References
- Bagozzi, R., "The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift", Journal of the Association for Information Systems, Vol. 8, No. 4, 2007, pp. 244-254. https://doi.org/10.17705/1jais.00122
- Chan, M., Woon, I., and Kankanhalli, A., "Perceptions of Information Security in the Workplace : Linking Information Security Climate to Compliant Behavior", Journal of Information Privacy and Security, Vol. 1, No. 3, 2005, pp. 18-41. https://doi.org/10.1080/15536548.2005.10855772
- Chen, J. and Wang, E., "Internalization in Technology Innovation : A Case of CRM Adoption", Proceedings of the 39th Hawaii International Conference on Systems Sciences, 2006.
- Chiu, C., Chiu, C., and Chang, H., "Examining the integrated influence of fairness and quality on leaner's satisfaction and webbased learning continuance intention", Information System Journal, Vol. 17, pp. 271-287.
- Collings, D. and Dick, P., "The relationship between ceremonial adoption of popular management practices and the motivation for practice adoption and diffusion in an American MNC", The International Journal of Human Resource Management, Vol. 22, No. 18, 2011, pp. 3849-3866. https://doi.org/10.1080/09585192.2011.561233
- Davis, F., "Perceived Usefulness, Perceived Ease of use, and User Acceptance of Information Technology", MIS Quarterly, Vol. 13, No. 3, 1989, pp. 318-339.
- Davis, F., Bagozzi, R., and Warshaw, P., "User Acceptance of Computer Technology : A Comparison of Two Theoretical Models", Management Science, Vol. 35, 1989, pp. 982-1003. https://doi.org/10.1287/mnsc.35.8.982
- Delone, W. and Mclean, E., "Measuring ecommerce success : Applying the DeLone and McLean information systems success model", International Journal of Electronic Commerce, Vol. 9, No. 1, 2004, pp. 31-47. https://doi.org/10.1080/10864415.2004.11044317
- Fishbein, M. and Ajzen, I., Belief, attitude, intention, and behavior : An introduction to theory and research, Addison-Wesley, 1975.
- Igbaria, M. and Iivari, J., "The effects of self-efficacy on computer usage", Omega, Vol. 23, No. 6, 1995, pp. 587-605. https://doi.org/10.1016/0305-0483(95)00035-6
- Igbaria, M., Guimaraes, T., and Davis, G., "Testing the determinants of microcomputer usage via a structural equation model", Journal of Management Information Systems, Vol. 11, No. 4, 1995, pp. 87-114. https://doi.org/10.1080/07421222.1995.11518061
- Johansen, R. and Swigart, R., Upsizing the Individual in the Downsized Organization : Managing in the Wake of Reengineering, Globalization and Overwhelming Technological Change, Basic Books, 1995.
- Kelman, H., "Further Thoughts on the Pro cesses of Compliance, Identification, and Internalization", Perspectives on Social Power, Chicago : Aldine, 1974, pp. 126-171.
- Kim, S. and Kim, J., "Communal Antecedents in the Adoption of Secure Coding Methodologies", Asia Pacific Journal of Information Systems, Vol. 26, No. 2, 2016, pp. 231-246. https://doi.org/10.14329/apjis.2016.26.2.231
- Kostova, T., "Transnational Transfer of Strategic Organizational Practices : A Contextual Perspective", The Academy of Management Review, Vol. 24, No. 2, 1999, pp. 308-324. https://doi.org/10.5465/amr.1999.1893938
- Kostova, T. and Roth, K., "Adoption of an Organizational Practice By Subsidiaries of Multinational Corporations : Institutional and Relational Effects", Academy of Management Journal, Vol. 45, No. 1, 2002, pp. 215-233. https://doi.org/10.2307/3069293
- Kostova, T., Roth, K., and Dacin, M. T., "Institutional theory in the study of multinational corporations : A critique and new directions", Academy of Management Review, Vol. 33, No. 4, 2008, pp. 994-1006. https://doi.org/10.5465/amr.2008.34422026
- Lee, Y., Kozar, K., and Larsen, K., "The technology acceptance model : Past, present, and future", Communications of the Association for Information Systems, Vol. 12, No. 1, 2003, pp. 751-780.
- Legris, P., Ingham, J., and Collerette, P., "Why do people use information technology? A critical review of the technology acceptance model", Information and Management, Vol. 40, No. 3, 2003, pp. 191-204. https://doi.org/10.1016/S0378-7206(01)00143-4
- Mael, F. and Ashforth, B., "Alumni and their alma mater : A partial test of the reformulated model of organizational identification", Journal of Organizational Behavior, Vol. 13, No. 2, 1992, pp. 103-123. https://doi.org/10.1002/job.4030130202
- Meyer, J. W. and Rowan, B., "Institutionalized organizations : Formal structure as myth and ceremony", American Journal of Sociology, 1977, pp. 340-363.
- Nair, A. and Prajogo, D., "Internalization of ISO 9000 standards : the antecedent role of functionalist and institutionalist drivers and performance implications", International Journal of Production Research, Vol. 47, No. 16, 2009, pp. 4545-4568. https://doi.org/10.1080/00207540701871069
- Pierce, J. L., Kostova, T., and Dirks, K., "Toward a theory of psychological ownership in organizations", Academy of Management Review, Vol. 26, No. 2, 2001, pp. 298-310. https://doi.org/10.5465/amr.2001.4378028
- Pierce, J., Kostova, T., and Dirks, K., "The state of psychological ownership : Integrating and extending a century of research", Review of General Psychology, Vol. 7, No. 1, 2003, pp. 84-107. https://doi.org/10.1037/1089-2680.7.1.84
- Pfleeger, S., "Understanding and Improving Technology Transfer in Software Engineering", Journal of Systems and Software, Vol. 47, No. 2-3, 1999, pp. 111-124. https://doi.org/10.1016/S0164-1212(99)00031-X
- Recker, J., "Continued use of process modeling grammars : the impact of individual difference factors", European Journal of Information System, Vol. 19, No. 1, 2010, pp. 76-92. https://doi.org/10.1057/ejis.2010.5
- Riemenschneider, C., Harrison, D., and Mykytyn, P., "Understanding IT adoption decisions in small business : Integrating current theories", Information and Management, Vol. 40, 2003, pp. 269-285. https://doi.org/10.1016/S0378-7206(02)00010-1
- Riemenschneider, C., Hardgrave, B., and Davis, F., "Explaining Software Developer Acceptance of Methodologies : A Comparison of Five Theoretical Models", IEEE Transactions on Software Engineering, Vol. 28, No. 12, 2002, pp. 1135-1145. https://doi.org/10.1109/TSE.2002.1158287
- Tari, J., Heras-Saizarbitoria, J., and Pereira, J., "Internalization of quality management in service organizations", Managing Service Quality, Vol. 23, No. 6, 2013, pp. 456-473. https://doi.org/10.1108/MSQ-06-2012-0060
- Taylor, S. and Kaza, S., "Security Injections : Modules to help students remember, understand, and apply secure coding techniques", ITiCSE, 2011, pp. 27-29.
- Turner, M., Kitchenham, B., Brereton, P., Charters, S., and Budgen, D., "Does the technology acceptance model predict actual use? A systematic literature review", Information and Software Technology, Vol. 52, No. 5, 2010, pp. 463-479. https://doi.org/10.1016/j.infsof.2009.11.005
- Venkatesh, V. and Davis, F., "A theoretical extension of the technology acceptance model : Four longitudinal field studies", Management Science, Vol. 46, No. 2, 2000, pp. 186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
- Venkatesh, V., Morris, M., Davis, G., and Davis, D., "User acceptance of information technology : Toward a unified view", MIS Quarterly, Vol. 27, No. 3, 2003, pp. 425-478. https://doi.org/10.2307/30036540
- Whittaker, J., "Why secure applications are difficult to write", IEEE Security and Privacy, Vol. 1, No. 2, pp. 81-83.
Cited by
- How User's Participation in Feasibility Study Enhances Use of Business Intelligence Systems vol.24, pp.3, 2016, https://doi.org/10.21219/jitam.2017.24.3.001