


default search action
Journal of Organizational and End User Computing, Volume 26
Volume 26, Number 1, 2014
- Elizabeth White Baker

, Jason Bennett Thatcher
, Michael J. Gundlach, D. Harrison McKnight:
The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use. 1-26 - Kenneth J. Knapp, Claudia J. Ferrante:

Information Security Program Effectiveness in Organizations: The Moderating Role of Task Interdependence. 27-46 - Salvatore Aurigemma, Raymond R. Panko:

Evaluating the Effectiveness of Static Analysis Programs Versus Manual Inspection in the Detection of Natural Spreadsheet Errors. 47-65 - Xihui Zhang

, Colin Gabriel Onita, Jasbir Singh Dhaliwal:
The Impact of Software Testing Governance Choices. 66-85
Volume 26, Number 2, 2014
- Samuel Fosso Wamba

, Lemuria D. Carter
:
Social Media Tools Adoption and Use by SMES: An Empirical Study. 1-17 - Samar Mouakket

:
Investigating the Motives of Customers' Continuance Intentions towards Online Reservation: The Role of E-Service Quality. 18-40 - Natalia Vila-López

, Inés Küster
:
How Can Secure Websites Improve Buying Intention?: Usable Versus Non Usable Contexts? 41-59 - Saurabh Gupta

, Robert Anson:
Do I Matter?: The Impact of Individual Differences on a Technology-Mediated End User Training Process. 60-79
Volume 26, Number 3, 2014
- Jung-Yu Lai:

E-SERVCON and E-Commerce Success: Applying the DeLone & McLean Model. 1-22 - Clay K. Williams, Donald E. Wynn Jr., Ramana Madupalli, Elena Karahanna, Barbara K. Duncan:

Explaining Users' Security Behaviors with the Security Belief Model. 23-46 - Ian Sims, Conor O'Leary, Pran Boolaky:

Overreliance on Mathematical Accuracy of Computer Output: An Issue for IT Educators. 47-64 - Lin Jia, Casey G. Cegielski, Qinsheng Zhang:

The Effect of Trust on Customers' Online Repurchase Intention in Consumer-to-Consumer Electronic Commerce. 65-86
Volume 26, Number 4, 2014
- Guopeng Yin, Ling Zhu:

Habit: How Does It Develop, and Affect Continued Usage of Chinese Users on Social Networking Websites? 1-22 - Teresa K. Betts

, Andrew J. Setterstrom, John Michael Pearson, Stephanie Totty
:
Explaining Cyberloafing through a Theoretical Integration of Theory of Interpersonal Behavior and Theory of Organizational Justice. 23-42 - Clinton Amos, Lixuan Zhang, Iryna Pentina:

Investigating Privacy Perception and Behavior on Weibo. 43-56 - Colleen Schwarz, Andrew Schwarz:

To Adopt or Not to Adopt: A Perception-Based Model of the EMR Technology Adoption Decision Utilizing the Technology-Organization-Environment Framework. 57-79

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














