|
[1] Adams, Nelson and Todd, 1992, “Perceived usefulness, ease of use, and usage of information technology: A replication”, MIS Quarterly 16, pp. 227–247. [2] Agarwal and Prasad, 1999, “Are individual differences germane to the acceptance of new information technologies?” Decision Science, vol. 30, no.2, pp. 361-391. [3] Ajzen and Fishbein, 1977, “Attitude-behavior relations: A theoretical analysis and review of empirical research”, Psychological Bulletin 84, pp. 888–918. [4] Ajzen and Fishbein, 1980, “Understanding attitude and predicting social behavior”, Prentice-Hall, Englewood Cliffs, NJ, pp 340 - 360. [5] Ajzen, In Kuhl, J., and Beckman, 1985, “From intention to action: a theory of planned behavior”, “Action control: from cognitions to behaviors” New York, NY: Springer, pp. 267 - 276. [6] Ajzen, 1991, “The theory of planned behavior: Some unresolved issues”, Organizational Behavior and Human Decision Processes, 50, pp. 179-211. [7] Ajzen, Madden, 1986, “Prediction of goal-directed behavior: attitudes, intention and perceived behavioral control”, Journal of Experimental Social Psychology, 22, pp. 453-474. [8] Anderson and Gerbing, 1998, “Structural equation modeling in practice: a review and recommended two step approach”. Psychological Bulletin, 103(3), pp. 411–423. [9] Bac, 2009, “Bao cao tong ket VNPT Nam dinh nam 2009” Nha xuat ban tre, 24, pp. 23- 27. [10] Bandura, 1982, “Self efficacy mechanism in human-agency”, American Psychologist 37, pp. 122–147. [11] BATTACHERJEE, 2000, “Acceptance of e-commerce services: the case of electronic brokerages”, Man and Cybernetics, 30, pp. 411-420. [12] Chang, 1998, “Predicting unethical behavior: a comparison of the theory of reasoned action and theory of planned behavior”, Journal of Business Ethics 17 (1998), pp. 1825–1834. [13] Chau, 2001, “Influence of computer attitude and self-efficacy on IT usage behavior”, Journal of End User Computing, 13(1), 26-33. [14] Cheung and Huang, 2005, “Proposing a framework to assess internet usage in university education: an empirical investigation from a student’s perspective”, British Journal of Educational Technology 36 (2) (2005), pp. 237–253 [15] Compeau and Higgins, 1995, “Computer self-efficacy: Development of a measure and initial test”, MIS Quarterly 19 (1995) (2), pp. 189–211 [16] Dang, 2009, “ Su phat trien cua thương mai Vietnam” Tap chi Thuong Mai, 23, pp. 45 - 50. [17] Davis and Venkatesh, 2004, “Toward preprototype user acceptance testing of new information systems: Implications for software project management”, IEEE Transactions on Engineering Management 51 (1) (2004), pp. 31–46. [18] Davis, 1989, “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quart., vol. 13, no. 3, pp. 319–340. [19] Davis, 1986, “A Technology Acceptance Model of Empirically Testing New End-User Information Systems: Theory and Results”, Doctoral Dissertation, Sloan School of Management, Massachusetts Institute of Technology, pp 23 - 80. [20] Davis, Bagozzi, and Warshaw, 1989, “User acceptance of computer technology: Comparison of two theoretical models,”Management Science, vol. 35, no.8, pp. 982-1003. [21] Drennan , J. Drennan, J. Kennedy and A. Pisarksi, 2005, “Factors affecting student attitudes toward flexible online learning in management education”, The Journal of Educational Research 98 (6), pp. 331–340. [22] Fishbein & Ajzen, I, 1975, “Belief, attitude, intention and behavior.” Reading, MA: Addison-Wesley, 22, pp. 328 – 338. [23] Fishbein and I. Ajzen, 1975, “Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research”. Addsion-Wesley, reading, MA. 2, pp. 21 - 32. [24] Galbraith, 1994, “Competing with Flexible Lateral Organizations”. Addison-Wesley, Reading, MA. pp. 241 – 260. [25] GHAMATRASA, 2006, “Internet Adoption Decision Model among Iranian Small and Medium Enterprises, Master Thesis, Division of Industrial marketing and ecommerce”, Lulea university of technology, 43, pp. 25-29. [26] HARTWICK, J., BARKI, H, 1994, “Explaining the role of user participation in information system use. Management Science”, 40, pp. 440-465. [27] Heinrich, 2005, “Transforming strategic goals of CRM into process goals and activities” Business Process Management Journal, 11(6), pp.709−723. [28] Horton, R.P. Horton, T. Buck, P.E. Waterson and C.W. Clegg, 2001, “Explaining intranet use with the technology acceptance model”, Journal of Information Technology 16 (4) (2001), pp. 237–249. [29] Igbaria and Zinatelli, 1997, “Personal computing acceptance factors in small firms: a structural equation model”, MIS Quarterly 2, pp. 279–306. [30] KAISER, 2006, “A moral extension of the theory of planned behavior: Norms and anticipated feelings of regret in conservationism”. Personality and Individual Differences, 41, pp. 71-81. [31] KARAHANNA, 1999, “Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs”. MIS Quarterly, 23, pp.183-213. [32] Karakostas, Kardaras, D., & Papathanassiou, E. , 2005, “The state of CRM adoption by the financial services in the UK: An empirical investigation”, Information & Management, 42, pp. 853−863. [33] Mallette and Fisher, 1998, “The effects of non-volitional use on perceptions and intention of end user,” 28th Annual Atlantic Schools of Business Conference, Wolfville, Nova Scotia, Vol. 3, pp. 21-28. [34] MANSTEAD, 1996, “Attitudes and behavior.” In G. R. Semin & K. Fiedler (Eds.). Applied social psychology, Thousand Oaks, CA: Sage, pp. 3-29. [35] MENG-HSIANG HSUA, C.-H. Y., CHAO-MIN CHIUC, CHUN-MING CHANG, 2006, “A longitudinal investigation of continued online shopping behavior: An extension of the theory of planned behavior”. Int. J. Human-Computer Studies, 64, pp. 889-904. [36] Ngai, E. W. T, 2005, “Customer relationship management research (1992–2002) an academic literature review and classification”, Marketing Intelligence & Planning, 23 (6), pp. 582−605. [37] Nguyen Thanh Phuc, 2008, “ Strategy for Development of Vietnam’s Information and Communication Technology toward 2010 and orientations toward 2020: Viewpoint, Objectives, Direction and Major Solutions” Tap chi buu chinh vien thong, pp. 34 -40. [38] Nguyen, 2010, “Pham mem ssoft Vietnam”, Nha xuat ban tre, pp. 201 -213. [39] OLIVER, T. A., SHAPIRO, F, 1993, “Self-efficacy and computers” Journal of Computer- Based Interactions, 20, pp. 81-85. [40] Pham, 2008, “Quan ly moi quan he voi khach hang của Ssoft. “ Tap chi cong nghe thong tin, pp. 14 – 43. [41] Pituch and Lee, 2006, “The influence of system characteristics on e-learning use, Computers and Education”, Management Journal, 47 (2) , pp. 222–244 [42] Posthuma & Dworkin, 2000, “A behavioral theory of arbitrator acceptability”. International Journal of Conflict Management, 11(3), pp. 249–266. [43] ROGERS, 1995, “Diffusion of Innovation (4th ed.), New York”, The Free Press. pp. 23 – 45. [44] Sekaran, Sekaran, Foster, Lucas and Hankins, 2003, “Calcium imaging reveals a network of intrinsically light-sensitive inner-retinal neurons”, Curr. Biol, 13, pp. 1290–1298. [45] Shim, Shim, Collantes, Welsh, Subramaniam, Howlett, M.A. Eissenstat and S.J. Ward, 1998, “Three-dimensional quantitative structure-activity relationship study of the cannabimimetic (aminoalkyl) indoles using comparative molecul” 41, pp. 4521–4532. [46] Son, 2009, “ Huong dan phan mem Ssoft CRM”, Nha xuat ban thong ke, 21, pp. 12 -100. [47] Stephens, N., & Gwinner, K. P. ,1998, “Why don’t some people complain? A cognitive-emotive process model of consumer complaint behavior”. Journal of the Academy of Marketing Science, 26(3), pp. 172–189. [48] Tariq Mohiuddin Ahmed, 2005, “Internet and Customer relationship Management in SME’s”. Jayachandran, S., Sharma, S., Kaufman, P., Raman, “The Role of Relational Information Processes and Technology Use in Customer Relationship Management”, Journal of Marketing, 69, 4, pp. 177-192. [49] Taylor, Todd, 1995, “Understanding information technology usage: A test of competing models”. Information Systems Research, 2, pp.144-176. [50] TAYLOR.S., A. T., P.A, 1995, “Understanding information technology usage: A test of competing models”. Inf. Systems Research, 6, pp. 144-176. [51] Nguyen, 2010, “The Journal on Information Technologies and Communications.. Gov’t treasures business circle to ICT development”, Tap chi thong tin, pp 13 - 56. [52] Tran, “Strategy for Development of Vietnam’s Information and Communication Technology toward 2010 and Orientations toward 2020”. Tap chi bu chinh vien thong, pp 23 – 105. [53] Ticehurst and Veal, 2000, “Business research methods: A managerial approach”, Pearson Education Australia, French Forest, NSW. 13, pp 14 – 50. [54] Tran, 2006, “Quan ly moi quan he khach hang Vietnam” Nha xuat ban thong ke, pp 29 -40. [55] Tran, 2007, “Su phat trien kinh te Vietnam”, Tạp chi kinh te, pp. 25 - 40. [56] Venkatesh and Davis, 2000, “A theoretical extension of the technology acceptance model: four longitudinal field studies”, Management Science 46 (2), pp. 186–204. [57] Venkatesh, V. & Davis, F., 2000, “A theoretical extention of the technology acceptance model: Four longitudinal field studies”. Management Science, 46(2), pp. 186-204.
|