How old are you really? Cognitive age in technology acceptance (Englisch)
- Neue Suche nach: Hong, Se-Joon
- Neue Suche nach: Lui, Carrie Siu Man
- Neue Suche nach: Hahn, Jungpil
- Neue Suche nach: Moon, Jae Yun
- Neue Suche nach: Kim, Tai Gyu
- Neue Suche nach: Hong, Se-Joon
- Neue Suche nach: Lui, Carrie Siu Man
- Neue Suche nach: Hahn, Jungpil
- Neue Suche nach: Moon, Jae Yun
- Neue Suche nach: Kim, Tai Gyu
In:
Decision Support Systems
;
56
;
122-130
;
2013
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:How old are you really? Cognitive age in technology acceptance
-
Beteiligte:Hong, Se-Joon ( Autor:in ) / Lui, Carrie Siu Man ( Autor:in ) / Hahn, Jungpil ( Autor:in ) / Moon, Jae Yun ( Autor:in ) / Kim, Tai Gyu ( Autor:in )
-
Erschienen in:Decision Support Systems ; 56 ; 122-130
-
Verlag:
- Neue Suche nach: Elsevier B.V.
-
Erscheinungsdatum:15.05.2013
-
Format / Umfang:9 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 56
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A stochastic, contingency-based security-constrained optimal power flow for the procurement of energy and distributed reserveMurillo-Sánchez, Carlos E. / Zimmerman, Ray D. / Anderson, C. Lindsay / Thomas, Robert J. et al. | 2013
- 11
-
Cyber-risk decision models: To insure IT or not?Mukhopadhyay, Arunabha / Chatterjee, Samir / Saha, Debashis / Mahanti, Ambuj / Sadhukhan, Samir K. et al. | 2013
- 27
-
Vendors' incentives to invest in software quality in enterprise systemsCho, Wooje / Subramanyam, Ramanath / Xia, Mu et al. | 2013
- 37
-
Cost escalation in information technology outsourcing: A moderated mediation studyBahli, Bouchaïb / Rivard, Suzanne et al. | 2013
- 48
-
Including social factors in an argumentative model for Group Decision Support SystemsRecio-García, Juan A. / Quijano, Lara / Díaz-Agudo, Belen et al. | 2013
- 56
-
It is all about what we have: A discriminant analysis of organizations' decision to adopt open source softwareLi, Yan / Tan, Chuan-Hoo / Yang, Xue et al. | 2013
- 63
-
A machine learning-based usability evaluation method for eLearning systemsOztekin, Asil / Delen, Dursun / Turkyilmaz, Ali / Zaim, Selim et al. | 2013
- 74
-
A risk oriented model to assess strategic decisions in new product development projectsMarmier, F. / Gourc, D. / Laarz, F. et al. | 2013
- 83
-
Cognitive-based evaluation of consumption fads: An analytical approachHu, Hao / Lai, Vincent S. et al. | 2013
- 92
-
Impact of informational factors on online recommendation credibility: The moderating role of source credibilityLuo, Chuan / Luo, Xin (Robert) / Schatzberg, Laurie / Sia, Choon Ling et al. | 2013
- 103
-
Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy contextLancelot Miltgen, Caroline / Popovič, Aleš / Oliveira, Tiago et al. | 2013
- 115
-
Using 3D virtual environments to facilitate students in constructivist learningChau, Michael / Wong, Ada / Wang, Minhong / Lai, Songnia / Chan, Kristal W.Y. / Li, Tim M.H. / Chu, Debbie / Chan, Ian K.W. / Sung, Wai-ki et al. | 2013
- 122
-
How old are you really? Cognitive age in technology acceptanceHong, Se-Joon / Lui, Carrie Siu Man / Hahn, Jungpil / Moon, Jae Yun / Kim, Tai Gyu et al. | 2013
- 131
-
Will a supplier benefit from sharing good information with a retailer?Choi, Tsan-Ming / Li, Jian / Wei, Ying et al. | 2013
- 140
-
Exploring the effect of boundary objects on knowledge interactionHuang, Eugenia Y. / Huang, Travis K. et al. | 2013
- 148
-
Understanding the formation of software-as-a-service (SaaS) satisfaction from the perspective of service qualityChou, Shih-Wei / Chiang, Chun-Hsiung et al. | 2013
- 156
-
Scalable and noise tolerant web knowledge extraction for search task simplificationHe, Jun / Gu, Yingqin / Liu, Hongyan / Yan, Jun / Chen, Hong et al. | 2013
- 168
-
An auction design for local reserve energy marketsRosen, C. / Madlener, R. et al. | 2013
- 180
-
Examining the effects of malfunctioning personalized services on online users' distrust and behaviorsChau, Patrick Y.K. / Ho, Shuk Ying / Ho, Kevin K.W. / Yao, Yihong et al. | 2013
- 192
-
Evaluation and aggregation of pay-as-you-drive insurance rate factors: A classification analysis approachPaefgen, Johannes / Staake, Thorsten / Thiesse, Frédéric et al. | 2013
- 202
-
Mining stable patterns in multiple correlated databasesLin, Yaojin / Hu, Xuegang / Li, Xiaomei / Wu, Xindong et al. | 2013
- 211
-
Capturing the essence of word-of-mouth for social commerce: Assessing the quality of online e-commerce reviews by a semi-supervised approachZheng, Xiaolin / Zhu, Shuai / Lin, Zhangxi et al. | 2013
- 223
-
A sustainable and affordable support system for rural healthcare deliveryBarjis, Joseph / Kolfschoten, Gwendolyn / Maritz, Johan et al. | 2013
- 234
-
A prediction framework based on contextual data to support Mobile Personalized MarketingTang, Heng / Liao, Stephen Shaoyi / Sun, Sherry Xiaoyun et al. | 2013
- 247
-
Seller heterogeneity in electronic marketplaces: A study of new and experienced sellers in eBayGoes, Paulo / Tu, Yanbin / Tung, Y. Alex et al. | 2013
- 259
-
Improving RFID adoption in Taiwan's healthcare industry based on a DEMATEL technique with a hybrid MCDM modelLu, Ming-Tsang / Lin, Shi-Woei / Tzeng, Gwo-Hshiung et al. | 2013
- 270
-
Reliability (or “lack thereof”) of on-line preference revelation: A controlled experimental analysisChen, Li / Marsden, James R. / Zhang, Zhongju et al. | 2013
- 275
-
Invariant conditions in value system simulation modelsLaurier, Wim / Poels, Geert et al. | 2013
- 288
-
Formal correctness of supply chain designLeukel, Joerg / Sugumaran, Vijayan et al. | 2013
- 300
-
NegotiAuction: An experimental studyPham, Long / Zaitsev, Alexander / Steiner, Robert / Teich, Jeffrey E. et al. | 2013
- 310
-
Detection of naming convention violations in process models for different languagesLeopold, Henrik / Eid-Sabbagh, Rami-Habib / Mendling, Jan / Azevedo, Leonardo Guerreiro / Baião, Fernanda Araujo et al. | 2013
- 326
-
How to preserve the conflict as an alarm in the combination of belief functions?Lefèvre, Eric / Elouedi, Zied et al. | 2013
- 334
-
Integrating ERP and e-business: Resource complementarity in business value creationHsu, Pei-Fang et al. | 2013
- 348
-
Capital markets valuation and accounting performance of Most Admired Knowledge Enterprise (MAKE) award winnersDeFond, Mark L. / Konchitchki, Yaniv / McMullin, Jeff L. / O'Leary, Daniel E. et al. | 2013
- 361
-
A study of mobile user engagement (MoEN): Engagement motivations, perceived value, satisfaction, and continued engagement intentionKim, Young Hoon / Kim, Dan J. / Wachter, Kathy et al. | 2013
- 371
-
Bidding behaviors for a keyword auction in a sealed-bid environmentKamijo, Y. et al. | 2013
- 379
-
Online learning for auction mechanism in bandit settingHe, Di / Chen, Wei / Wang, Liwei / Liu, Tie-Yan et al. | 2013
- 387
-
Sequential weighted combination for unreliable evidence based on evidence varianceHan, Deqiang / Deng, Yong / Han, Chongzhao et al. | 2013
- 395
-
Introduction to the special issue on “Mechanism Design in E-commerce and Information Systems”Fan, Ming / Li, Lingfang (Ivy) / Liu, De et al. | 2012
- 397
-
From clicking to consideration: A business intelligence approach to estimating consumers' consideration probabilitiesWang, Hao / Wei, Qiang / Chen, Guoqing et al. | 2012
- 406
-
DEA analysis of FDI attractiveness for sustainable development: Evidence from Chinese provincesLei, Ming / Zhao, Xinna / Deng, Honghui / Tan, Keah-Choon et al. | 2012
- 419
-
Can online trading survive bad-mouthing? An experimental investigationDu, Ninghua / Huang, Hailiang / Li, Lingfang (Ivy) et al. | 2012
- 427
-
A local social network approach for research managementLiu, Xiaoyan / Guo, Zhiling / Lin, Zhenjiang / Ma, Jian et al. | 2012
- 439
-
Software project risk analysis using Bayesian networks with causality constraintsHu, Yong / Zhang, Xiangzhou / Ngai, E.W.T. / Cai, Ruichu / Liu, Mei et al. | 2012
- 450
-
Optimal keyword auctions for optimal user experiencesLi, Jun / Liu, De / Liu, Shulin et al. | 2012
- 462
-
How do competitive environments moderate CRM value?Liu, Alfred Zhu / Liu, Hongju / Xu, Sean Xin et al. | 2012
- 474
-
The influence of online word-of-mouth on long tail formationGu, Bin / Tang, Qian / Whinston, Andrew B. et al. | 2012
- 482
-
Store survival in online marketplace: An empirical investigationWang, Youwei / Wang, Shan / Fang, Yulin / Chau, Patrick Y.K. et al. | 2012
- 494
-
Experience information goods: “Version-to-upgrade”Wei, Xueqi (David) / Nault, Barrie R. et al. | 2012
- 502
-
Learning from other buyers: The effect of purchase history records in online marketplacesYe, Qiang / Cheng, Zhuo (June) / Fang, Bin et al. | 2012
- 513
-
The impacts of information quality and system quality on users' continuance intention in information-exchange virtual communities: An empirical investigationZheng, YiMing / Zhao, Kexin / Stylianou, Antonis et al. | 2012
- IFC
-
Editorial Board| 2013