SEARCH

SEARCH BY CITATION

References

  • Agarwal, R., & Prasad, J. (1999). Are individual differences germane to the acceptance of new information technologies? Decision Sciences, 30(2), 361391.
  • Aiken, L. S., & West, S. G. (1991). Multiple regression: Testing and interpreting interactions. Newbury Park: Sage.
  • Ajzen, I. (1985). From intentions to actions: a theory of planned behavior. In J.Kuhl & J.Beckman, (Eds.), Action-control: From cognition to behavior (pp. 1139). Berlin, New York: Springer-Verlag, 11–39.
  • Bajaj, A., & Nidumolu, S. R. (1998). A feedback model to understand information system usage. Information & Management, 33(4), 213224.
  • Bem, S. L. (1981). The BSRI and gender schema theory: A reply to Spence and Helmreich. Psychological Review, 88(4), 369371.
  • Bem, D. J., & Allen, A. (1974). On predicting some of the people some of the time: The search for cross-situational consistencies in behavior. Psychological Review, 81(6), 506520.
  • Branscomb, L. M. & Thomas, J. C. (1985). Ease of use: A system design challenge. IBM Systems Journal, 23, 224235.
  • Canary, D. J., Cupach, W. R., & Serpe, R. T. (2001). A competence-based approach to examining interpersonal conflict: Test of a longitudinal model. Communication Research, 28(1), 79105.
  • Caudill, E. M., & Murphy, R. E. (2000). Consumer online privacy: Legal and ethical issues. Journal of Public Policy and Marketing, 19(1), 719.
  • Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 6067.
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly, 13(3), 319340.
  • Duck, S., Rutt, D. J., Hurst, M. H., & Strejc, H. (1991). Some evident truths about conversations in everyday relationships: All communications are not created equal. Human Communication Research, 18(2), 228267.
  • Eldridge, M., & Grinter, R. (2001, April 1–2). Studying text messaging in teenagers. Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2001), Seattle, WA.
  • Fishbein, M., & Ajzen, I. (1975). Belief attitude, intention and behavior: An introduction to theory and research. Addison-Wesley, Reading, MA, USA.
  • Fornell, G., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 3950.
  • Frankel, K. A. (1990). Women and computing. Communications of the ACM, 33(11), 3445.
  • Franzak, F., Pitta, D., & Fritsche, S. (2001). Online relationships and the consumer's right to privacy. Journal of Consumer Marketing, 18(7), 631641.
  • Gefen, D., & Straub, D. W. (1997). Gender differences in the perception and use of e-mail: An extension to the technology acceptance model. MIS Quarterly, 21(4), 389400.
  • Gottman, J. M. (1993). The roles of conflict engagement, escalation, and avoidance in marital interaction: A longitudinal view of five types of couples. Journal of Consulting and Clinical Psychology, 61(1), 615.
  • Hakkila, J., & Chatfield, C. (2005). “It's like if you opened someone else's letter”: User perceived privacy and social practices with SMS communication. Proceedings of the 7thInternational Conference on Human Computer Interaction with Mobile Devices & Services, Salzburg, Austria, 219222.
  • Jianakoplos, N. A., & Bernasek, A. (1998). Are women more risk averse? Economic Inquiry, 36(6), 620630.
  • Kekkonen-Moneta, S., & Moneta, G. B. (2002). E-learning in Hong Kong: Comparing learning outcomes in online multimedia and lecture versions of an introductory computing course. British Journal of Educational Technology, 33(4), 423433.
  • Kim, G., Park, S. B., & Oh, J. (2008). An examination of factors influencing consumer adoption of short message service (SMS), Psychology & Marketing, 25(8), 769786.
  • King, W. R., & He, J. (2006). A meta-analysis of the technology acceptance model. Information & Management, 43(6), 740755.
  • Kirchmeyer, C. (1997). Gender roles in a traditionally female occupation: A study of emergency, operating, intensive care, and psychiatric nurses. Journal of Vocational Behavior, 50(1), 7895.
  • Knowledge Networks (2007). Instant Messaging AOL Poll. Retrieved from http://surveys.ap.org/data/KnowledgeNetworks/2007-11-14IMStudy.pdf
  • Kopomaa, T. (2000). The city in your pocket: Birth of the mobile information society. Helsinki: Gaudeamus.
  • Kozan, M. K. (1997). Culture and conflict management: A theoretical framework. International Journal of Conflict Management, 8(4), 338360.
  • Kuo, F. Y., Lin, C. S., & Hsu, M. H. (2007). Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices. Journal of Business Ethics, 73, 145160.
  • Lasen, A. (2002). A comparative study of mobile phone use in London, Madrid, and Paris. Surrey: Digital World Research Center, University of Surrey.
  • Leung, K. (1988). Some determinants of conflict avoidance. Journal of Cross-Cultural Psychology, 19(1), 125136.
  • Ling, R., & Ytrri, B. (1999). Nobody sits at home and waits for the telephone to ring: Micro and hyper-coordination through the use of the mobile telephone. (Report 30). Fornebu, Norway: Telenor.
  • Lynott, P. P., & McCandless, N. J. (2000). The impact of age vs. life experiences on the gender role attitudes of women in different cohorts. Journal of Women and Aging, 12(2), 521.
  • Malhotra, Y., & Galletta, D. (2005). A multidimensional commitment model of volitional systems adoption and usage behavior. Journal of Management Information System, 22(1), 117151.
  • Markett, C., Sanchez I. A., Weber, S., & Tangney, B. (2006). Using short message service to encourage interactivity in the classroom. Computer & Education, 46(3), 280293.
  • McNaught, C. & Lam, P. (2005). Building an evaluation culture and evidence base for e-learning in three Hong Kong universities. British Journal of Educational Technology, 36(4), 599614.
  • Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), 6574.
  • Min, S. J. (2007). Online vs. face-to-face deliberation: Effects on civic engagement. Journal of Computer-Mediated Communication, 12(4), 13691387.
  • Mitchell, A., Heppel, S., & Kadirire, J. (2002). Technology watch research report. Anglia: UltraLab.
  • Morris, M. W., Williams, K. Y., Leung, K., Larrick, R., Mendoza, M. T., Bhatnagar, D., Li, J., Kondo, M., Luo, J. L., & Hu, J. C. (1998). Conflict management style: Accounting for cross-national differences. Journal of International Business Studies, 29(4), 729747.
  • Ohbuchi, K. L., Fukushima, O., & Tedeschi, J. T. (1999). Cultural values in conflict management. Journal of Cross-Cultural Psychology, 30, 1, 5171.
  • Parikh, M., & Verma, S. (2002). Utilizing Internet technologies to support learning: An empirical analysis. International Journal of Information Management, 22(1), 2746.
  • Petronio, S. (2002). Boundaries of Privacy, Suny Press.
  • Plant, S. (2003). On the mobile: The effects of mobile telephones on social and individual life. http://www.motorola.com/mot/documents/0.1028.333.00.pdf
  • Podsakoff, P. M., & Organ, D. W. (1986). Self-reports in organizational research: problems and prospects. Journal of Management, 12(4), 531544.
  • Ramirez, A. Jr., Dimmick, J., Feaster, J., & Lin, S. F. (2008). Revisiting interpersonal media competition: The gratification niches of instant messaging, e-mail, and the telephone. Communication Research, 35(4), 529548.
  • Rice, R. E. (1993). Media appropriateness: Using social presence theory to compare traditional and new organizational media. Human Communication Research, 19(4), 451484.
  • Saade, R. G. & Otrakji, C. A. (2007). First impression last a lifetime: Effect of interface type on disorientation and cognitive load, Computers in Human Behavior, 23, 525535.
  • Segerstad, Y. H. (2005). Language in SMS: A socio-linguistic view. In R.Harper, L.Palen, and A.Taylor (Eds.), The inside text: Social, cultural and design perspectives on SMS. (pp. 3351). Dordecht: Springer.
  • Siegel, S., & Castellan, N. J. (1988). Nonparametric statistics for the behavioral sciences (2nd ed.). New York: McGraw-Hill.
  • Tjosvold, D., & Sun H. F. (2002). Understanding conflict avoidance: Relationship, motivations, actions, and consequences. The International Journal of Conflict Management, 13(2), 142164.
  • Tung, L. L. (2004). Service quality and perceived value's impact on satisfaction, intention and usage of Short Message Service (SMS). Information Systems Frontiers, 6(4), 353368.
  • UNCTAD (2006). Information economy report. United Nations Conference on Trade and Development .
  • Venkatesh, V., & Morris, M. G. (2000). Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115139.
  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425450.
  • Vidmar, N., & Flaherty, D. H. (2006). Concern for personal privacy in an electronic age. Journal of Communication, 35(2), 91103.
  • Westin, A. (1967). Privacy and freedom. New York: Atheneum.
  • Zack, M. H. (1994). Electronic messaging and communication effectiveness in an ongoing work group. Information & Management, 26(4), 231242.