2008) Granovetter, M., “The strength of weak ties,” The American Journal of Sociology, Vol. 78, No. 6, pp.1360-1380 (1973) Granovetter, M., “The strength of weak ties: a network theory revisited,” In Marsden, P. V. and Lin, N. (Eds.), Social Structure and Network Analysis, Beverly Hills: Sage, pp. 105-130 (1982) Granovetter, M., “The Strength of Weak Ties: A Network Theory Revisited,” Sociological Theory, Vol. 1, pp. 201-233 (1983) Green, C. W., “Normative influence on the acceptance of information technology,” Small Group Research, Vol. 29, No. 1, pp. 85-124 (1998) Gurzick, D. and Lutters, W. G., “From the personal to the profound: understanding the blog life cycle,” Proceedings of the CHI 2006, Montreal, Canada, ACM Press. (2006) Ha, I., Yoon, Y., and Choi, M., “Determinants of adoption of mobile games under mobile broadband wireless access environment,” Information & Management, Vol. 44, No. 3, pp. 276-286 (2007) Hair, J., Anderson, R., Tatham, R., and Black, W., Multivariate Data Analysis with Readings, MacMillan, New York. (1992) Hall, H. and Davison, B., “Social software as support in hybrid learning environments: The value of the blog as a tool for reflective learning and peer support,” Library & Information Science Research, Vol. 29, No. 2, pp. 163-187 (2007) Harris, L. C. and Goode, M. M. H., “The four levels of loyalty and the pivotal role of trust: A study of online service dynamics,” Journal of Retailing, Vol. 80, No. 2, pp. 139-158 (2004) Hassanein, K. and Head, M., “Manipulating perceived social presence through the web interface and its impact on attitude towards online shopping,” International Journal of Human-Computer Studies, Vol. 65, No. 8, pp. 689-708 (2007) Haughtvedt, C. P., Petty, R. E., and Cacioppo, J. T., “Need for cognition and advertising: Understanding the role of personality variables in consumer behavior,” Journal of Consumer Psychology, Vol. 1, No. 3, pp. 239-260 (1992) Hayduck, L., Structural equation modeling with LISREL, Johns Hopkings University Press, Baltimore, MD. (1987) Haythornthwaite, C., “Strong, weak, and latent ties and the impact of new media,” The Information Society, Vol. 18, No. 5, pp. 385-401 (2002) He, W., Qiao, Q., and Wei, K. K., “Social relationship and its role in knowledge management systems usage,” Information & Management, Vol. 46, No. 3, pp. 175-180 (2009) Herring, S. C., Scheidt, L. A., Wright, E., and Bonus, S., “Weblogs as bridging genre,” Information Technology & People, Vol. 18, No. 2, pp. 142–171 (2005) Homans, G. C., “Social behavior as exchange,” American Journal of Sociology, Vol. 63, No. 6, pp. 597-606 (1958) Homans, G. C., Social behavior, Harcourt Brace and World, New York. (1961) Horton, F. W., “Information literacy and information management: A 21st century paradigm partnership,” International Journal of Information Management, Vol. 26, No. 4, pp. 263-266 (2006) Hsu, C. L. and Lu, H. P., “Consumer behavior in online game communities: A motivational factor perspective,” Computers in Human Behavior, Vol. 23, No. 3, pp. 1642-1659 (2007) Hsu, M., Ju, T. L., Yen, C. H., and Chang, C. M., “Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations,” International Journal of Human-computer Studies, Vol. 65, No. 2, pp. 153-169 (2007) Huang, M. H., “Pausal behavior of end-users in online searching,” Information Processing & Management, Vol. 39, No. 3, pp. 425-444 (2003) Huffaker, D. A. and Calvert, S. L., “Gender, identity, and language use in teenage blogs,” Journal of Computer-Mediated Communication, Vol. 10, No. 2, Article 1, retrieved from http://jcmc.indiana.edu/vol10/issue2/huffaker.html (2005) Huizingh, E. K., “The content and design of web sites: an empirical study,” Information & Management, Vol. 37, No. 3, pp. 123–134 (2000) Igbaria, M. and Iivari, J., “The effects of self-efficacy on computer usage,” Omega: International Journal of Management Science, Vol. 23, No. 6, pp. 587-605 (1995) Insightxplorer, “2010 Online behavior in Taiwan (In Chinese),” retrieved from http://www.insightxplorer.com/specialtopic/2010_03_19.htm (2010) Ip, R. K. F. and Wagner, C., “Weblogging: A study of social computing and its impact on organizations,” Decision Support Systems, Vol. 45, No. 2, pp. 242-250 (2008) Itin, C. M., “Reasserting the philosophy of experiential education as a vehicle for change in the 21st century,” The Journal of Experiential Education, Vol. 22, No. 2, pp. 91-98 (1999) Jackson, L. A., Ervin, K. S., Gardner, D., and Schmitt, N., “Gender and the Internet: Women communicating and men searching,” Sex Roles, Vol. 44, No. 5-6, pp. 363-379. (2001) Jacobs, R. S., Hyman, M. R., and McQuitty, S., “Exchange-specific self-disclosure, social self-disclosure, and personal selling,” Journal of Marketing Theory and Practice, Vol. 9, No. 1, pp. 48-62 (2001) Johnson, E. J., Bellman, S., and Lohse, J., “Cognitive lock-in and the power law of practice,” Journal of Marketing, Vol. 67, No. 2, pp. 62–75 (2003) Jones, S. and Fox, S., “Generations online in 2009,” The Pew Internet & American Life Project, retrieved http://www.pewinternet.org/Reports/2009/Generations-Online-in-2009.aspx (2009) Jung, T., Youn, M. A., and McClung, S., “Motivations and self-presentation strategies on Korean-based ‘Cyworld’ weblog format personal homepages,” CyberPsychology & Behavior, Vol. 10, No. 1, pp. 24-31 (2007) Karahanna, E., Straub, D. W., and Chervany, N. L., “Information technology adoption across time: across-sectional comparison of pre-adoption and post-adoption beliefs,” MIS Quarterly, Vol. 23, No. 2, pp.183-213 (1999) Kelleher, T. and Miller, B. M., “Organizational blogs and the human voice: Relational strategies and relational outcome,” Journal of Computer-Mediated communication, Vol. 11, No. 2, Article 1, retrieved from http://jcmc.indiana.edu/vol11/issue2/kelleher.html (2006) Kelman, H. C., “Compliance, identification, and internalization: Three processes of attitude change,” Journal of Conflict Resolution, Vol. 2, No. 1, pp. 51-60 (1958) Kelman, H. C., “Processes of opinion change,” Public Opinion Quarterly, Vol. 25, No. 1, pp. 57-78 (1961) Kim, D. Y., Lehto, X. Y., and Morrison, A. M., “Gender differences in online travel information search: Implications for marketing communications on the Internet,” Tourism Management, Vol. 28, No. 2, pp. 423-433 (2007) Kim, H. N., “The phenomenon of blogs and theoretical model of blog use in educational contexts,” Computers & Education, Vol. 51, No. 3, pp. 1342-1352 (2008) Kim, H. W., Chan, K.C., and Gupta, S., “Value-based adoption of mobile Internet: An empirical investigation,” Decision Support Systems, Vol.43, No. 1, pp. 111-126 (2007) Kling, R. and Courtright, C., “Group behavior and learning in electronic forums: a sociotechnical approach,” The Information Society, Vol. 19, No. 3, pp. 221-235 (2003) Koenig, M. E. D., “Knowledge management, user education, and librarianship,” Library Review, Vol. 52, No. 1, pp. 10-17 (2003) Koh, J. and Kim, Y. G., “Knowledge sharing in virtual communities: an e-business perspective,” Expert Systems with Applications, Vol. 26, No. 2, pp. 155-166 (2004) Kwekkeboom, K. L., “Outcome expectancy and success with cognitive-behavioral interventions: the case of guided imagery,” Oncology Nursing Forum, Vol. 28, No. 7, pp. 1125-1132 (2001) Kwon, S. D, Yang, H. D., Fang, H., and Ko, M. H., “An Empirical Study on Moderating Effects of Espoused National Cultural Values on Internet Community Stickiness,” Journal of Information Technology Applications & Management, Vol. 15, No. 3, pp. 169-194 (2008) Leary, M. R., Kelly, K. M., Cottrell, C. A., and Schreindorfer, L., “Individual differences in the need to belong: Mapping the nomological network,” Unpublished manuscript, Duke University, Department of Psychology. (2007) Lee, Y., Kozar, K, A., and Larsen, K. R. T., “The Technology Acceptance Model: Past, Present, and Future,” Communications of the Association for Information Systems, Vol. 12, No. 50, pp. 752-780 (2003). Lenhart, A. and Fox, S., “Bloggers,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2006/Bloggers.aspx (2006) Lenhart, A., Arafeh, S., Smith, A., and Macgill, A. R., “Writing, technology and teens,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2008/Writing-Technology-and-Teens.aspx (2008) Lenhart, A., Madden, M., Macgill, A. R., and Smith, A., “The use of social media gains a greater foothold in teen life as they embrace the conversational nature of interactive online media,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2007/Teens-and-Social-Media.aspx (2007) Lenhart, A., Purcell, K., Smith, A., and Zickuhr, K., “Social media and mobile Internet use among teens and young adults,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2010/ Social-Media-and-Young-Adults.aspx (2010) Levack, K., “Kinja: blogging blogs,” EContent, Vol. 27, No. 10, pp. 44-45 (2004) Lewis, W., Agarwal, R., and Sambamurthy, V., “Sources of influence on beliefs about information technology use: an empirical study of knowledge workers,” MIS Quarterly, Vol. 27, No. 4, pp. 657-678 (2003) Li, D., Browne, G. J., and Wetherbe, J. C., “Why do Internet users stick with a specific web site? A relationship perspective,” International Journal of Electronic Commerce, Vol. 10, No. 4, pp. 105-141 (2006) Liang, T. and Lai, H., “Effect of store design on consumer purchases: van empirical study of online bookstores,” Information & Management, Vol. 39, No. 6, pp. 431-444 (2002) Liebowitz, S. J. and Margolis, S. E., “Network externality: an uncommon tragedy,” Journal of Economic Perspectives, American Economic Association, Vol. 8, No. 2, pp. 133-50 (1994) Liker, J. K. and Sindi, A. A., “User acceptance of expert systems: a test of the theory of reasoned action,” Journal of Engineering and Technology Management, Vol. 14, No. 2, pp. 147-173 (1997) Lin, J. C. C., “Online stickiness: its antecedents and effect on purchasing intention,” Behaviour & Information Technology, Vol. 26, No. 6, pp.507-516 (2007) Lin, L., Hu, P. J. H., Sheng, O. R. L., and Lee J., “Is stickiness profitable for electronic retailers?” Communications of the ACM, Vol. 53, No. 3, pp. 132-136 (2010) Lou, H., Luo, W., and Strong, D., “Perceived critical mass effect on groupware acceptance,” European Journal of Information System, Vol. 9, No. 2, pp. 91-103 (2000) Lu, H. P. and Lin, J. C. C., “Predicting customer behavior in the market-space: a study of Rayport and Sviokla’s framework,” Information & Management, Vol. 40, No. 1, pp. 1-10 (2002) Ma, M. L. Y. and Leung, L., “Unwillingness-to-communicate, perceptions of the Internet and self-disclosure in ICQ,” Telematics and Informatics, Vol. 23, No. 1, pp. 22-37 (2006) Madden, M. and Jones, S., “Online activities at work and home,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2008/Networked-Workers/5-Online-Activities-at-Work-and-Home/02-Nearly-one-in-five-employed-internet-users-use-instant-messaging-at-work.aspx (2008) Markus, M. J., “Toward a critical mass theory of interactive media,” In Fulk, J. and Steinfield, C. (Eds.), Organizations and Communication Technology, Sage, Newbury Park, pp. 194-218 (1990) Maslow, A., Motivation and personality, Harper and Row, New York. (1970). Mattila, A. S., “Emotional bonding and restaurant loyalty,” Cornell Hotel and Restaurant Administration Quarterly, Vol. 42, No. 6, pp. 73-9 (2001) McClea, M., Yen, D. C., and Huang, A., “An analytical study towards the development of a standardized IM application,” Computer Standards and Interfaces, Vol. 26, No. 4, pp. 343-355 (2004) McKenna, K. Y. A., Green, A. S., and Gleason, M. E. J., “Relationship formation on the Internet: What’s the big attraction?” Journal of Social Issues, Vol. 58, No. 1, pp. 9-31 (2002) Moon, J. W. and Kim Y. G., “Extending the TAM for a world-wide-web context,” Information & Management, Vol. 38, No. 4, pp. 217-230 (2001) Moore, G. C. and Benbasat, I., “Development of an instrument to measure the perceptions of adopting an information technology innovation,” Information Systems Research, Vol. 2, No. 3, pp. 173-191 (1991) Morahan-Martin, J. and Schumacher, P., “Loneliness and social uses of the Internet,” Computers in Human Behavior, Vol. 19, No. 6, pp. 659-671 (2003) Morahan-Martin, J., “The relationship between loneliness and Internet use and abuse,” Cyber Psychology and Behavior, Vol. 2, No. 5, pp. 431-440 (1999) Nahapiet, J. and Ghoshal, S., “Social capital, intellectual capital, and the organizational advantage,” The Academy of Management Review, Vol. 23, No. 2, pp. 242-266 (1998) Ngai, E. W. T., Poon, J. K. L., and Chan, Y. H. C., “Empirical examination of the adoption of WebCT using TAM,” Computers & Education, Vol. 48, No. 2, pp. 250-267 (2007) Nithya, H. M. and Julius, S., “Extroversion, neuroticism and self-concept: their impact on Internet users in India,” Computers in Human Behavior, Vol. 23, No. 3, pp. 1322-1328 (2007) Nunnally, J. C., Psychometric Theory, McGraw-Hill, New York. (1978) Oliver R. L., “A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions,” Journal of Marketing Research, Vol. 17, No.3, pp. 460-469 (1980) Oliver R. L., “Effect of expectation and disconfirmation on postexposure product evaluations - an alternative Interpretation,” Journal of Applied Psychology, Vol.62, No.4, pp. 480 (1977) Oliver, P. E. and Marwell, G., “Whatever happened to critical mass theory? a retrospective and assessment,” Sociological Theory, Vol. 19, No. 3, pp. 292-311 (2001) Oliver, P. E., Marwell, G., and Teixeira, R., “A theory of the critical mass: interdependence, group heterogeneity, and the production of collective action,” American Journal of Sociology, Vol. 91, No. 3, pp. 522-556 (1985) Olsen, S. O., “Repurchase loyalty: the role of involvement and satisfaction,” Psychology & Marketing, Vol. 24, No. 4, pp. 315-341 (2007) Orlikowski, W. J. and Robey, D., “Information technology and the structuring of organizations,” Information Systems Research, Vol. 2, No. 2, pp. 143-169 (1991) Palfai, T. P., “Positive outcome expectancies and smoking behavior: the role of expectancy accessibility,” Cognitive Therapy and Research, Vol. 26, No. 3, pp. 317-333 (2002) Park, C. W., and Lessing, V. P., “Students and housewives: differences in susceptibility to reference group influence,” Journal of Consumer Research, Vol. 4, No. 2, pp. 102-110 (1977) Park, S. Y., “An analysis of the technology acceptance model in understanding university students’ behavioral intention to use e-Learning,” Journal of Educational Technology & Society, Vol. 12, No, 3, pp. 150-162 (2009) Pearson, J. C., “The effects of setting and gender on self-disclosure,” Group & Organization Studies, Vol. 6, No. 3, pp. 334-340 (1981) Peplau, L. A., Russell, D., and Heim, M., “The experience of loneliness,” In Frieze, I., Bar-Tel, D., and Carroll J. (Eds.), New approaches to social problems, Jossey-Bass, San Francisco. (1979) Peterson, R. A., “On the use of college students in social science research: Insights from a second-order meta-analysis,” Journal of Consumer Research, Vol. 28, No. 3, pp. 450−461 (2001) Petrič, G., “Conceptualizing and measuring the social uses of the Internet: The case of personal web sites,” The Information Society, Vol. 22, No. 5, pp. 291-301 (2006) Philleo, T. J., “Visualizing the Internet: examining images constructed by beginning users,” Proceedings of the 27th Annual conference of the international visual literacy association, Chicago, IL. (1995) Pontiggia, A. and Virili, F., “Network effects in technology acceptance: Laboratory experimental evidence,” International Journal of Information Management, Vol. 30, No.1, pp. 68-77 (2010) Porter, L. V., Trammell, K. D. S., Chung, D., and Kim, E., “Blog power: Examining the effects of practitioner blog use on power in public relations,” Public Relations Review, Vol. 33, No. 1, pp. 92-95 (2007) Preece, J., “Sociability and usability in online communities: determining and measuring success,” Behaviour & Information Technology, Vol. 20, No. 5, pp. 347-356 (2001) Preece, J., Nonnecke, B., and Andrew, D., “The Top 5 Reasons For Lurking: Improving Community Experiences For Everyone,” Computers in Human Behavior, Vol. 20, No. 2, pp. 201-223 (2004) Premkumar, G. and Bhattacherjee, A., “Explaining information technology usage: a test of competing models,” Omega: International Journal of Management Science, Vol. 36, No. 1, pp. 64-75 (2008) Putnam, R., “Tuning in, tuning out: the strange disappearance of social capital in America,” Political Science and Politics, Vol. 28, No. 4, pp. 664-683 (1995) Rayport, J. F. and Sviokla, J. J., “Managing in the marketspace,” Harvard Business Review, Vol. 72, No. 6, pp. 142-150 (1994) Roca, J. C., Chiu, C. M. and Martínez, F. J., “Understanding e-learning continuance intention: An extension of the Technology Acceptance Model,” International Journal of Human-Computer Studies, Vol. 64, No. 9, pp. 683-696 (2006) Rogers, E. M., Diffusion of Innovations (4th ed), Free Press, New York. (1995) Salancik, G. R. and Pfeffer, J., “A social information processing approach to job attitudes and task design,” Administrative Science Quarterly, Vol. 23, No. 2, pp. 224-253 (1978) Sandars, J., “The potential of blogs and wikis in healthcare education,” Education for Primary Care, Vol. 18, No. 1, pp. 16-21 (2007) Sandra, A. V. and Prashant P., “The Social Influence Model of Technology Adoption,” Communications of the ACM, Vol. 53, No. 6, pp. 149-153 (2010) Sawyer, S., Allen, J. P., and Lee, H., “Broadband and mobile opportunities: a socio-technical perspective,” Journal of Information Technology, Vol. 18, No. 2, pp. 121-136 (2003) Schlachet, P., “The once and future group: Vicissitudes of belonging,” Group, Vol. 24, No. 2-3, pp. 123-440 (2000) Scott, J., “The measurement of information systems effectiveness: evaluation a measuring instrument,” Proceedings of the Fifteenth International Conference on Information Systems, Vancouver, BC, pp.111-128 (1994) Segrest, S. L., Domke-Damonte, D. J., Miles, A. K., and Anthony, W. P., “Following the crowd: social influences and technology usage,” Journal of Organizational Change Management, Vol. 11, No. 5, pp. 425-445 (1998) Seltzer, T. and Mitrook, M. A., “The dialogic potential of weblogs in relationship building,” Public Relations Review, Vol. 33, No. 2, pp. 227-229 (2007) Serenko, A., “A model of user adoption of interface agents for email notification,” Interacting with Computers, Vol. 20, No. 4-5, pp. 461-472 (2008) Shin, H. P., “Extended technology acceptance model of Internet utilization behavior,” Information & Management, Vol. 41, No. 6, pp. 719-729 (2004) Shiu, E., and Lenhart, A., “How Americans use instant messaging,” The Pew Internet & American Life Project, retrieved from http://www.pewinternet.org/Reports/2004/How-Americans-Use-Instant-Messaging.aspx (2004) Smith, S., “In search of the blog economy,” EContent, Vol. 28, No. 1, pp. 24-29 (2005). Soe, L. L. and Markus, M. L, “Technological or social utility? unraveling explanations of email, vmail, and fax use,” The Information Society, Vol. 9, No. 3, pp. 213–236 (1993) Strader, T. J., Ramaswami, S. N., and Houle, P. A., “Perceived network externalities and communication technology acceptance,” European Journal of Information Systems, Vol. 16, No. 1, pp.54-65 (2007) Straub, D., Limayem, M., and Karahanna-Evaristo, E., “Measuring System usage: Implications for IS theory testing,” Management Science, Vol. 41, No. 8, pp. 1328–1342 (1995) Sum, S., Mathews, R. M., Pourghasem, M., and Hughes, I., “Internet use as a predictor of sense of community in older people,” CyberPsychology & Behavior, Vol. 12, No. 2, pp. 235-239 (2009) Sweetser, K. D. and Metzgar, E., “Communicating during crisis: Use of blogs as a relationship management tool,” Public Relations Review, Vol. 33, No. 3, pp. 340-342 (2007) Szajna, B., “Empirical evaluation of the revised technology acceptance model,” Management Science, Vol. 42, No. 1, pp. 85–96 (1996) Taylor, S. and Todd, P., “Assessing IT usage: the role of prior experience,” MIS Quarterly, Vol. 19, No. 4, pp. 561-570 (1995) Teo, T, Lee, C. B., and Chai, C. S., “Understanding pre-service teachers' computer attitudes: applying and extending the technology acceptance model,” Journal of Computer Assisted Learning, Vol. 24, No. 2, pp. 128-143 (2008) Teo, T. S. H., Lim, V. K. G., and Lai, R. Y. C., “Intrinsic and extrinsic motivation in Internet usage,” Omega: International Journal of Management Science, Vol. 27, No. 1, pp. 127-145 (1999) Thompson, R. L., Higgins, C. A., and Howell, J. M., “Personal computing: Toward a conceptual model of utilization,” MIS Quarterly, Vol. 15, No. 1, pp. 124-143 (1991) Thorbjornsen, H. and Supphellen, M., “The impact of brand loyalty on website usage,” Journal of Brand Management, Vol. 11, No. 3, pp. 199-208 (2004) Toral, S. L., Barrero, F., and Martinez-Torres, M. R., “Analysis of utility and use of a web-based tool for digital signal processing teaching by means of a technological acceptance model,” Computers & Education, Vol. 49, No. 4, pp. 957-975 (2007) Tsai, H. T., Huang, H. C., Jaw, Y. L., and Chen, W. K., “Why on-line customers remain with a particular e-retailer: An integrative model and empirical evidence,” Psychology & Marketing, Vol. 23, No. 5, pp. 447-464 (2006) Tung, F. C., Lee, M. S., Chen, C. C., and Hsu, Y. S., “An extension of financial cost and TAM model with IDT for exploring users’ behavioral intentions to use the CRM information system,” Social Behavior & Personality: An International Journal, Vol. 37, No. 5, pp. 621-626 (2009) Tuten, T. L. and Bosnjak, M., “Understanding differences in web usage: The role of need for cognition and the five factor model of personality,” Social Behavior and Personality, Vol. 29, No. 4, pp. 391-398 (2001) Van der Heijden, H., “Factors influencing the usage of websites: The case of a generic portal in the Netherlands,” Information & Management, Vol. 40, No. 6, pp. 541-549 (2003) Van Slyke, C., Ilie, V., Lou, H., and Stafford, T., “Perceived critical mass and the adoption of a communication technology,” European Journal of Information Systems, Vol. 16, No. 4, pp. 270-283 (2007) Venkatesh, V. and Davis F. D., “A theoretical extension of the technology acceptance model: four longitudinal field studies,” Management Science, Vol. 46, No. 2, pp. 186-205 (2000) Venkatesh, V. and Morris M. G., “Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior,” MIS Quarterly, Vol. 24, No. 1, pp. 115-139 (2000) Venkatesh, V., Morris M., Davis G. B., and Davis F. D., “User acceptance of information technology: toward a unified view,” MIS Quarterly, Vol. 26, No. 4, pp. 425-478 (2003) Verplanken, B., Hazenberg, P. T., and Palenewen, G. R., “Need for cognition and external information search effort,” Journal of Research in Personality, Vol. 26, No. 2, pp. 128-136 (1992) Viégas, F. B., “Bloggers’ expectations of privacy and accountability: An initial survey,” Journal of Computer-Mediated Communication, Vol. 10, No. 3, article 12, retrieved from http://jcmc.indiana.edu/vol10/issue3/viegas.html (2005). Wagner, C. and Bolloju, N., “Supporting knowledge management in organizations with conversational technologies: discussion forums, weblogs, and wikis,” Journal of Database Management, Vol. 16, No.2, pp. 1-8 (2005) Wang, H. Y. and Wang, Y. S., “Gender differences in the perception and acceptance of online games,” British Journal of Educational Technology, Vol. 39, No. 5, pp. 787-806 (2008) Wang, K., Wang, E. T. G., and Tai, C. F., “A study of online auction sites in Taiwan: product, auction rule, and trading type,” International Journal of Information Management, Vol. 22, No. 2, pp. 127-142 (2002) Wang, Y. and Qualls, W., “Towards a theoretical model of technology adoption in hospitality organizations,” International Journal of Hospitality Management, Vol. 26, No. 3, pp. 560-573 (2007) Wang, Y. S., Wu, M. C., and Wang, H. Y., “Investigating the determinants and age and gender differences in the acceptance of mobile learning,” British Journal of Educational Technology, Vol. 40, No. 1, pp. 92-118 (2009) Wasserman, T., “Blogs cause word of mouth business to spread quickly,” Brandweek, Vol. 46, No. 35, pp. 9 (2005) Williamson, K., Lichtenstein, S., Sullivan, J., and Schauder, D., “To choose or not to choose: exploring Australians’ views about Internet banking,” International Journal of Technology and Human Interaction, Vol. 2, No. 4, pp. 17-33 (2006) Woo, H. L. and Wang, Q., “Using weblog to promote critical thinking – An exploratory study,” Proceedings of World Academy of Science: Engineering & Technology, Vol. 37, pp. 431-439 (2009) Worthy, M., Gary, A. L., and Kahn, C. M., “Self-disclosure as an exchange process,” Journal of Personality and Social Psychology, Vol. 13, No. 1, pp. 59-63 (1969) Yan, Z., “Age differences in children’s understanding of the complexity of the Internet,” Journal of Applied Developmental Psychology, Vol. 26, No. 4, pp. 385-396 (2005) Yoon, C. and Kim, S., “Convenience and TAM in a ubiquitous computing environment: the case of wireless LAN,” Electronic Commerce Research and Applications, Vol. 6, No. 1, pp. 102-112 (2007) Young, H. N., Lipowski, E. E., and Cline, R. J. W., “Using social cognitive theory to explain consumers’ behavioral intentions in response to direct-to-consumer prescription drug advertising,” Research in Social and Administrative Pharmacy, Vol. 1, No. 2, pp. 270-288 (2005) Young, K. S., “Internet addiction: the emergence of a new clinical disorder,” Cyberpsychology and Behavior, Vol. 1, No. 3, pp. 237–244 (1998) Yu, J., Ha, I., Choi, M., and Rho, J., “Extending the TAM for a t-commerce,” Information & Management, Vol. 42, No. 7, pp. 965-976 (2005) Yuen, A. H. K. and Ma, W. W. K., “Exploring teacher acceptance of e-learning technology,” Asia-Pacific Journal of Teacher Education, Vol. 36, No. 3, pp. 229-243 (2008) Zhang, N., Guo, X., and Chen, G., “IDT-TAM integrated model for IT adoption,” Tsinguha Science and Technology, Vol. 13, No. 3, pp. 306-311 (2008) Zott, C., Amit, R., and Donlevy, J., “Strategies for value creation in E-commerce: Best practice in Europe,” European Management Journal, Vol. 18, No. 5, pp. 463-475 (2000) Zviran, M., Glezer, C, and Avni, I., “User satisfaction from commercial web sites: the effect of design and use,” Information & Management, Vol. 43, No. 2, pp. 157-178 (2006)
|