최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국전자거래학회지 = The Journal of Society for e-Business Studies, v.16 no.3, 2011년, pp.1 - 22
이병용 (경희대학교 일반대학원 국제경영학과) , 김민용 (경희대학교 경영대학)
The purpose of this study is to verify the relationship between expectancy confirmation and continuance usage intention in biometric technology. We extend the continuance usage intention model, TAM and expectation confirmation theory by adding perceived privacy, perceived security and trust. Results...
김계수, "인과분석 연구방법론", 청람, 2006.
김재전, 박경자, 노희옥, "기대일치성이 인터넷 쇼핑몰의 전반적 만족과 지속사용 의도에 미치는 영향", 인터넷전자상거래연구, 제9권, 제3호, pp. 313-336, 2009.
사이버 범죄현황, "http://www.netan.go.kr", 사이버 범죄수사대, 2010.
송지준, "SPSS/AMOS 통계분석방법", 21세기사, pp. 254-256, 2008.
유호선, 김민용, 권오병, "유비쿼터스 컴퓨팅 서비스 수용에 영향을 미치는 요인 연구", 한국전자거래학회논문지, 제13권, 제2호, pp. 117-147, 2008.
이수현, "인터넷 범죄의 실태와 대응방안", 법학논고, 제25호, pp. 269-307, 2006
한민옥, "알면 알수록 신기한 영화 속 보안기술의 세계 : 홍채, 지문 등 생체인식 해킹은 아직 영화 속 이야기", LG엔시스 Webzine, 2009. 8.
Ajzen, I., "The Theory of Planned Behavior," Organizational Behaviour and Human Decision Processes, Vol. 50, pp. 179-211, 1991.
Alexander P. P. and Peter P., "Understanding User Perspectives on Biometric Technology," Communication of The ACM, Vol. 51, No. 9, pp. 115-118, 2008
Bhattacharya, R., Devinny, T. M., and Pilutla, M. A., "A Formal Model of Trust based on Outcomes," Academy of Management Review, Vol. 23, No. 3, pp. 459-472, 1998.
Bhattacherjee, A., "Understanding Information Systems Continuance : an Expectation- Confirmation Model," MIS Quarterly, Vol. 25, pp. 351-371, 2001.
Bhattacherjee, A. and Premkumar, G., "Understanding Changes in Belief and Attitude Toward Information Technology Usage : A Theoretical Model and Longitudinal Test," MIS Quarterly, Vol. 28, No. 2, pp. 229-254, 2004.
Chircu, A. M., Davis, G. B., and Kauffman, R. J., "Trust, Expertise and E-commerce Intermediary Adoption," AMCIS 2000 Proceedings. Paper 405. http://aisel.aisnet.org/amcis2000/405, 2000.
Churchill Jr., G. A. and Surprenanat, C., "An Investigation into the Determinants of Customer Satisfaction," Journal of Marketing Research, Vol. 19, pp. 491-504, 1982.
Coventry, L., A. De Angeli, and G. Johnson, "Usability and Biometric Verification at the ATM Interface," SIGCHI conference on Human factors in computing systems, pp. 153-160, 2003.
Dabolkar, P. A., Shepard, C. D., and Thorpe, D. I., "A Comprehensive Framework for Service Quality : An Investigation of Critical Conceptual and Measurement Issues Through a Longitudinal Study," Journal of Retailing, Vol. 76, pp. 139-173, 2000.
Das, T. K. and Teng, B., "Between Trust and Control : Developing Confidence in Partner Cooperation in Alliance," Academy of Management Review, Vol. 23, No. 3, pp. 491-512, 1998.
Davis, D., "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly, Vol. 13, No. 3, pp. 319-340, 1989.
DeLone, W. H. and McLean, E. R., "Information Systems Success. The Quest for the Dependent Variable," Information System Research, Vol. 3, pp. 60-95, 1992.
Dinev, T. and Hart, P., "Internet Privacy Concern and their Antecedents-Measurement Validity and a Regression Model," Behavior and Information Technology, Vol. 23, No. 6, pp. 413-422, 2004.
Engel, J. F., Roger D., Bland, P., and Miniard, W., "Consumer Behavior," 6th ed., Dryden Press, 1990.
Flavian, C. and Guinaliu, M., "Consumer Trust, Perceived Security and Privacy Policy : Three Basic Elements of Loyalty to a Web Site," Industrial Management and Data Systems, Vol. 106, No. 4, pp. 601-620, 2006.
Garver, M. and J. Mentzer, "Logistics Research Methods : Employing Structural Equation Modeling to Test for Construct Validity," Journal of Business Logistics, Vol. 20, No. 1, pp. 33-58, 1999.
Gefen, D. and Straub, D. W., "Gender Differences in the Perception and Use of e-mail: an Extension to the Technology Acceptance Model," MIS Quarterly : Management Information System, Vol. 21, No. 4, pp. 389-400, 1997.
Gefen, D. and Straub, D. W., "Managing User Trust in e-services," E-service Journal, Vol. 1, No. 2, 2002.
Gefen, D., "E-commerce : the Role of Familiarity and Trust," Omega, Vol. 28, No. 6, pp. 725-737, 2000.
Godwin, J. U., "Privacy and Security Concerns as a Major Barrier for e-commerce : a Survey Study," Information Management and Computer Security, Vol. 9, No. 4, pp. 165-174, 2001.
Hopkins, R., "An Introduction to Biometrics and Large Scale Civilian Identification," International Review of Law Computer and Technology, Vol. 13, No. 3, pp. 337-363, 1999.
Hsu, C. and Lu, H., "Why Do People Play On-line Games? An extended TAM with Social Influences and Flow Experience," Information and Management, Vol. 41, No. 7, pp. 853-868, 2004.
Jain, A., Hong, L., and Pankanti, S., "Biometric Identification," Communications of the ACM, Vol. 43, No. 2, pp. 91-98, 2000.
James, T., T. Pirim, K. Boswell, B. Reithel, and R. Barkhi, "Determining the Intention to Use Biometric Devices : An Application and Extension of the Technology Acceptance Model," Journal of Organizational and End User Computing, Vol. 18, pp. 2319-2334, 2006.
Jarvenpaa, S. L. and P. Todd, "Consumer Reactions to Electronic Shopping on the World Wide Web," International Journal of Electronic Commerce, Vol. 1, No. 2, pp. 59-88, 1996.
Kalakota, R. and Whinston, A. B., "Electronic Commerce : A Manager's Guide," Addison Wesley, 1997.
Laforet, S. and Li, X., "Consumers' Attitudes towards Online and Mobile Banking in China," International Journal of Bank Marketing, Vol. 23, No. 5, pp. 362-380, 2005.
Lankton, N. and McKnight, D. H., "Using Expectation Disconfirmation Theory to Predict Technology Trust and Continuance Intention," invited paper presented at University of Minnesota, 2006.
Lin, CS, S. Wu, and R. J, Tsai, "Integrating Perceived Playfulness into Expectation- Confirmation Model for Web Portal," Information and Management, Vol. 43, No. 5, pp. 683-693, 2005.
Liu, S. and M. Silverman, "A Practical Guide to Biometric Security Technology," IT Professional Magazine, Jan/Feb., 2001.
Loch, K., Carr, H., and Warkentin, M., "Threats to Information Systems : Today's Reality, Yesterday's Understanding," MIS Quarterly, Vol. 16, No. 2, pp. 173-186, 1992.
Mason, R., "For Ethical Issues of the Information Age," MIS Quarterly, Vol. 10, No. 1, pp. 5-12, 1986.
Matsumoto, T., H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint Systems," Proceedings of SPIE Vol. 4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002.
Mayer, R. C., Davis, J. H., and Schoorman, F. D., "An Integrative Model of Organization Trust," The Academy of Management Review, Vol. 20, No. 3, pp. 709-734, 1995.
Moody, J., "Public Perceptions of Biometric Devices : The Effect of Misinformation on Acceptance and Use," Journal of Issues in Informing Science and Information Technology, Vol. 1, pp. 753-761, 2004.
Oliver, R. L., "A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions," Journal of Marketing Research, Vol. 17, No. 4, pp. 460-469, 1980.
Pavlou, P. A., "Consumer Acceptance of Electronic Commerce : Integrating Trust and Risk with the Technology Acceptance Model," International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 101-134, 2003.
Prabhaker, S., Pankati, S., and Jain, A. K., "Biometric Recognition : Security and Privacy Concerns," IEEE Security and Privacy, Vol. 1, No. 2, pp. 33-42, 2003.
Ring, P. S. and Van De Ven, A. H., "Developing Processes of Cooperative Inter-organizational Relationships," Academy of Management review, Vol. 19, pp. 90-118, 1994.
Roberts, B., "Are You Ready for Biometrics?," HRMagazine, Vol. 48, No. 3, pp. 95-98, 2003.
Roca, J. C., Chiu, C. M., and Martinez. F. J., "Understanding E-learning Continuance Intention : An Extension of the Technology Acceptance Model," Human-Computer Studies, Vol. 64, No. 8, pp. 683-696, 2006.
Rosa, R. H., Patrick, A. S., and Ozok, A., "Perception and Acceptance of Fingerprint Biometric Technology," Symposium On Usable Privacy Security(SOUPS), 2007.
Rousseau, D. M., Sitkin, S. G., Butt, R. S., and Camerer, C., "Not So Different After All : A Cross Discipline View of Trust," Academy of Management Review, Vol. 23, No. 3, pp. 393-404, 1998.
Siponen, M., "A Conceptual Foundation for Organizational Information Security," Information Management and Computer Security, Vol. 8, No. 1, pp. 31-41, 2000.
Smith, H., Milberg, S., and Berke, S., "Information Privacy : Measuring Individuals' Concerns about Organizational Practices," MIS Quarterly, Vol. 20, pp. 167-196, 1996.
Vatanasombut, B., M. Igbaria, A. C., and Stylianou, W., "Information Systems Continuance Intention of Web-based Applications Customers : The Case of Online Banking," Information and Management, Vol. 45, No. 7, pp. 419-428, 2008.
Vijayasarathy, L. R., "Predicting Consumer Intentions to Use On-line Shopping : The Case for an Augmented Technology Acceptance Model," Information and Management, Vol. 41, No. 6, pp. 747-762, 2004.
Westbrook, R. A. and Reilly, M. D., "Value-Percept Disparity : An Alternative to the Disconfirmation of Expectations Theory of Consumer Satisfaction," Advances in Comsumer Research, Vol. 10, pp. 256-261, 1983.
Westin, A., "Privacy and Freedom," Ateneum, New York, 1967.
Yi, Y., "A Critical Review of Consumer Satisfaction," Review of Marketing : American Marketing Association, Chicago, IL, pp. 68-123, 1990.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.